Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Blog Post: Azure Front Door end-to-end TLS with AKS App Routing #4825

Open
wants to merge 8 commits into
base: master
Choose a base branch
from

Conversation

swgriffith
Copy link
Member

This PR is for a new blog post to the AKS blog that demonstrates setting up an AKS cluster with App Routing to host an internal endpoint to an application, including the creation of a private link. The post then walks through the set up of Azure Front Door to consume that private linked endpoint.

In the post I also show some steps for generating a certificate via either App Service Certificates or via LetsEncrypt using CertBot. That section can easily be removed if it doesnt seem to be a good fit.

In this PR I am also including my addition to the 'Authors' list of the site.

@swgriffith swgriffith requested review from palma21 and a team as code owners March 3, 2025 18:55
@swgriffith swgriffith requested a review from gambtho March 3, 2025 18:55
@phillipgibson
Copy link

Any way we can create a top-level series of how-to config e2e encryption for all types of ingresses for AKS (AGIC, Istio, etc.)? This solves a specific scenario, but what about the customer that wants to use the global load balancer Front Door and use passthrough with Istio?

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants