Skip to content

Commit a3d492d

Browse files
authored
Update website/blog/2025-02-28-afd-aks-ingress-tls-approuting/index.md
1 parent 2790518 commit a3d492d

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

  • website/blog/2025-02-28-afd-aks-ingress-tls-approuting

website/blog/2025-02-28-afd-aks-ingress-tls-approuting/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -227,7 +227,7 @@ Now we can deploy the ingress definition. Look out for the following:
227227

228228
1. The 'tls-cert-keyvault-uri' annotation maps the inbound TLS request to the appropriate certificate secret
229229
2. The 'rules' section maps the target host name to the backend service that should be targeted
230-
3. The 'tls' section will include the target host name and its mapping to the correct certificate, which is the static value 'keyvault-' followed by the ingress name (i.e. keyvault-aks-helloworld in our case), as documented in the [App Routing TLS Docs](https://learn.microsoft.com/en-us/azure/aks/app-routing-dns-ssl#create-an-ingress-class-that-uses-a-host-name-and-a-certificate-from-azure-key-vault).
230+
3. The 'tls' section will include the target host name and its mapping to the correct certificate, which is the static value 'keyvault-' followed by the ingress name (i.e. keyvault-aks-helloworld in our case), as documented in the [App Routing TLS Docs](https://learn.microsoft.com/azure/aks/app-routing-dns-ssl#create-an-ingress-class-that-uses-a-host-name-and-a-certificate-from-azure-key-vault).
231231

232232
```bash
233233
# Get the URI of the certificate

0 commit comments

Comments
 (0)