Skip to content

Commit 782a696

Browse files
authored
Update web-app-routing.md
Removed explicit IngressBackend creation. The annotation on the Ingress is sufficient to trigger the creation of this resource.
1 parent 4e63b29 commit 782a696

File tree

1 file changed

+1
-29
lines changed

1 file changed

+1
-29
lines changed

articles/aks/web-app-routing.md

Lines changed: 1 addition & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -396,7 +396,7 @@ spec:
396396

397397
### Create the ingress
398398

399-
The Web Application Routing add-on creates an Ingress class on the cluster called `webapprouting.kubernetes.azure.com `. When you create an ingress object with this class, this activates the add-on. To obtain the certificate URI to use in the Ingress from Azure Key Vault, run the following command.
399+
The Web Application Routing add-on creates an Ingress class on the cluster called `webapprouting.kubernetes.azure.com `. When you create an ingress object with this class, this activates the add-on. The `kubernetes.azure.com/use-osm-mtls: "true"` annotation on the Ingress object creates an Open Service Mesh (OSM) [IngressBackend](https://release-v1-2.docs.openservicemesh.io/docs/guides/traffic_management/ingress/#ingressbackend-api) to configure a backend service to accept ingress traffic from trusted sources. OSM issues a certificate that Nginx will use as the client certificate to proxy HTTPS connections to TLS backends. The client certificate and CA certificate are stored in a Kubernetes secret that Nginx will use to authenticate service mesh backends. For more information, see [Open Service Mesh: Ingress with Kubernetes Nginx Ingress Controller](https://release-v1-2.docs.openservicemesh.io/docs/demos/ingress_k8s_nginx/). To obtain the certificate URI to use in the Ingress from Azure Key Vault, run the following command.
400400

401401
```azurecli-interactive
402402
az keyvault certificate show --vault-name <KeyVaultName> -n <KeyVaultCertificateName> --query "id" --output tsv
@@ -441,34 +441,6 @@ spec:
441441
secretName: keyvault-aks-helloworld
442442
```
443443

444-
### Create the ingress backend
445-
446-
Open Service Mesh (OSM) uses its [IngressBackend API](https://release-v1-2.docs.openservicemesh.io/docs/guides/traffic_management/ingress/#ingressbackend-api) to configure a backend service to accept ingress traffic from trusted sources. To proxy connections to HTTPS backends, you configure the Ingress and IngressBackend configurations to use https as the backend protocol. OSM issues a certificate that Nginx will use as the client certificate to proxy HTTPS connections to TLS backends. The client certificate and CA certificate are stored in a Kubernetes secret that Nginx will use to authenticate service mesh backends. For more information, see [Open Service Mesh: Ingress with Kubernetes Nginx Ingress Controller](https://release-v1-2.docs.openservicemesh.io/docs/demos/ingress_k8s_nginx/).
447-
448-
Create a file named **ingressbackend.yaml** and copy in the following YAML.
449-
450-
```yaml
451-
apiVersion: policy.openservicemesh.io/v1alpha1
452-
kind: IngressBackend
453-
metadata:
454-
name: aks-helloworld
455-
namespace: hello-web-app-routing
456-
spec:
457-
backends:
458-
- name: aks-helloworld
459-
port:
460-
number: 80
461-
protocol: https
462-
tls:
463-
skipClientCertValidation: false
464-
sources:
465-
- kind: Service
466-
name: nginx
467-
namespace: app-routing-system
468-
- kind: AuthenticatedPrincipal
469-
name: ingress-nginx.ingress.cluster.local
470-
```
471-
472444
### Create the resources on the cluster
473445

474446
Use the [kubectl apply][kubectl-apply] command to create the resources.

0 commit comments

Comments
 (0)