-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Split documentation #1527
Split documentation #1527
Conversation
8995197
to
f8b4eea
Compare
804f9a8
to
accd24b
Compare
799f7b2
to
b18fa8c
Compare
27efca6
to
d812bda
Compare
docs/user-guide/tls.md
Outdated
@@ -0,0 +1,154 @@ | |||
# TLS | |||
|
|||
- [Default SSL Certificate](docs/user-guide/default-ssl-certificate.md) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This link is broken, it should be only #default-ssl-certificate
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
README.md
Outdated
- [Command line arguments](docs/user-guide/cli-arguments.md) | ||
- [Contribute](CONTRIBUTING.md) | ||
- [TLS](docs/user-guide/tls.md) | ||
- [Annotation ingress.class](#annotation-ingress.class) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The right reference here is #annotation-ingressclass
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
It is possible to use a number or the name of the port. | ||
|
||
The next example shows how to expose the service `kube-dns` running in the namespace `kube-system` in the port `53` using the port `53` | ||
By default NGINX uses the content of the header `X-Forwarded-For` as the source of truth to get information about the client IP address. This works without issues in L7 **if we configure the setting `proxy-real-ip-cidr`** with the correct information of the IP/network address of trusted external load balancer. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So, should we make explicit how to disable this behaviour? Something like 'not setting proxy-real-ip-cidr will disable this behaviour? Or setting this as 127.0.0.1 is the right config to disable?
|
||
![nginx-module-vts screenshot](https://cloud.githubusercontent.com/assets/3648408/10876811/77a67b70-8183-11e5-9924-6a6d0c5dc73a.png "screenshot with filter") | ||
|
||
To extract the information in JSON format the module provides a custom URL: `/nginx_status/format/json` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As we're running Ingress as a POD, to access this status do we need to create a service?
"method": "$request_method", "http_referrer": "$http_referer", "http_user_agent": | ||
"$http_user_agent" }' | ||
``` | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would also make a reference to docs/user-guide/log-format.md here, so user can understand what each field represents :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
@aledbf Really great job here :) I'll take a further look later, try to deploy following the instructions. I would add something about specific nodes and taint, but this is not the focus of this docs anyway :) Thank you very much for doing this! |
edef859
to
e273719
Compare
type: kubernetes.io/tls | ||
name: foo | ||
annotations: | ||
kubernetes.io/ingress.class: "gce" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd suggest to replace gce to internal
* nginx-ingress no longer requires endpoints create/update RBAC Role permissions * kubernetes/ingress-nginx#1527
What this PR does / why we need it:
Split and cleanup of documentation and examples
fixes #1496