Skip to content

Commit d713cc1

Browse files
committed
[AKS] Acrolinx updates
1 parent 2c9a6c0 commit d713cc1

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/aks/ingress.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: mvc
1616

1717
An ingress controller is a piece of software that provides reverse proxy, configurable traffic routing, and TLS termination for Kubernetes services. Kubernetes ingress resources are used to configure the ingress rules and routes for individual Kubernetes services. Using an ingress controller and ingress rules, a single external address can be used to route traffic to multiple services in a Kubernetes cluster.
1818

19-
This document walks through a sample deployment of the [NGINX ingress controller][nginx-ingress] in an Azure Kubernetes Service (AKS) cluster. Additionally, the [cert-manager][cert-manager] project is used to automatically generate and configure [Let's Encrypt][lets-encrypt] certificates. Finally, several applications are run in the AKS cluster, each of which is accessible over a single address.
19+
This article shows you how to deploy the [NGINX ingress controller][nginx-ingress] in an Azure Kubernetes Service (AKS) cluster. The [cert-manager][cert-manager] project is used to automatically generate and configure [Let's Encrypt][lets-encrypt] certificates. Finally, several applications are run in the AKS cluster, each of which is accessible over a single address.
2020

2121
## Before you begin
2222

@@ -44,7 +44,7 @@ eager-crab-nginx-ingress-controller LoadBalancer 10.0.182.160 51.145.
4444
eager-crab-nginx-ingress-default-backend ClusterIP 10.0.255.77 <none> 80/TCP 20m
4545
```
4646

47-
No ingress rules have been created yet. If you browse to the public IP address, you are routed to the NGINX ingress controller's default 404 page, as shown in the following example:
47+
No ingress rules have been created yet. If you browse to the public IP address, the NGINX ingress controller's default 404 page is displayed, as shown in the following example:
4848

4949
![Default NGINX backend](media/ingress/default-back-end.png)
5050

@@ -159,7 +159,7 @@ certificate.certmanager.k8s.io/tls-secret created
159159

160160
## Run application
161161

162-
At this point, an ingress controller and a certificate management solution have been configured. Now let's run two demo applications in your AKS cluster. In this example, Helm is used to deploy two instances of a simple 'Hello world' application.
162+
An ingress controller and a certificate management solution have been configured. Now let's run two demo applications in your AKS cluster. In this example, Helm is used to deploy two instances of a simple 'Hello world' application.
163163

164164
Before you can install the sample Helm charts, add the Azure samples repository to your Helm environment as follows:
165165

@@ -181,7 +181,7 @@ helm install azure-samples/aks-helloworld --set title="AKS Ingress Demo" --set s
181181

182182
## Create ingress route
183183

184-
Both applications are now running on your Kubernetes cluster, however they have been configured with a service of type `ClusterIP`. As such, the applications are not accessible from the internet. To make them publicly available, create a Kubernetes ingress resource. The ingress resource configures the rules that route traffic to one of the two applications.
184+
Both applications are now running on your Kubernetes cluster, however they're configured with a service of type `ClusterIP`. As such, the applications aren't accessible from the internet. To make them publicly available, create a Kubernetes ingress resource. The ingress resource configures the rules that route traffic to one of the two applications.
185185

186186
In the following example, traffic to the address `https://demo-aks-ingress.eastus.cloudapp.azure.com/` is routed to the service named `aks-helloworld`. Traffic to the address `https://demo-aks-ingress.eastus.cloudapp.azure.com/hello-world-two` is routed to the `ingress-demo` service. Update the *hosts* and *host* to the DNS name you created in a previous step.
187187

@@ -227,7 +227,7 @@ ingress.extensions/hello-world-ingress created
227227
228228
Open a web browser to the FQDN of your Kubernetes ingress controller, such as *https://demo-aks-ingress.eastus.cloudapp.azure.com*.
229229
230-
As these examples use `letsencrypt-staging`, the issued SSL certificate is not trusted by the browser. Accept the warning prompt to continue to your application. The certificate information shows that this *Fake LE Intermediate X1* certificate is issued by Let's Encrypt. This fake certificate indicates that `cert-manager` processed the request correctly and received a certificate from the provider:
230+
As these examples use `letsencrypt-staging`, the issued SSL certificate is not trusted by the browser. Accept the warning prompt to continue to your application. The certificate information shows this *Fake LE Intermediate X1* certificate is issued by Let's Encrypt. This fake certificate indicates `cert-manager` processed the request correctly and received a certificate from the provider:
231231
232232
![Let's Encrypt staging certificate](media/ingress/staging-certificate.png)
233233

0 commit comments

Comments
 (0)