You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: site/content/how-to/traffic-management/tls-passthrough.md
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ In this guide, we will show how to configure TLS passthrough for your applicatio
21
21
GW_TLS_PORT=<port number>
22
22
```
23
23
24
-
{{< note >}}In a production environment, you should have a DNS record for the external IP address that is exposed, and it should refer to the hostname that the gateway will forward for.{{< /note >}}
24
+
{{< note >}}In a production environment, you should have a DNS record for the external IP address that is exposed, and it should refer to the hostname that the Gateway will forward for.{{< /note >}}
25
25
26
26
## Set up
27
27
@@ -107,15 +107,15 @@ data:
107
107
EOF
108
108
```
109
109
110
-
This will create the **secure-app**service and a deployment. The secure app is configured to serve HTTPS traffic on port 8443 for the host app.example.com. For TLS termination, a self-signed TLS certificate, with the common name `app.example.com`, and key are used. The app responds to clients HTTPS requests with a simple text response "hello from pod $POD_HOSTNAME".
110
+
This will create the **secure-app**Service and a Deployment. The secure app is configured to serve HTTPS traffic on port 8443 for the host app.example.com. For TLS termination, a self-signed TLS certificate, with the common name `app.example.com`, and key are used. The app responds to clients HTTPS requests with a simple text response "hello from pod $POD_HOSTNAME".
111
111
112
112
Run the following command to verify the resources were created:
113
113
114
114
```shell
115
115
kubectl get pods,svc
116
116
```
117
117
118
-
The output should include the **secure-app** pod and the **secure-app**service:
118
+
The output should include the **secure-app** pod and the **secure-app**Service:
119
119
120
120
```text
121
121
NAME READY STATUS RESTARTS AGE
@@ -125,7 +125,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
Create a gateway. This will create a TLS listener with the hostname `*.example.com` and a TLS mode of passthrough. Copy and paste this into your terminal.
128
+
Create a Gateway. This will create a TLS listener with the hostname `*.example.com` and passthrough TLS mode. Copy and paste this into your terminal.
129
129
130
130
```yaml
131
131
kubectl apply -f - <<EOF
@@ -151,11 +151,11 @@ spec:
151
151
EOF
152
152
```
153
153
154
-
This gateway will configure NGINX Gateway Fabric to accept TLS connections on port 443 and route them to the corresponding backend services without decryption. The routing is done based on the SNI, which allows clients to specify a server name (like example.com) during the SSL handshake.
154
+
This Gateway will configure NGINX Gateway Fabric to accept TLS connections on port 443 and route them to the corresponding backend Services without decryption. The routing is done based on the SNI, which allows clients to specify a server name (like example.com) during the SSL handshake.
155
155
156
156
{{< note >}} It is possible to add an HTTPS listener on the same port that terminates TLS connections so long as the hostname does not overlap with the TLS listener hostname. {{< /note >}}
157
157
158
-
Create a TLSRoute that attaches to the gateway and routes requests to `app.example.com` to the `secure-app`service:
158
+
Create a TLSRoute that attaches to the Gateway and routes requests to `app.example.com` to the `secure-app`Service:
159
159
160
160
```yaml
161
161
kubectl apply -f - <<EOF
@@ -177,15 +177,15 @@ spec:
177
177
EOF
178
178
```
179
179
180
-
{{< note >}}To route to a service in a namespace different from the TLSRoute namespace, create a [ReferenceGrant](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1beta1.ReferenceGrant) to permit the cross-namespace reference. {{< /note >}}
180
+
{{< note >}}To route to a Service in a Namespace different from the TLSRoute Namespace, create a [ReferenceGrant](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1beta1.ReferenceGrant) to permit the cross-namespace reference. {{< /note >}}
181
181
182
182
## Send traffic
183
183
184
184
Using the external IP address and port for NGINX Gateway Fabric, send traffic to the `secure-app` application.
185
185
186
186
{{< note >}}If you have a DNS record allocated for `app.example.com`, you can send the request directly to that hostname, without needing to resolve.{{< /note >}}
187
187
188
-
Send a request to the `secure-app`service on the TLS port with the `--insecure` flag. The `--insecure` flag is required because the `secure-app` is using self-signed certificates.
188
+
Send a request to the `secure-app`Service on the TLS port with the `--insecure` flag. The `--insecure` flag is required because the `secure-app` is using self-signed certificates.
0 commit comments