Skip to content

Commit a8fd109

Browse files
committed
minor fixes
1 parent 7532208 commit a8fd109

File tree

15 files changed

+165
-150
lines changed

15 files changed

+165
-150
lines changed

pages/public_cloud/containers_orchestration/managed_kubernetes/getting-source-ip-behind-loadbalancer/guide.de-de.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ In this tutorial we are using the most basic Ingress Controller: [NGINX Ingress
3939
We can deploy the official **NGINX Ingress Controller** with the manifest file or with the Helm chart.
4040
Please choose one way or the other and follow the corresponding paragraph.
4141

42-
#### 1. Installing with the manifest file
42+
#### Installing with the manifest file
4343

4444
```bash
4545
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/master/deploy/static/provider/cloud/deploy.yaml
@@ -69,7 +69,7 @@ rolebinding.rbac.authorization.k8s.io/ingress-nginx-admission created
6969
serviceaccount/ingress-nginx-admission created
7070
```
7171

72-
#### 2. Installing with the Helm chart
72+
#### Installing with the Helm chart
7373

7474
```bash
7575
helm install ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx --create-namespace
@@ -127,7 +127,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
127127
type: kubernetes.io/tls
128128
```
129129

130-
#### 3. Check your deployment
130+
#### Check your deployment
131131

132132
You can use `kubectl` to get the state of the service and recover the Load Balancer's IP:
133133

@@ -153,7 +153,7 @@ Now you need to patch the Ingress controller to support the proxy protocol.
153153
> [!warning]
154154
> Depends on your Kubernetes cluster is working with private network or not, the proxy protocol configuration differs. Follow the tutorial parts according to your setup.
155155
156-
#### 1a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
156+
#### a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
157157

158158
```bash
159159
kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metadata.annotations.lb\.k8s\.ovh\.net/egress-ips}"
@@ -166,7 +166,7 @@ $ kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metad
166166
aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32
167167
```
168168

169-
#### 1b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
169+
#### b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
170170

171171
When your Managed Kubernetes cluster is attached to a vRack, load balancers will take two random IP addresses each. **Your egress IP list is your subnet range**.
172172

@@ -176,7 +176,7 @@ For the rest of this documentation, we consider our subnet uses the `10.0.0.0/20
176176

177177
We can update the NGINX Ingress Controller configuration with manifest files or with Helm. Please choose one way or the other and follow the corresponding paragraph.
178178

179-
#### 2. Patching with manifest files
179+
#### Patching with manifest files
180180

181181
Copy the next YAML snippet in a `patch-ingress-controller-service.yml` file:
182182

@@ -236,7 +236,7 @@ $ kubectl -n ingress-nginx patch configmap ingress-nginx-controller -p "$(cat p
236236
configmap/ ingress-nginx-controller patched
237237
```
238238

239-
#### 3. Patching with Helm
239+
#### Patching with Helm
240240

241241
Copy the next YAML snippet in a `values.yaml` file and modify the `proxy-real-ip-cidr` parameter according to your cluster configuration:
242242

@@ -257,7 +257,7 @@ controller:
257257
proxy-real-ip-cidr: "aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32"
258258
```
259259

260-
#### a. [PRIVATE NETWORK ONLY]
260+
#### b. [PRIVATE NETWORK ONLY]
261261

262262
```yaml
263263
controller:
@@ -285,6 +285,7 @@ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f value
285285
```
286286

287287
You should see your Helm release being upgraded:
288+
288289
```console
289290
$ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f values.yaml
290291
Release "ingress-nginx" has been upgraded. Happy Helming!
@@ -332,7 +333,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
332333
type: kubernetes.io/tls
333334
```
334335

335-
### 4. Testing
336+
### 3. Testing
336337

337338
> [!warning]
338339
> Due to DNS propagation the actual resolving of your Load Balancer FQDN can take an additional 2-5 minutes to be fully usable. In the meantime, you can use the included IP to access the load balancer.
@@ -481,4 +482,4 @@ The precedent method should work in a similar way for any Ingress Controller. We
481482

482483
- If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for assisting you on your specific use case of your project.
483484

484-
- Join our community of users on <https://community.ovh.com/en/>.
485+
Join our [community of users](/links/community).

pages/public_cloud/containers_orchestration/managed_kubernetes/getting-source-ip-behind-loadbalancer/guide.en-asia.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ In this tutorial we are using the most basic Ingress Controller: [NGINX Ingress
3939
We can deploy the official **NGINX Ingress Controller** with the manifest file or with the Helm chart.
4040
Please choose one way or the other and follow the corresponding paragraph.
4141

42-
#### 1. Installing with the manifest file
42+
#### Installing with the manifest file
4343

4444
```bash
4545
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/master/deploy/static/provider/cloud/deploy.yaml
@@ -69,7 +69,7 @@ rolebinding.rbac.authorization.k8s.io/ingress-nginx-admission created
6969
serviceaccount/ingress-nginx-admission created
7070
```
7171

72-
#### 2. Installing with the Helm chart
72+
#### Installing with the Helm chart
7373

7474
```bash
7575
helm install ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx --create-namespace
@@ -127,7 +127,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
127127
type: kubernetes.io/tls
128128
```
129129

130-
#### 3. Check your deployment
130+
#### Check your deployment
131131

132132
You can use `kubectl` to get the state of the service and recover the Load Balancer's IP:
133133

@@ -153,7 +153,7 @@ Now you need to patch the Ingress controller to support the proxy protocol.
153153
> [!warning]
154154
> Depends on your Kubernetes cluster is working with private network or not, the proxy protocol configuration differs. Follow the tutorial parts according to your setup.
155155
156-
#### 1a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
156+
#### a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
157157

158158
```bash
159159
kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metadata.annotations.lb\.k8s\.ovh\.net/egress-ips}"
@@ -166,7 +166,7 @@ $ kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metad
166166
aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32
167167
```
168168

169-
#### 1b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
169+
#### b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
170170

171171
When your Managed Kubernetes cluster is attached to a vRack, load balancers will take two random IP addresses each. **Your egress IP list is your subnet range**.
172172

@@ -176,7 +176,7 @@ For the rest of this documentation, we consider our subnet uses the `10.0.0.0/20
176176

177177
We can update the NGINX Ingress Controller configuration with manifest files or with Helm. Please choose one way or the other and follow the corresponding paragraph.
178178

179-
#### 2. Patching with manifest files
179+
#### Patching with manifest files
180180

181181
Copy the next YAML snippet in a `patch-ingress-controller-service.yml` file:
182182

@@ -236,7 +236,7 @@ $ kubectl -n ingress-nginx patch configmap ingress-nginx-controller -p "$(cat p
236236
configmap/ ingress-nginx-controller patched
237237
```
238238

239-
#### 3. Patching with Helm
239+
#### Patching with Helm
240240

241241
Copy the next YAML snippet in a `values.yaml` file and modify the `proxy-real-ip-cidr` parameter according to your cluster configuration:
242242

@@ -257,7 +257,7 @@ controller:
257257
proxy-real-ip-cidr: "aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32"
258258
```
259259

260-
#### a. [PRIVATE NETWORK ONLY]
260+
#### b. [PRIVATE NETWORK ONLY]
261261

262262
```yaml
263263
controller:
@@ -285,6 +285,7 @@ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f value
285285
```
286286

287287
You should see your Helm release being upgraded:
288+
288289
```console
289290
$ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f values.yaml
290291
Release "ingress-nginx" has been upgraded. Happy Helming!
@@ -332,7 +333,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
332333
type: kubernetes.io/tls
333334
```
334335

335-
### 4. Testing
336+
### 3. Testing
336337

337338
> [!warning]
338339
> Due to DNS propagation the actual resolving of your Load Balancer FQDN can take an additional 2-5 minutes to be fully usable. In the meantime, you can use the included IP to access the load balancer.
@@ -481,4 +482,4 @@ The precedent method should work in a similar way for any Ingress Controller. We
481482

482483
- If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for assisting you on your specific use case of your project.
483484

484-
- Join our community of users on <https://community.ovh.com/en/>.
485+
Join our [community of users](/links/community).

pages/public_cloud/containers_orchestration/managed_kubernetes/getting-source-ip-behind-loadbalancer/guide.en-au.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ In this tutorial we are using the most basic Ingress Controller: [NGINX Ingress
3939
We can deploy the official **NGINX Ingress Controller** with the manifest file or with the Helm chart.
4040
Please choose one way or the other and follow the corresponding paragraph.
4141

42-
#### 1. Installing with the manifest file
42+
#### Installing with the manifest file
4343

4444
```bash
4545
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/master/deploy/static/provider/cloud/deploy.yaml
@@ -69,7 +69,7 @@ rolebinding.rbac.authorization.k8s.io/ingress-nginx-admission created
6969
serviceaccount/ingress-nginx-admission created
7070
```
7171

72-
#### 2. Installing with the Helm chart
72+
#### Installing with the Helm chart
7373

7474
```bash
7575
helm install ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx --create-namespace
@@ -127,7 +127,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
127127
type: kubernetes.io/tls
128128
```
129129

130-
#### 3. Check your deployment
130+
#### Check your deployment
131131

132132
You can use `kubectl` to get the state of the service and recover the Load Balancer's IP:
133133

@@ -153,7 +153,7 @@ Now you need to patch the Ingress controller to support the proxy protocol.
153153
> [!warning]
154154
> Depends on your Kubernetes cluster is working with private network or not, the proxy protocol configuration differs. Follow the tutorial parts according to your setup.
155155
156-
#### 1a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
156+
#### a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
157157

158158
```bash
159159
kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metadata.annotations.lb\.k8s\.ovh\.net/egress-ips}"
@@ -166,7 +166,7 @@ $ kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metad
166166
aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32
167167
```
168168

169-
#### 1b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
169+
#### b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
170170

171171
When your Managed Kubernetes cluster is attached to a vRack, load balancers will take two random IP addresses each. **Your egress IP list is your subnet range**.
172172

@@ -176,7 +176,7 @@ For the rest of this documentation, we consider our subnet uses the `10.0.0.0/20
176176

177177
We can update the NGINX Ingress Controller configuration with manifest files or with Helm. Please choose one way or the other and follow the corresponding paragraph.
178178

179-
#### 2. Patching with manifest files
179+
#### Patching with manifest files
180180

181181
Copy the next YAML snippet in a `patch-ingress-controller-service.yml` file:
182182

@@ -236,7 +236,7 @@ $ kubectl -n ingress-nginx patch configmap ingress-nginx-controller -p "$(cat p
236236
configmap/ ingress-nginx-controller patched
237237
```
238238

239-
#### 3. Patching with Helm
239+
#### Patching with Helm
240240

241241
Copy the next YAML snippet in a `values.yaml` file and modify the `proxy-real-ip-cidr` parameter according to your cluster configuration:
242242

@@ -257,7 +257,7 @@ controller:
257257
proxy-real-ip-cidr: "aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32"
258258
```
259259

260-
#### a. [PRIVATE NETWORK ONLY]
260+
#### b. [PRIVATE NETWORK ONLY]
261261

262262
```yaml
263263
controller:
@@ -285,6 +285,7 @@ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f value
285285
```
286286

287287
You should see your Helm release being upgraded:
288+
288289
```console
289290
$ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f values.yaml
290291
Release "ingress-nginx" has been upgraded. Happy Helming!
@@ -332,7 +333,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
332333
type: kubernetes.io/tls
333334
```
334335

335-
### 4. Testing
336+
### 3. Testing
336337

337338
> [!warning]
338339
> Due to DNS propagation the actual resolving of your Load Balancer FQDN can take an additional 2-5 minutes to be fully usable. In the meantime, you can use the included IP to access the load balancer.
@@ -481,4 +482,4 @@ The precedent method should work in a similar way for any Ingress Controller. We
481482

482483
- If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for assisting you on your specific use case of your project.
483484

484-
- Join our community of users on <https://community.ovh.com/en/>.
485+
Join our [community of users](/links/community).

pages/public_cloud/containers_orchestration/managed_kubernetes/getting-source-ip-behind-loadbalancer/guide.en-ca.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ In this tutorial we are using the most basic Ingress Controller: [NGINX Ingress
3939
We can deploy the official **NGINX Ingress Controller** with the manifest file or with the Helm chart.
4040
Please choose one way or the other and follow the corresponding paragraph.
4141

42-
#### 1. Installing with the manifest file
42+
#### Installing with the manifest file
4343

4444
```bash
4545
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/master/deploy/static/provider/cloud/deploy.yaml
@@ -69,7 +69,7 @@ rolebinding.rbac.authorization.k8s.io/ingress-nginx-admission created
6969
serviceaccount/ingress-nginx-admission created
7070
```
7171

72-
#### 2. Installing with the Helm chart
72+
#### Installing with the Helm chart
7373

7474
```bash
7575
helm install ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx --create-namespace
@@ -127,7 +127,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
127127
type: kubernetes.io/tls
128128
```
129129

130-
#### 3. Check your deployment
130+
#### Check your deployment
131131

132132
You can use `kubectl` to get the state of the service and recover the Load Balancer's IP:
133133

@@ -153,7 +153,7 @@ Now you need to patch the Ingress controller to support the proxy protocol.
153153
> [!warning]
154154
> Depends on your Kubernetes cluster is working with private network or not, the proxy protocol configuration differs. Follow the tutorial parts according to your setup.
155155
156-
#### 1a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
156+
#### a. [PUBLIC NETWORK ONLY] Get the list of the egress load balancer IPs
157157

158158
```bash
159159
kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metadata.annotations.lb\.k8s\.ovh\.net/egress-ips}"
@@ -166,7 +166,7 @@ $ kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath="{.metad
166166
aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32
167167
```
168168

169-
#### 1b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
169+
#### b. [PRIVATE NETWORK ONLY] Get the list of the egress load balancer IPs
170170

171171
When your Managed Kubernetes cluster is attached to a vRack, load balancers will take two random IP addresses each. **Your egress IP list is your subnet range**.
172172

@@ -176,7 +176,7 @@ For the rest of this documentation, we consider our subnet uses the `10.0.0.0/20
176176

177177
We can update the NGINX Ingress Controller configuration with manifest files or with Helm. Please choose one way or the other and follow the corresponding paragraph.
178178

179-
#### 2. Patching with manifest files
179+
#### Patching with manifest files
180180

181181
Copy the next YAML snippet in a `patch-ingress-controller-service.yml` file:
182182

@@ -236,7 +236,7 @@ $ kubectl -n ingress-nginx patch configmap ingress-nginx-controller -p "$(cat p
236236
configmap/ ingress-nginx-controller patched
237237
```
238238

239-
#### 3. Patching with Helm
239+
#### Patching with Helm
240240

241241
Copy the next YAML snippet in a `values.yaml` file and modify the `proxy-real-ip-cidr` parameter according to your cluster configuration:
242242

@@ -257,7 +257,7 @@ controller:
257257
proxy-real-ip-cidr: "aaa.aaa.aaa.aaa/32,bbb.bbb.bbb.bbb/32,ccc.ccc.ccc.ccc/32,ddd.ddd.ddd.ddd/32"
258258
```
259259

260-
#### a. [PRIVATE NETWORK ONLY]
260+
#### b. [PRIVATE NETWORK ONLY]
261261

262262
```yaml
263263
controller:
@@ -285,6 +285,7 @@ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f value
285285
```
286286

287287
You should see your Helm release being upgraded:
288+
288289
```console
289290
$ helm upgrade ingress-nginx ingress-nginx/ingress-nginx -n ingress-nginx -f values.yaml
290291
Release "ingress-nginx" has been upgraded. Happy Helming!
@@ -332,7 +333,7 @@ If TLS is enabled for the Ingress, a Secret containing the certificate and key m
332333
type: kubernetes.io/tls
333334
```
334335

335-
### 4. Testing
336+
### 3. Testing
336337

337338
> [!warning]
338339
> Due to DNS propagation the actual resolving of your Load Balancer FQDN can take an additional 2-5 minutes to be fully usable. In the meantime, you can use the included IP to access the load balancer.
@@ -481,4 +482,4 @@ The precedent method should work in a similar way for any Ingress Controller. We
481482

482483
- If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for assisting you on your specific use case of your project.
483484

484-
- Join our community of users on <https://community.ovh.com/en/>.
485+
Join our [community of users](/links/community).

0 commit comments

Comments
 (0)