Skip to content

Commit 9b5c487

Browse files
committed
minor updates
1 parent ea0859c commit 9b5c487

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

articles/aks/istio-deploy-ingress.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,9 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP
4040
aks-istio-ingressgateway-external LoadBalancer 10.0.10.249 <EXTERNAL_IP> 15021:30705/TCP,80:32444/TCP,443:31728/TCP 4m21s
4141
```
4242

43+
> [!NOTE]
44+
> Microsoft doesn't support customizing the IP address for either the internal or external ingress gateways. Any IP customization changes to the Istio service mesh add-on will be reverted.
45+
4346
Applications aren't accessible from outside the cluster by default after enabling the ingress gateway. To make an application accessible, map the sample deployment's ingress to the Istio ingress gateway using the following manifest:
4447

4548
```bash

articles/aks/istio-plugin-ca.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The add-on requires Azure CLI version 2.57.0 or later installed. You can run `az
3535
az keyvault secret set --vault-name $AKV_NAME --name root-cert --file <path-to-folder/root-cert.pem>
3636
az keyvault secret set --vault-name $AKV_NAME --name ca-cert --file <path-to-folder/ca-cert.pem>
3737
az keyvault secret set --vault-name $AKV_NAME --name ca-key --file <path-to-folder/ca-key.pem>
38-
az keyvault secret set --vault-name $AKV_NAME --name cert-chain --file <path/cert-chain.pem>
38+
az keyvault secret set --vault-name $AKV_NAME --name cert-chain --file <path-to-folder/cert-chain.pem>
3939
```
4040

4141
1. Enable [Azure Key Vault provider for Secret Store CSI Driver for your cluster][akv-addon]:

0 commit comments

Comments
 (0)