From 3c343fb69d953a926e30d4a16869904ea3f02935 Mon Sep 17 00:00:00 2001
From: Jack Hickey <133868041+nginx-jack@users.noreply.github.com>
Date: Tue, 28 Jan 2025 10:11:13 +0000
Subject: [PATCH] Fix image and json urls in ngf
---
content/ngf/how-to/monitoring/prometheus.md | 2 +-
.../traffic-management/routing-traffic-to-your-app.md | 6 +++---
.../ngf/how-to/traffic-security/integrating-cert-manager.md | 2 +-
3 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/content/ngf/how-to/monitoring/prometheus.md b/content/ngf/how-to/monitoring/prometheus.md
index 3a169b54a..cc4424dd2 100644
--- a/content/ngf/how-to/monitoring/prometheus.md
+++ b/content/ngf/how-to/monitoring/prometheus.md
@@ -73,7 +73,7 @@ In the Grafana UI menu, go to `Connections` then `Data sources`. Add your Promet
Download the following sample dashboard and Import as a new Dashboard in the Grafana UI.
-- {{< download "grafana-dashboard.json" "ngf-grafana-dashboard.json" >}}
+- {{< download "ngf/grafana-dashboard.json" "ngf-grafana-dashboard.json" >}}
---
diff --git a/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md b/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md
index 74fc6ded5..8d405485d 100644
--- a/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md
+++ b/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md
@@ -33,7 +33,7 @@ You can route traffic to your Kubernetes applications using the Gateway API and
The application we are going to use in this guide is a simple **coffee** application comprised of one service and two pods:
-{{
}}
+{{
}}
Using this architecture, the **coffee** application is not accessible outside the cluster. We want to expose this application on the hostname "cafe.example.com" so that clients outside the cluster can access it.
@@ -108,7 +108,7 @@ service/coffee ClusterIP 198.51.100.1 80/TCP 77s
To route traffic to the **coffee** application, we will create a gateway and HTTPRoute. The following diagram shows the configuration we are creating in the next step:
-{{
}}
+{{
}}
We need a gateway to create an entry point for HTTP traffic coming into the cluster. The **cafe** gateway we are going to create will open an entry point to the cluster on port 80 for HTTP traffic.
@@ -116,7 +116,7 @@ To route HTTP traffic from the gateway to the **coffee** service, we need to cre
Once NGINX Gateway Fabric processes the **cafe** gateway and **coffee** HTTPRoute, it will configure its data plane (NGINX) to route all HTTP requests sent to "cafe.example.com" to the pods that the **coffee** service targets:
-{{
}}
+{{
}}
The **coffee** service is omitted from the diagram above because the NGINX Gateway Fabric routes directly to the pods that the **coffee** service targets.
diff --git a/content/ngf/how-to/traffic-security/integrating-cert-manager.md b/content/ngf/how-to/traffic-security/integrating-cert-manager.md
index 62263f437..b9725b14c 100644
--- a/content/ngf/how-to/traffic-security/integrating-cert-manager.md
+++ b/content/ngf/how-to/traffic-security/integrating-cert-manager.md
@@ -32,7 +32,7 @@ Follow the steps in this guide to:
## Secure traffic using Let's Encrypt and cert-manager
-{{
}}
+{{
}}
The diagram above shows a simplified representation of the cert-manager ACME challenge and certificate issuance process using Gateway API. Please note that not all of the kubernetes objects created in this process are represented in this diagram.