You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-instances/container-instances-container-group-automatic-ssl.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Enable automatic HTTPS with Caddy as a sidecar container
3
3
description: This guide describes how Caddy can be used as a reverse proxy to enhance your application with automatic HTTPS
4
-
author: matthiasguentert
4
+
ms.author: tomcassidy
5
+
author: tomvcassidy
5
6
ms.service: container-instances
6
7
services: container-instances
7
-
ms.topic: how-to #Required; leave this attribute/value as-is.
8
-
ms.date: 04/06/2023
9
-
ms.custom: template-how-to #Required; leave this attribute/value as-is.
8
+
ms.topic: how-to
9
+
ms.date: 06/12/2023
10
10
---
11
11
12
12
# Enable automatic HTTPS with Caddy in a sidecar container
@@ -33,7 +33,7 @@ The example mounts the [Caddyfile](https://caddyserver.com/docs/caddyfile), whic
33
33
-
34
34
## Prepare the Caddyfile
35
35
36
-
Create a file called `Caddyfile` and paste the configuration below. This will create a simple reverse proxy configuration, pointing to your application container listening on 5000/TCP.
36
+
Create a file called `Caddyfile` and paste the following configuration. This configuration creates a reverse proxy configuration, pointing to your application container listening on 5000/TCP.
37
37
38
38
```console
39
39
my-app.westeurope.azurecontainer.io {
@@ -89,9 +89,9 @@ az storage account keys list -g <resource-group> -n <storage-account>
89
89
90
90
### Create YAML file
91
91
92
-
Create a file called e.g., `ci-my-app.yaml` and paste the content below. Ensure to replace `<account-key>` with one of the access keys previously received and `<storage-account>` accordingly.
92
+
Create a file called `ci-my-app.yaml` and paste the following content. Ensure to replace `<account-key>` with one of the access keys previously received and `<storage-account>` accordingly.
93
93
94
-
This YAML file defines two containers `reverse-proxy` and `my-app`. Whereas the `reverse-proxy` container mounts the three previously created file shares. Further, the configuration exposes port 80/TCP and 443/TCP of the `reverse-proxy` container. The communication between both containers happens on localhost only.
94
+
This YAML file defines two containers `reverse-proxy` and `my-app`. The `reverse-proxy` container mounts the three previously created file shares. The configuration also exposes port 80/TCP and 443/TCP of the `reverse-proxy` container. The communication between both containers happens on localhost only.
95
95
96
96
>[!NOTE]
97
97
> It's important to note, that the `dnsNameLabel` key, defines the public DNS name, under which the container instance group will be reachable, it needs to match the FQDN defined in the `Caddyfile`
@@ -195,7 +195,7 @@ Before verifying if everything went well, give the container group some time to
195
195
196
196
#### OpenSSL
197
197
198
-
We can use the `s_client`sub-command of OpenSSL for that purpose.
198
+
We can use the `s_client`subcommand of OpenSSL for that purpose.
0 commit comments