You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs-web/configuration/ingress-resources/basic-configuration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ spec:
27
27
28
28
Here is a breakdown of what this Ingress resource definition means:
29
29
* The `metadata.name` field defines the name of the resource `cafe‑ingress`.
30
-
* In the `spec.tsl` field we set up SSL/TLS termination:
30
+
* In the `spec.tls` field we set up SSL/TLS termination:
31
31
* In the `secretName`, we reference a secret resource by its name, `cafe‑secret`. This resource contains the SSL/TLS certificate and key and it must be deployed prior to the Ingress resource.
32
32
* In the `hosts` field, we apply the certificate and key to our `cafe.example.com` host.
33
33
* In the `spec.rules` field, we define a host with domain name `cafe.example.com`.
Copy file name to clipboardExpand all lines: docs-web/installation/building-ingress-controller-image.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
# Building Ingress Controller Image
1
+
# Building the Ingress Controller Image
2
2
3
-
This document explains how to build an Ingress Controller image. Note that for NGINX, we provide the image though [DockerHub](https://hub.docker.com/r/nginx/nginx-ingress-controller/). For NGINX Plus, you need to build the image.
3
+
This document explains how to build an Ingress Controller image. Note that for NGINX, we provide the image though [DockerHub](https://hub.docker.com/r/nginx/nginx-ingress/). For NGINX Plus, you need to build the image.
4
4
5
5
## Prerequisites
6
6
@@ -22,7 +22,8 @@ We build the image using the make utility and the provided `Makefile`. Let’s c
@@ -32,7 +33,7 @@ We build the image using the make utility and the provided `Makefile`. Let’s c
32
33
$ make PREFIX=myregistry.example.com/nginx-ingress
33
34
```
34
35
`myregistry.example.com/nginx-ingress` defines the repo in your private registry where the image will be pushed. Substitute that value with the repo in your private registry.
35
-
36
+
36
37
As the result, the image **myregistry.example.com/nginx-ingress:1.6.0** is built and pushed to the registry. Note that the tag `1.6.0` comes from the `VERSION` variable, defined in the Makefile.
37
38
38
39
* For NGINX Plus, first, make sure that the certificate (`nginx-repo.crt`) and the key (`nginx-repo.key`) of your license are located in the root of the project:
@@ -46,7 +47,7 @@ We build the image using the make utility and the provided `Makefile`. Let’s c
46
47
$ make DOCKERFILE=DockerfileForPlus PREFIX=myregistry.example.com/nginx-plus-ingress
47
48
```
48
49
`myregistry.example.com/nginx-plus-ingress` defines the repo in your private registry where the image will be pushed. Substitute that value with the repo in your private registry.
49
-
50
+
50
51
As the result, the image **myregistry.example.com/nginx-plus-ingress:1.6.0** is built and pushed to the registry. Note that the tag `1.6.0` comes from the `VERSION` variable, defined in the Makefile.
51
52
52
53
Next you will find the details about available Makefile targets and variables.
Copy file name to clipboardExpand all lines: docs-web/third-party-modules/opentracing.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,18 +2,18 @@
2
2
3
3
The Ingress Controller supports [OpenTracing](http://opentracing.io/) with the third-party module [opentracing-contrib/nginx-opentracing](https://github.com/opentracing-contrib/nginx-opentracing).
4
4
5
-
This document explains how to use OpenTracing with the Ingress Controller. Additionally, we have an [example](https://github.com/nginxinc/kubernetes-ingress/blob/v1.6.1/docs/opentracing.md) on how to enable OpenTracing for a simple web application using Jaeger as a tracer.
5
+
This document explains how to use OpenTracing with the Ingress Controller. Additionally, we have an [example](https://github.com/nginxinc/kubernetes-ingress/blob/v1.6.2/examples/opentracing) on how to enable OpenTracing for a simple web application using Jaeger as a tracer.
6
6
7
7
## Prerequisites
8
-
1.**Use the Ingress Controller image with OpenTracing.** The default Ingress Controller images don’t include the OpenTracing module. To use OpenTracing, you need to build the image with that module. Follow the build instructions to build the image using `DockerfileWithOpentracing` for NGINX or `DockerfileWithOpentracingForPlus` for NGINX Plus.
8
+
1.**Use the Ingress Controller image with OpenTracing.** The default Ingress Controller images don’t include the OpenTracing module. To use OpenTracing, you need to build the image with that module. Follow the build instructions to build the image using `DockerfileWithOpentracing` for NGINX or `DockerfileWithOpentracingForPlus` for NGINX Plus.
9
9
By default, the Dockerfiles install Jaeger as a tracer. However, it is possible to replace Jaeger with other supported [tracers](https://github.com/opentracing-contrib/nginx-opentracing#building-from-source). For that, please modify the Dockerfile accordingly:
10
10
1. Change the download line in the tracer-downloader stage of the Dockerfile to download the right tracer.
11
11
1. Edit the COPY line of the final image to copy the previously downloaded tracer to the image
12
12
13
13
1.**Load the OpenTracing module.** You need to load the module with the configuration for the chosen tracer using the following ConfigMap keys:
14
14
*`opentracing-tracer`: sets the path to the vendor tracer binary plugin. This is the path you used in the COPY line of step *ii* above.
15
15
*`opentracing-tracer-config`: sets the tracer configuration in JSON format.
16
-
16
+
17
17
Below an example on how to use those keys to load the module with Jaeger tracer:
@@ -55,7 +55,7 @@ Consider the following two cases:
55
55
```
56
56
57
57
2. OpenTracing is globally enabled:
58
-
1. To disable OpenTracing for a specific Ingress Resource, use the server snippet annotation:
58
+
1. To disable OpenTracing for a specific Ingress Resource, use the server snippet annotation:
59
59
```yaml
60
60
nginx.org/server-snippets: |
61
61
opentracing off;
@@ -69,9 +69,9 @@ Consider the following two cases:
69
69
70
70
## Customize OpenTracing
71
71
72
-
You can customize OpenTracing though the supported [OpenTracing module directives](https://github.com/opentracing-contrib/nginx-opentracing/blob/v1.6.1/doc/Reference.md). Use the snippets ConfigMap keys or annotations to insert those directives into the http, server or location contexts of the generated NGINX configuration.
72
+
You can customize OpenTracing though the supported [OpenTracing module directives](https://github.com/opentracing-contrib/nginx-opentracing/blob/v1.6.2/doc/Reference.md). Use the snippets ConfigMap keys or annotations to insert those directives into the http, server or location contexts of the generated NGINX configuration.
73
73
74
-
For example, to propagate the active span context for upstream requests, it is required to set the `opentracing_propagate_context` directive, which you can add to an Ingress resource using the location snippets annotation:
74
+
For example, to propagate the active span context for upstream requests, it is required to set the `opentracing_propagate_context` directive, which you can add to an Ingress resource using the location snippets annotation:
0 commit comments