Skip to content

Commit b13d45a

Browse files
committed
some fixes
1 parent cf52290 commit b13d45a

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/application-gateway/for-containers/how-to-cert-manager-lets-encrypt-ingress-api.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Cert-manager and Let's Encrypt with Application Gateway for Containers - Ingress API
3-
description: Learn how to configure Application Gateway for Containers with certificates managed by CNCF project cert-manager.
3+
description: Learn how to configure Application Gateway for Containers with certificates managed by the Cloud Native Computing Foundation (CNCF) project cert-manager.
44
services: application-gateway
55
author: philwelz
66
ms.service: azure-appgw-for-containers
@@ -15,7 +15,7 @@ This guide demonstrates how to use cert-manager to automatically issue and renew
1515

1616
For the purposes of this example, we have cert-manager configure certificates issued from Let's Encrypt to demonstrate an end-to-end deployment, where Application Gateway for Containers is providing TLS offloading.
1717

18-
Insert PICTURE HRE
18+
Insert PICTURE HERE
1919

2020
For certificates to be issued by Let's Encrypt, a challenge is required by the authority to validate domain ownership. This validation happens by allowing cert-manager to create a pod and Ingress resource that exposes an endpoint during certificate issuance, proving your ownership of the domain name.
2121

@@ -54,7 +54,7 @@ helm upgrade -i \
5454

5555
### Create a ClusterIssuer
5656

57-
Create a ClusterIssuer resource to define how cert-manager will communicate with Let's Encrypt. For this example, an HTTP challenge is used. During challenge, cert-manager creates an `Ingress` resource and corresponding pod presenting a validation endpoint to prove ownership of the domain. This is done by creating a temporary Ingress resource with the `http01` challenge type. This Ingress resource and corresponding pod created by cert-manager will be deleted after the challenge is completed.
57+
Create a ClusterIssuer resource to define how cert-manager communicates with Let's Encrypt. For this example, an HTTP challenge is used. During challenge, cert-manager creates an `Ingress` resource and corresponding pod presenting a validation endpoint to prove ownership of the domain. This is done by creating a temporary Ingress resource with the `http01` challenge type. This Ingress resource and corresponding pod created by cert-manager is deleted after the challenge is completed.
5858

5959
>[!Tip]
6060
>Other challenges supported by Let's Encrypt are documented on [letsencrypt.org - Challenge Types](https://letsencrypt.org/docs/challenge-types/)
@@ -136,7 +136,7 @@ Verify the resource was created by running the following command:
136136
kubectl get ClusterIssuer -A -o yaml
137137
```
138138

139-
The status should show `True` and type `Ready` under contidions.
139+
The status should show `True` and type `Ready` under conditions.
140140

141141
```yaml
142142
status:
@@ -277,7 +277,7 @@ status:
277277
protocol: TCP
278278
```
279279
280-
As mentioned above, cert-manager will create a temporary Ingress resource and pod to perform the challenge:
280+
As mentioned previously, cert-manager creates a temporary Ingress resource and pod to perform the challenge:
281281
282282
```bash
283283
kubectl get pods -n test-infra
@@ -304,7 +304,7 @@ NAME APPROVED DENIED READY ISSUER REQUESTER
304304
cert-backend-1 True False letsencrypt-prod system:serviceaccount:cert-manager:cert-manager 34s
305305
```
306306

307-
When the challenge is successful, the status will change to `READY=True` and the certificate will be issued:
307+
When the challenge is successful, the status changes to `READY=True` and the certificate is issued:
308308

309309
```bash
310310
kubectl get certificate -n test-infra

0 commit comments

Comments
 (0)