Skip to content

Commit cbc6939

Browse files
committed
acrolinx appeasement
1 parent 1ad221e commit cbc6939

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/container-instances/container-instances-container-group-automatic-ssl.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Enable automatic HTTPS with Caddy as a sidecar container
33
description: This guide describes how Caddy can be used as a reverse proxy to enhance your application with automatic HTTPS
4-
author: matthiasguentert
4+
ms.author: tomcassidy
5+
author: tomvcassidy
56
ms.service: container-instances
67
services: container-instances
7-
ms.topic: how-to #Required; leave this attribute/value as-is.
8-
ms.date: 04/06/2023
9-
ms.custom: template-how-to #Required; leave this attribute/value as-is.
8+
ms.topic: how-to
9+
ms.date: 06/12/2023
1010
---
1111

1212
# Enable automatic HTTPS with Caddy in a sidecar container
@@ -33,7 +33,7 @@ The example mounts the [Caddyfile](https://caddyserver.com/docs/caddyfile), whic
3333
-
3434
## Prepare the Caddyfile
3535

36-
Create a file called `Caddyfile` and paste the configuration below. This will create a simple reverse proxy configuration, pointing to your application container listening on 5000/TCP.
36+
Create a file called `Caddyfile` and paste the following configuration. This configuration creates a reverse proxy configuration, pointing to your application container listening on 5000/TCP.
3737

3838
```console
3939
my-app.westeurope.azurecontainer.io {
@@ -89,9 +89,9 @@ az storage account keys list -g <resource-group> -n <storage-account>
8989

9090
### Create YAML file
9191

92-
Create a file called e.g., `ci-my-app.yaml` and paste the content below. Ensure to replace `<account-key>` with one of the access keys previously received and `<storage-account>` accordingly.
92+
Create a file called `ci-my-app.yaml` and paste the following content. Ensure to replace `<account-key>` with one of the access keys previously received and `<storage-account>` accordingly.
9393

94-
This YAML file defines two containers `reverse-proxy` and `my-app`. Whereas the `reverse-proxy` container mounts the three previously created file shares. Further, the configuration exposes port 80/TCP and 443/TCP of the `reverse-proxy` container. The communication between both containers happens on localhost only.
94+
This YAML file defines two containers `reverse-proxy` and `my-app`. The `reverse-proxy` container mounts the three previously created file shares. The configuration also exposes port 80/TCP and 443/TCP of the `reverse-proxy` container. The communication between both containers happens on localhost only.
9595

9696
>[!NOTE]
9797
> It's important to note, that the `dnsNameLabel` key, defines the public DNS name, under which the container instance group will be reachable, it needs to match the FQDN defined in the `Caddyfile`
@@ -195,7 +195,7 @@ Before verifying if everything went well, give the container group some time to
195195

196196
#### OpenSSL
197197

198-
We can use the `s_client` sub-command of OpenSSL for that purpose.
198+
We can use the `s_client` subcommand of OpenSSL for that purpose.
199199

200200
```bash
201201
echo "Q" | openssl s_client -connect my-app.westeurope.azurecontainer.io:443
@@ -299,7 +299,7 @@ Navigate to https://my-app.westeurope.azurecontainer.io and verify the certifica
299299

300300
:::image type="content" source="media/container-instances-container-group-automatic-ssl/my-app-1.png" alt-text="Certificate validation":::
301301

302-
To see the certicicate details, click on "Connection is secure" followed by "certificate is valid".
302+
To see the certificate details, click on "Connection is secure" followed by "certificate is valid".
303303

304304
:::image type="content" source="media/container-instances-container-group-automatic-ssl/my-app-2.png" alt-text="Certificate issued by Let's Encrypt":::
305305

0 commit comments

Comments
 (0)