You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/how-to-cert-manager-lets-encrypt-ingress-api.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Cert-manager and Let's Encrypt with Application Gateway for Containers - Ingress API
3
-
description: Learn how to configure Application Gateway for Containers with certificates managed by CNCF project cert-manager.
3
+
description: Learn how to configure Application Gateway for Containers with certificates managed by the Cloud Native Computing Foundation (CNCF) project cert-manager.
4
4
services: application-gateway
5
5
author: philwelz
6
6
ms.service: azure-appgw-for-containers
@@ -15,7 +15,7 @@ This guide demonstrates how to use cert-manager to automatically issue and renew
15
15
16
16
For the purposes of this example, we have cert-manager configure certificates issued from Let's Encrypt to demonstrate an end-to-end deployment, where Application Gateway for Containers is providing TLS offloading.
17
17
18
-
Insert PICTURE HRE
18
+
Insert PICTURE HERE
19
19
20
20
For certificates to be issued by Let's Encrypt, a challenge is required by the authority to validate domain ownership. This validation happens by allowing cert-manager to create a pod and Ingress resource that exposes an endpoint during certificate issuance, proving your ownership of the domain name.
21
21
@@ -54,7 +54,7 @@ helm upgrade -i \
54
54
55
55
### Create a ClusterIssuer
56
56
57
-
Create a ClusterIssuer resource to define how cert-manager will communicate with Let's Encrypt. For this example, an HTTP challenge is used. During challenge, cert-manager creates an `Ingress` resource and corresponding pod presenting a validation endpoint to prove ownership of the domain. This is done by creating a temporary Ingress resource with the `http01` challenge type. This Ingress resource and corresponding pod created by cert-manager will be deleted after the challenge is completed.
57
+
Create a ClusterIssuer resource to define how cert-manager communicates with Let's Encrypt. For this example, an HTTP challenge is used. During challenge, cert-manager creates an `Ingress` resource and corresponding pod presenting a validation endpoint to prove ownership of the domain. This is done by creating a temporary Ingress resource with the `http01` challenge type. This Ingress resource and corresponding pod created by cert-manager is deleted after the challenge is completed.
58
58
59
59
>[!Tip]
60
60
>Other challenges supported by Let's Encrypt are documented on [letsencrypt.org - Challenge Types](https://letsencrypt.org/docs/challenge-types/)
@@ -136,7 +136,7 @@ Verify the resource was created by running the following command:
136
136
kubectl get ClusterIssuer -A -o yaml
137
137
```
138
138
139
-
The status should show `True` and type `Ready` under contidions.
139
+
The status should show `True` and type `Ready` under conditions.
140
140
141
141
```yaml
142
142
status:
@@ -277,7 +277,7 @@ status:
277
277
protocol: TCP
278
278
```
279
279
280
-
As mentioned above, cert-manager will create a temporary Ingress resource and pod to perform the challenge:
280
+
As mentioned previously, cert-manager creates a temporary Ingress resource and pod to perform the challenge:
281
281
282
282
```bash
283
283
kubectl get pods -n test-infra
@@ -304,7 +304,7 @@ NAME APPROVED DENIED READY ISSUER REQUESTER
0 commit comments