Skip to content

Commit f4cc36d

Browse files
committed
edits
1 parent fa7e10d commit f4cc36d

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/api-management/api-management-kubernetes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Use API Management with Microservices Deployed in AKS | Microsoft Docs
3-
description: Learn about using Azure API Management to publish microservices-based architectures that are deployed in AKS as APIs.
3+
description: Learn about options for using Azure API Management to publish microservices-based architectures that are deployed in AKS as APIs.
44
services: api-management
55
author: dlepow
66
manager: cfowler
@@ -61,7 +61,7 @@ Pros:
6161

6262
Cons:
6363
* Creates potential security risk because of public visibility of endpoints
64-
* Does not create a single entry point for inbound cluster traffic
64+
* Doesn't create a single entry point for inbound cluster traffic
6565
* Complicates microservices with duplicate authentication logic
6666

6767
### Option 2: Install an ingress controller
@@ -73,7 +73,7 @@ Mutual TLS authentication is [natively supported](./api-management-howto-mutual-
7373
:::image type="content" source="./media/api-management-aks/ingress-controller.png" alt-text="Diagram that shows an architecture for publishing via an ingress controller." border="false" lightbox="./media/api-management-aks/ingress-controller.png":::
7474

7575
Pros:
76-
* Enables easy configuration on the API Management side because API Managment doesn't need to be injected into the cluster virtual network and mTLS is natively supported
76+
* Enables easy configuration on the API Management side because API Management doesn't need to be injected into the cluster virtual network and mTLS is natively supported
7777
* Centralizes protection for inbound cluster traffic at the ingress controller layer
7878
* Reduces security risk by minimizing publicly visible cluster endpoints
7979

@@ -91,7 +91,7 @@ In some cases, customers that have regulatory constraints or strict security req
9191

9292
There are two modes of [deploying API Management into a virtual network](./virtual-network-concepts.md): external and internal.
9393

94-
If API consumers don't reside in the cluster virtual network, you should use the external mode. (See the following diagram.) In this mode, the API Management gateway is injected into the cluster virtual network but accessible from the public internet via an external load balancer. This architecure helps to hide the cluster completely while still allowing external clients to consume the microservices. Additionally, you can use Azure networking capabilities like Network Security Groups (NSG) to restrict network traffic.
94+
If API consumers don't reside in the cluster virtual network, you should use the external mode. (See the following diagram.) In this mode, the API Management gateway is injected into the cluster virtual network but accessible from the public internet via an external load balancer. This architecture helps to hide the cluster completely while still allowing external clients to consume the microservices. Additionally, you can use Azure networking capabilities like Network Security Groups (NSG) to restrict network traffic.
9595

9696
:::image type="content" source="./media/api-management-aks/vnet-external.png" alt-text="Diagram that shows an architecture that uses external virtual network mode." border="false" lightbox="./media/api-management-aks/vnet-external.png":::
9797

0 commit comments

Comments
 (0)