Skip to content

Commit f6a6834

Browse files
Merge pull request #231906 from sabbour/patch-2
Update web-app-routing.md
2 parents e182dac + 782a696 commit f6a6834

File tree

1 file changed

+1
-29
lines changed

1 file changed

+1
-29
lines changed

articles/aks/web-app-routing.md

Lines changed: 1 addition & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -396,7 +396,7 @@ spec:
396396

397397
### Create the ingress
398398

399-
The Web Application Routing add-on creates an Ingress class on the cluster called `webapprouting.kubernetes.azure.com `. When you create an ingress object with this class, this activates the add-on. To obtain the certificate URI to use in the Ingress from Azure Key Vault, run the following command.
399+
The Web Application Routing add-on creates an Ingress class on the cluster called `webapprouting.kubernetes.azure.com `. When you create an ingress object with this class, this activates the add-on. The `kubernetes.azure.com/use-osm-mtls: "true"` annotation on the Ingress object creates an Open Service Mesh (OSM) [IngressBackend](https://release-v1-2.docs.openservicemesh.io/docs/guides/traffic_management/ingress/#ingressbackend-api) to configure a backend service to accept ingress traffic from trusted sources. OSM issues a certificate that Nginx will use as the client certificate to proxy HTTPS connections to TLS backends. The client certificate and CA certificate are stored in a Kubernetes secret that Nginx will use to authenticate service mesh backends. For more information, see [Open Service Mesh: Ingress with Kubernetes Nginx Ingress Controller](https://release-v1-2.docs.openservicemesh.io/docs/demos/ingress_k8s_nginx/). To obtain the certificate URI to use in the Ingress from Azure Key Vault, run the following command.
400400

401401
```azurecli-interactive
402402
az keyvault certificate show --vault-name <KeyVaultName> -n <KeyVaultCertificateName> --query "id" --output tsv
@@ -441,34 +441,6 @@ spec:
441441
secretName: keyvault-aks-helloworld
442442
```
443443

444-
### Create the ingress backend
445-
446-
Open Service Mesh (OSM) uses its [IngressBackend API](https://release-v1-2.docs.openservicemesh.io/docs/guides/traffic_management/ingress/#ingressbackend-api) to configure a backend service to accept ingress traffic from trusted sources. To proxy connections to HTTPS backends, you configure the Ingress and IngressBackend configurations to use https as the backend protocol. OSM issues a certificate that Nginx will use as the client certificate to proxy HTTPS connections to TLS backends. The client certificate and CA certificate are stored in a Kubernetes secret that Nginx will use to authenticate service mesh backends. For more information, see [Open Service Mesh: Ingress with Kubernetes Nginx Ingress Controller](https://release-v1-2.docs.openservicemesh.io/docs/demos/ingress_k8s_nginx/).
447-
448-
Create a file named **ingressbackend.yaml** and copy in the following YAML.
449-
450-
```yaml
451-
apiVersion: policy.openservicemesh.io/v1alpha1
452-
kind: IngressBackend
453-
metadata:
454-
name: aks-helloworld
455-
namespace: hello-web-app-routing
456-
spec:
457-
backends:
458-
- name: aks-helloworld
459-
port:
460-
number: 80
461-
protocol: https
462-
tls:
463-
skipClientCertValidation: false
464-
sources:
465-
- kind: Service
466-
name: nginx
467-
namespace: app-routing-system
468-
- kind: AuthenticatedPrincipal
469-
name: ingress-nginx.ingress.cluster.local
470-
```
471-
472444
### Create the resources on the cluster
473445

474446
Use the [kubectl apply][kubectl-apply] command to create the resources.

0 commit comments

Comments
 (0)