Skip to content

Commit 7d7b365

Browse files
committed
restoring Related content sections
1 parent ab70a9d commit 7d7b365

12 files changed

+39
-0
lines changed

articles/application-gateway/ingress-controller-add-health-probes.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,3 +68,7 @@ Any property that the readiness or liveness probe can't infer uses the following
6868
| `Timeout` | `30` |
6969
| `Interval` | `30` |
7070
| `UnhealthyThreshold` | `3` |
71+
72+
## Related content
73+
74+
- [Application Gateway for Containers](for-containers/overview.md)

articles/application-gateway/ingress-controller-autoscale-pods.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,3 +129,4 @@ ab -n10000 http://<applicaiton-gateway-ip-address>/
129129
## Related content
130130

131131
- [Troubleshoot Application Gateway Ingress Controller issues](ingress-controller-troubleshoot.md)
132+
- [Application Gateway for Containers](for-containers/overview.md)

articles/application-gateway/ingress-controller-cookie-affinity.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,3 +34,7 @@ spec:
3434
serviceName: frontend
3535
servicePort: 80
3636
```
37+
38+
## Related content
39+
40+
- [Application Gateway for Containers](for-containers/overview.md)

articles/application-gateway/ingress-controller-disable-addon.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,3 +50,4 @@ az aks enable-addons -n <AKS-cluster-name> -g <AKS-cluster-resource-group> -a in
5050
## Related content
5151

5252
- For more information on how to enable the AGIC add-on by using an existing Application Gateway deployment and AKS cluster, see [this tutorial](tutorial-ingress-controller-add-on-existing.md).
53+
- For information about Application Gateway for Containers, see [this overview article](for-containers/overview.md).

articles/application-gateway/ingress-controller-expose-service-over-http-https.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,3 +177,7 @@ spec:
177177
serviceName: frontend
178178
servicePort: 80
179179
```
180+
181+
## Related content
182+
183+
- [Application Gateway for Containers](for-containers/overview.md)

articles/application-gateway/ingress-controller-expose-websocket-server.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,3 +98,7 @@ Depending on the server implementation (such as [this example](https://github.co
9898
Because Application Gateway doesn't add WebSocket headers, the Application Gateway health probe response from your WebSocket server is most likely `400 Bad Request`. Application Gateway then marks your pods as unhealthy. This status eventually results in a `502 Bad Gateway` error for the consumers of the WebSocket server.
9999

100100
To avoid the `502 Bad Gateway` error, you might need to add an HTTP `GET` handler for a health check to your server. For example, `/health` returns `200 OK`.
101+
102+
## Related content
103+
104+
- [Application Gateway for Containers](for-containers/overview.md)

articles/application-gateway/ingress-controller-install-existing.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -414,3 +414,7 @@ You can prohibit AGIC from making changes to a subset of the configuration:
414414
415415
3. Modify the Application Gateway configuration from the Azure portal. For example, add listeners, routing rules, and backends. The new object that you created (`manually-configured-staging-environment`) prohibits AGIC from overwriting the Application Gateway configuration related to
416416
`staging.contoso.com`.
417+
418+
## Related content
419+
420+
- [Application Gateway for Containers](for-containers/overview.md)

articles/application-gateway/ingress-controller-install-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -366,3 +366,4 @@ Alternatively, you can:
366366
## Related content
367367
368368
- For more examples on how to expose an AKS service to the internet via HTTP or HTTPS by using Application Gateway, see [this how-to guide](ingress-controller-expose-service-over-http-https.md).
369+
- For information about Application Gateway for Containers, see [this overview article](for-containers/overview.md).

articles/application-gateway/ingress-controller-letsencrypt-certificate-application-gateway.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,3 +140,7 @@ Use the following steps to install [cert-manager](https://docs.cert-manager.io)
140140
1. Delete the existing staging `ClusterIssuer` resource that you created earlier. Create a new staging resource by replacing the ACME server from the previous `ClusterIssuer` YAML with `https://acme-v02.api.letsencrypt.org/directory`.
141141
142142
Before the Let's Encrypt certificate expires, `cert-manager` automatically updates the certificate in the Kubernetes secret store. At that point, the Application Gateway Ingress Controller applies the updated secret referenced in the ingress resources that it's using to configure Application Gateway.
143+
144+
## Related content
145+
146+
- [Application Gateway for Containers](for-containers/overview.md)

articles/application-gateway/ingress-controller-multiple-namespace-support.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,3 +158,7 @@ By default, AGIC configures Application Gateway based on annotated ingress withi
158158
aksClusterConfiguration:
159159
apiServerAddress: <aks-api-server-address>
160160
```
161+
162+
## Related content
163+
164+
- [Application Gateway for Containers](for-containers/overview.md)

0 commit comments

Comments
 (0)