Skip to content

Commit 3fb9567

Browse files
committed
Fix markdown link formatting in BYOD GatewayAPI Tailscale post
1 parent 952370c commit 3fb9567

File tree

1 file changed

+1
-1
lines changed
  • content/post/byod-gatewayapi-tailscale

1 file changed

+1
-1
lines changed

content/post/byod-gatewayapi-tailscale/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ categories: ["Kubernetes", "Tailscale"]
88

99
While Tailscale excels at making services accessible via its managed `*.ts.net` domain names, using your own custom domain (like `hello.example.com`) for services exposed through the Tailscale Kubernetes operator requires a different approach. Tailscale itself doesn't manage DNS records or issue TLS certificates for domains it doesn't control. This guide presents a robust solution to this by integrating the Kubernetes Gateway API (specifically with Envoy Gateway) with ExternalDNS and CertManager. This combination allows you to seamlessly use your custom domains for services on your tailnet, complete with automated DNS and TLS management.
1010

11-
To showcase this, we will utilize (EnvoyGateway)[https://gateway.envoyproxy.io/docs/] in conjunction with Tailscale Operator.
11+
To showcase this, we will utilize [EnvoyGateway](https://gateway.envoyproxy.io/docs/) in conjunction with Tailscale Operator.
1212
This setup allows ExternalDNS to manage records for your custom domain in an internal DNS server, which Tailscale's MagicDNS then uses to resolve these names across your tailnet.
1313

1414
## Prerequisites

0 commit comments

Comments
 (0)