Skip to content

Commit b4689f8

Browse files
author
Kate Osborn
committed
code review
1 parent ef18ddf commit b4689f8

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

site/content/how-to/traffic-management/tls-passthrough.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ In this guide, we will show how to configure TLS passthrough for your applicatio
2121
GW_TLS_PORT=<port number>
2222
```
2323

24-
{{< note >}}In a production environment, you should have a DNS record for the external IP address that is exposed, and it should refer to the hostname that the gateway will forward for.{{< /note >}}
24+
{{< note >}}In a production environment, you should have a DNS record for the external IP address that is exposed, and it should refer to the hostname that the Gateway will forward for.{{< /note >}}
2525

2626
## Set up
2727

@@ -107,15 +107,15 @@ data:
107107
EOF
108108
```
109109

110-
This will create the **secure-app** service and a deployment. The secure app is configured to serve HTTPS traffic on port 8443 for the host app.example.com. For TLS termination, a self-signed TLS certificate, with the common name `app.example.com`, and key are used. The app responds to clients HTTPS requests with a simple text response "hello from pod $POD_HOSTNAME".
110+
This will create the **secure-app** Service and a Deployment. The secure app is configured to serve HTTPS traffic on port 8443 for the host app.example.com. For TLS termination, a self-signed TLS certificate, with the common name `app.example.com`, and key are used. The app responds to clients HTTPS requests with a simple text response "hello from pod $POD_HOSTNAME".
111111

112112
Run the following command to verify the resources were created:
113113

114114
```shell
115115
kubectl get pods,svc
116116
```
117117

118-
The output should include the **secure-app** pod and the **secure-app** service:
118+
The output should include the **secure-app** pod and the **secure-app** Service:
119119

120120
```text
121121
NAME READY STATUS RESTARTS AGE
@@ -125,7 +125,7 @@ NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
125125
service/secure-app ClusterIP 192.168.194.152 <none> 8443/TCP 12s
126126
```
127127

128-
Create a gateway. This will create a TLS listener with the hostname `*.example.com` and a TLS mode of passthrough. Copy and paste this into your terminal.
128+
Create a Gateway. This will create a TLS listener with the hostname `*.example.com` and passthrough TLS mode. Copy and paste this into your terminal.
129129

130130
```yaml
131131
kubectl apply -f - <<EOF
@@ -151,11 +151,11 @@ spec:
151151
EOF
152152
```
153153

154-
This gateway will configure NGINX Gateway Fabric to accept TLS connections on port 443 and route them to the corresponding backend services without decryption. The routing is done based on the SNI, which allows clients to specify a server name (like example.com) during the SSL handshake.
154+
This Gateway will configure NGINX Gateway Fabric to accept TLS connections on port 443 and route them to the corresponding backend Services without decryption. The routing is done based on the SNI, which allows clients to specify a server name (like example.com) during the SSL handshake.
155155

156156
{{< note >}} It is possible to add an HTTPS listener on the same port that terminates TLS connections so long as the hostname does not overlap with the TLS listener hostname. {{< /note >}}
157157

158-
Create a TLSRoute that attaches to the gateway and routes requests to `app.example.com` to the `secure-app` service:
158+
Create a TLSRoute that attaches to the Gateway and routes requests to `app.example.com` to the `secure-app` Service:
159159

160160
```yaml
161161
kubectl apply -f - <<EOF
@@ -177,15 +177,15 @@ spec:
177177
EOF
178178
```
179179

180-
{{< note >}}To route to a service in a namespace different from the TLSRoute namespace, create a [ReferenceGrant](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1beta1.ReferenceGrant) to permit the cross-namespace reference. {{< /note >}}
180+
{{< note >}}To route to a Service in a Namespace different from the TLSRoute Namespace, create a [ReferenceGrant](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1beta1.ReferenceGrant) to permit the cross-namespace reference. {{< /note >}}
181181

182182
## Send traffic
183183

184184
Using the external IP address and port for NGINX Gateway Fabric, send traffic to the `secure-app` application.
185185

186186
{{< note >}}If you have a DNS record allocated for `app.example.com`, you can send the request directly to that hostname, without needing to resolve.{{< /note >}}
187187

188-
Send a request to the `secure-app` service on the TLS port with the `--insecure` flag. The `--insecure` flag is required because the `secure-app` is using self-signed certificates.
188+
Send a request to the `secure-app` Service on the TLS port with the `--insecure` flag. The `--insecure` flag is required because the `secure-app` is using self-signed certificates.
189189

190190
```shell
191191
curl --resolve app.example.com:$GW_TLS_PORT:$GW_IP https://app.example.com:$GW_TLS_PORT --insecure -v

0 commit comments

Comments
 (0)