Skip to content

Commit 8e02e4d

Browse files
authored
Merge pull request #44002 from Amrita42/Grammarnew
corrected wrong instances of Ingress Controller
2 parents 728a069 + e068d7b commit 8e02e4d

15 files changed

+19
-19
lines changed

installing/installing_gcp/installing-gcp-user-infra-vpc.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ include::modules/installation-gcp-user-infra-adding-ingress.adoc[leveloffset=+1]
127127

128128
[id="installation-gcp-user-infra-vpc-adding-firewall-rules"]
129129
== Adding ingress firewall rules
130-
The cluster requires several firewall rules. If you do not use a shared VPC, these rules are created by the ingress controller via the GCP cloud provider. When you use a shared VPC, you can either create cluster-wide firewall rules for all services now or create each rule based on events, when the cluster requests access. By creating each rule when the cluster requests access, you know exactly which firewall rules are required. By creating cluster-wide firewall rules, you can apply the same rule set across multiple clusters.
130+
The cluster requires several firewall rules. If you do not use a shared VPC, these rules are created by the Ingress Controller via the GCP cloud provider. When you use a shared VPC, you can either create cluster-wide firewall rules for all services now or create each rule based on events, when the cluster requests access. By creating each rule when the cluster requests access, you know exactly which firewall rules are required. By creating cluster-wide firewall rules, you can apply the same rule set across multiple clusters.
131131

132132
If you choose to create each rule based on events, you must create firewall rules after you provision the cluster and during the life of the cluster when the console notifies you that rules are missing. Events that are similar to the following event are displayed, and you must add the firewall rules that are required:
133133

modules/ingress-operator.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,9 +46,9 @@ The Ingress Operator sets up the router in the `openshift-ingress` project and c
4646
$ oc get deployment -n openshift-ingress
4747
----
4848

49-
The Ingress Operator uses the `clusterNetwork[].cidr` from the `network/cluster` status to determine what mode (IPv4, IPv6, or dual stack) the managed ingress controller (router) should operate in. For example, if `clusterNetwork` contains only a v6 `cidr`, then the ingress controller operate in IPv6-only mode.
49+
The Ingress Operator uses the `clusterNetwork[].cidr` from the `network/cluster` status to determine what mode (IPv4, IPv6, or dual stack) the managed Ingress Controller (router) should operate in. For example, if `clusterNetwork` contains only a v6 `cidr`, then the Ingress Controller operates in IPv6-only mode.
5050

51-
In the following example, ingress controllers managed by the Ingress Operator will run in IPv4-only mode because only one cluster network exists and the network is an IPv4 `cidr`:
51+
In the following example, Ingress Controllers managed by the Ingress Operator will run in IPv4-only mode because only one cluster network exists and the network is an IPv4 `cidr`:
5252

5353
[source,terminal]
5454
----

modules/migration-setting-up-target-cluster-to-accept-source-dns-domain.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ In addition, when you migrate the application, another route is created in the t
2626

2727
. Create a DNS record with your DNS provider that points the application's FQDN in the source cluster to the IP address of the default load balancer of the target cluster. This will redirect traffic away from your source cluster to your target cluster.
2828
+
29-
The FQDN of the application resolves to the load balancer of the target cluster. The default ingress controller router accept requests for that FQDN because a route for that hostname is exposed.
29+
The FQDN of the application resolves to the load balancer of the target cluster. The default Ingress Controller router accept requests for that FQDN because a route for that hostname is exposed.
3030

3131
For secure HTTPS access, perform the following additional step:
3232

33-
. Replace the x509 certificate of the default ingress controller created during the installation process with a custom certificate.
33+
. Replace the x509 certificate of the default Ingress Controller created during the installation process with a custom certificate.
3434
. Configure this certificate to include the wildcard DNS domains for both the source and target clusters in the `subjectAltName` field.
3535
+
3636
The new certificate is valid for securing connections made using either DNS domain.

modules/nw-ingress-controller-configuration-parameters.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ The Ingress Operator converts the TLS `1.0` of an `Old` or `Custom` profile to `
115115
`clientTLS` has the required subfields, `spec.clientTLS.clientCertificatePolicy` and `spec.clientTLS.ClientCA`.
116116

117117
The `ClientCertificatePolicy` subfield accepts one of the two values: `Required` or `Optional`. The `ClientCA` subfield specifies a config map that is in the openshift-config namespace. The config map should contain a CA certificate bundle.
118-
The `AllowedSubjectPatterns` is an optional value that specifies a list of regular expressions, which are matched against the distinguished name on a valid client certificate to filter requests. The regular expressions must use PCRE syntax. At least one pattern must match a client certificate's distinguished name; otherwise, the ingress controller rejects the certificate and denies the connection. If not specified, the ingress controller does not reject certificates based on the distinguished name.
118+
The `AllowedSubjectPatterns` is an optional value that specifies a list of regular expressions, which are matched against the distinguished name on a valid client certificate to filter requests. The regular expressions must use PCRE syntax. At least one pattern must match a client certificate's distinguished name; otherwise, the Ingress Controller rejects the certificate and denies the connection. If not specified, the Ingress Controller does not reject certificates based on the distinguished name.
119119

120120
|`routeAdmission`
121121
|`routeAdmission` defines a policy for handling new route claims, such as allowing or denying claims across namespaces.
@@ -150,7 +150,7 @@ The `AllowedSubjectPatterns` is an optional value that specifies a list of regul
150150
|`httpHeaders`
151151
|`httpHeaders` defines the policy for HTTP headers.
152152

153-
By setting the `forwardedHeaderPolicy` for the `IngressControllerHTTPHeaders`, you specify when and how the Ingress controller sets the `Forwarded`, `X-Forwarded-For`, `X-Forwarded-Host`, `X-Forwarded-Port`, `X-Forwarded-Proto`, and `X-Forwarded-Proto-Version` HTTP headers.
153+
By setting the `forwardedHeaderPolicy` for the `IngressControllerHTTPHeaders`, you specify when and how the Ingress Controller sets the `Forwarded`, `X-Forwarded-For`, `X-Forwarded-Host`, `X-Forwarded-Port`, `X-Forwarded-Proto`, and `X-Forwarded-Proto-Version` HTTP headers.
154154

155155
By default, the policy is set to `Append`.
156156

modules/nw-ingress-controller-endpoint-publishing-strategies.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,4 +32,4 @@ For more information, see the link:https://kubernetes.io/docs/concepts/services-
3232

3333
The `HostNetwork` endpoint publishing strategy publishes the Ingress Controller on node ports where the Ingress Controller is deployed.
3434

35-
An Ingress controller with the `HostNetwork` endpoint publishing strategy can have only one pod replica per node. If you want _n_ replicas, you must use at least _n_ nodes where those replicas can be scheduled. Because each pod replica requests ports `80` and `443` on the node host where it is scheduled, a replica cannot be scheduled to a node if another pod on the same node is using those ports.
35+
An Ingress Controller with the `HostNetwork` endpoint publishing strategy can have only one pod replica per node. If you want _n_ replicas, you must use at least _n_ nodes where those replicas can be scheduled. Because each pod replica requests ports `80` and `443` on the node host where it is scheduled, a replica cannot be scheduled to a node if another pod on the same node is using those ports.

modules/nw-ingress-controller-tls-profiles.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
// * ingress/configure-ingress-operator.adoc
44

55
[id="nw-ingress-controller-tls-profiles_{context}"]
6-
= Ingress controller TLS profiles
6+
= Ingress Controller TLS profiles
77

88
The `tlsSecurityProfile` parameter defines the schema for a TLS security profile. This object is used by operators to apply TLS security settings to operands.
99

modules/nw-ne-ways-to-manage-ingress-traffic.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
// * networking/understanding-networking.adoc
44

55
[id="nw-ne-ways-to-manage-ingress-traffic_{context}"]
6-
= Ways to manage ingress controller traffic
6+
= Ways to manage Ingress Controller traffic
77
The following table provides an overview of ways that administrators can manage their Ingress traffic:
88
[cols="1,2",options="header"]
99
|===

modules/nw-using-ingress-and-routes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The administrator can create a wildcard DNS entry and then set up an Ingress
2323
Controller. Then, you can work with the edge Ingress Controller without
2424
having to contact the administrators.
2525

26-
By default, every ingress controller in the cluster can admit any route created in any project in the cluster.
26+
By default, every Ingress Controller in the cluster can admit any route created in any project in the cluster.
2727

2828
The Ingress Controller:
2929

modules/ossm-architecture.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The data plane is implemented in such a way that it intercepts all inbound (ingr
2020

2121
** *Gateways* are proxies operating as load balancers receiving incoming or outgoing HTTP/TCP connections. Gateway configurations are applied to standalone Envoy proxies that are running at the edge of the mesh, rather than sidecar Envoy proxies running alongside your service workloads. You use a Gateway to manage inbound and outbound traffic for your mesh, letting you specify which traffic you want to enter or leave the mesh.
2222

23-
*** *Ingress-gateway* - Also known as an ingress controller, the Ingress Gateway is a dedicated Envoy proxy that receives and controls traffic entering the service mesh. An Ingress Gateway allows features such as monitoring and route rules to be applied to traffic entering the cluster.
23+
*** *Ingress-gateway* - Also known as an Ingress Controller, the Ingress Gateway is a dedicated Envoy proxy that receives and controls traffic entering the service mesh. An Ingress Gateway allows features such as monitoring and route rules to be applied to traffic entering the cluster.
2424

2525
*** *Egress-gateway* - Also known as an egress controller, the Egress Gateway is a dedicated Envoy proxy that manages traffic leaving the service mesh. An Egress Gateway allows features such as monitoring and route rules to be applied to traffic exiting the mesh.
2626

modules/security-network-policies.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,5 +7,5 @@
77

88
Using _network policies_, you can isolate pods from each other in the same project.
99
Network policies can deny all network access to a pod,
10-
only allow connections for the ingress controller, reject connections from
10+
only allow connections for the Ingress Controller, reject connections from
1111
pods in other projects, or set similar rules for how networks behave.

0 commit comments

Comments
 (0)