Skip to content

Commit e3969ad

Browse files
authored
Merge pull request #96409 from jakaruna-MSFT/patch-49
(AzureCXP) resolves MicrosoftDocs/azure-docs#42715
2 parents 256a7dd + f45688e commit e3969ad

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/aks/ingress-static-ip.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ kubectl apply --validate=false -f https://raw.githubusercontent.com/jetstack/cer
123123
kubectl create namespace cert-manager
124124

125125
# Label the cert-manager namespace to disable resource validation
126-
kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true
126+
kubectl label namespace cert-manager cert-manager.io/disable-validation=true
127127

128128
# Add the Jetstack Helm repository
129129
helm repo add jetstack https://charts.jetstack.io
@@ -148,7 +148,7 @@ Before certificates can be issued, cert-manager requires an [Issuer][cert-manage
148148
Create a cluster issuer, such as `cluster-issuer.yaml`, using the following example manifest. Update the email address with a valid address from your organization:
149149

150150
```yaml
151-
apiVersion: certmanager.k8s.io/v1alpha1
151+
apiVersion: cert-manager.io/v1alpha2
152152
kind: ClusterIssuer
153153
metadata:
154154
name: letsencrypt-staging
@@ -167,7 +167,7 @@ To create the issuer, use the `kubectl apply -f cluster-issuer.yaml` command.
167167
```
168168
$ kubectl apply -f cluster-issuer.yaml
169169

170-
clusterissuer.certmanager.k8s.io/letsencrypt-staging created
170+
clusterissuer.cert-manager.io/letsencrypt-staging created
171171
```
172172
173173
## Run demo applications
@@ -211,7 +211,7 @@ metadata:
211211
namespace: ingress-basic
212212
annotations:
213213
kubernetes.io/ingress.class: nginx
214-
certmanager.k8s.io/cluster-issuer: letsencrypt-staging
214+
cert-manager.io/cluster-issuer: letsencrypt-staging
215215
nginx.ingress.kubernetes.io/rewrite-target: /$1
216216
spec:
217217
tls:
@@ -262,7 +262,7 @@ Type Reason Age From Message
262262
If you need to create an additional certificate resource, you can do so with the following example manifest. Update the *dnsNames* and *domains* to the DNS name you created in a previous step. If you use an internal-only ingress controller, specify the internal DNS name for your service.
263263
264264
```yaml
265-
apiVersion: certmanager.k8s.io/v1alpha1
265+
apiVersion: cert-manager.io/v1alpha2
266266
kind: Certificate
267267
metadata:
268268
name: tls-secret
@@ -287,7 +287,7 @@ To create the certificate resource, use the `kubectl apply -f certificates.yaml`
287287
```
288288
$ kubectl apply -f certificates.yaml
289289
290-
certificate.certmanager.k8s.io/tls-secret created
290+
certificate.cert-manager.io/tls-secret created
291291
```
292292

293293
## Test the ingress configuration

0 commit comments

Comments
 (0)