From 3c343fb69d953a926e30d4a16869904ea3f02935 Mon Sep 17 00:00:00 2001 From: Jack Hickey <133868041+nginx-jack@users.noreply.github.com> Date: Tue, 28 Jan 2025 10:11:13 +0000 Subject: [PATCH] Fix image and json urls in ngf --- content/ngf/how-to/monitoring/prometheus.md | 2 +- .../traffic-management/routing-traffic-to-your-app.md | 6 +++--- .../ngf/how-to/traffic-security/integrating-cert-manager.md | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/content/ngf/how-to/monitoring/prometheus.md b/content/ngf/how-to/monitoring/prometheus.md index 3a169b54a..cc4424dd2 100644 --- a/content/ngf/how-to/monitoring/prometheus.md +++ b/content/ngf/how-to/monitoring/prometheus.md @@ -73,7 +73,7 @@ In the Grafana UI menu, go to `Connections` then `Data sources`. Add your Promet Download the following sample dashboard and Import as a new Dashboard in the Grafana UI. -- {{< download "grafana-dashboard.json" "ngf-grafana-dashboard.json" >}} +- {{< download "ngf/grafana-dashboard.json" "ngf-grafana-dashboard.json" >}} --- diff --git a/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md b/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md index 74fc6ded5..8d405485d 100644 --- a/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md +++ b/content/ngf/how-to/traffic-management/routing-traffic-to-your-app.md @@ -33,7 +33,7 @@ You can route traffic to your Kubernetes applications using the Gateway API and The application we are going to use in this guide is a simple **coffee** application comprised of one service and two pods: -{{This image shows a single 'coffee' Service connecting to two 'coffee' Pods.}} +{{This image shows a single 'coffee' Service connecting to two 'coffee' Pods.}} Using this architecture, the **coffee** application is not accessible outside the cluster. We want to expose this application on the hostname "cafe.example.com" so that clients outside the cluster can access it. @@ -108,7 +108,7 @@ service/coffee ClusterIP 198.51.100.1 80/TCP 77s To route traffic to the **coffee** application, we will create a gateway and HTTPRoute. The following diagram shows the configuration we are creating in the next step: -{{}} +{{}} We need a gateway to create an entry point for HTTP traffic coming into the cluster. The **cafe** gateway we are going to create will open an entry point to the cluster on port 80 for HTTP traffic. @@ -116,7 +116,7 @@ To route HTTP traffic from the gateway to the **coffee** service, we need to cre Once NGINX Gateway Fabric processes the **cafe** gateway and **coffee** HTTPRoute, it will configure its data plane (NGINX) to route all HTTP requests sent to "cafe.example.com" to the pods that the **coffee** service targets: -{{Traffic Flow}} +{{Traffic Flow}} The **coffee** service is omitted from the diagram above because the NGINX Gateway Fabric routes directly to the pods that the **coffee** service targets. diff --git a/content/ngf/how-to/traffic-security/integrating-cert-manager.md b/content/ngf/how-to/traffic-security/integrating-cert-manager.md index 62263f437..b9725b14c 100644 --- a/content/ngf/how-to/traffic-security/integrating-cert-manager.md +++ b/content/ngf/how-to/traffic-security/integrating-cert-manager.md @@ -32,7 +32,7 @@ Follow the steps in this guide to: ## Secure traffic using Let's Encrypt and cert-manager -{{cert-manager ACME challenge and certificate management with Gateway API}} +{{cert-manager ACME challenge and certificate management with Gateway API}} The diagram above shows a simplified representation of the cert-manager ACME challenge and certificate issuance process using Gateway API. Please note that not all of the kubernetes objects created in this process are represented in this diagram.