Skip to content

Commit e9264cd

Browse files
authored
Merge pull request #44580 from ahardin-rh/issue-44450
Issue#44450, clarifying ingress usage
2 parents e531020 + f014a88 commit e9264cd

File tree

1 file changed

+5
-8
lines changed

1 file changed

+5
-8
lines changed

modules/nw-ingress-creating-a-route-via-an-ingress.adoc

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,7 @@
66
[id="nw-ingress-creating-a-route-via-an-ingress_{context}"]
77
= Creating a route through an Ingress object
88

9-
Some ecosystem components have an integration with Ingress resources but not with
10-
route resources. To cover this case, {product-title} automatically creates
11-
managed route objects when an Ingress object is created. These route objects are deleted
12-
when the corresponding Ingress objects are deleted.
9+
Some ecosystem components have an integration with `Ingress` resources but not with `Route` resources. To cover this case, {product-title} automatically creates managed route objects when an Ingress object is created. These route objects are deleted when the corresponding `Ingress` objects are deleted.
1310

1411
.Procedure
1512

@@ -26,7 +23,7 @@ metadata:
2623
route.openshift.io/termination: "reencrypt" <1>
2724
spec:
2825
rules:
29-
- host: www.example.com
26+
- host: www.example.com <2>
3027
http:
3128
paths:
3229
- backend:
@@ -42,9 +39,9 @@ spec:
4239
secretName: example-com-tls-certificate
4340
----
4441
+
45-
<1> The `route.openshift.io/termination` annotation can be used to configure the `spec.tls.termination` field of the `Route`
46-
as `Ingress` has no field for this. The accepted values are `edge`, `passthrough` and `reencrypt`. All
47-
other values are silently ignored. When the annotation value is unset, `edge` is the default route. The TLS certificate details must be defined in the template file to implement the default edge route.
42+
<1> The `route.openshift.io/termination` annotation can be used to configure the `spec.tls.termination` field of the `Route` as `Ingress` has no field for this. The accepted values are `edge`, `passthrough` and `reencrypt`. All other values are silently ignored. When the annotation value is unset, `edge` is the default route. The TLS certificate details must be defined in the template file to implement the default edge route and to prevent producing an insecure route.
43+
<2> When working with an `Ingress` object, you must specify an explicit host name, unlike when working with routes. You can use the `<host_name>.<cluster_ingress_domain>` syntax, for example `apps.openshiftdemos.com`, to take advantage of the `*.<cluster_ingress_domain>` wildcard DNS record and serving certificate for the cluster. Otherwise, you must ensure that there is a DNS record for the chosen hostname.
44+
4845

4946
.. If you specify the `passthrough` value in the `route.openshift.io/termination` annotation, set `path` to `''` and `pathType` to `ImplementationSpecific` in the spec:
5047
+

0 commit comments

Comments
 (0)