Skip to content

Commit 03667d4

Browse files
authored
Fixed typos in 03.1-platform.adoc (#9)
1 parent 062570f commit 03667d4

1 file changed

Lines changed: 11 additions & 11 deletions

File tree

documentation/modules/ROOT/pages/03.1-platform.adoc

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010

1111
== Walkthrough As a Platform Engineer
1212

13-
The ansible scripts we just run has setup the following as ArgoCD applicatiopns:
13+
The ansible scripts we just ran have set up the following as ArgoCD applications:
1414

1515
* Red Hat Connectivity Link operator and a Kuadrant instance
1616
* A TLS issuer for TLS certificates. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/cluster/cert-manager.io\~v1~ClusterIssuer/prod-web-lets-encrypt-issuer/yaml[View CR^]]
@@ -43,12 +43,12 @@ spec:
4343
name: ********
4444
```
4545
46-
* TLS Issuer references to the ACME server https://letsencrypt.org/[Let's Encrypt^]
47-
* It uses the DNS providers credentials, in this case AWS to create the TLS certificates
46+
* TLS Issuer references the ACME server https://letsencrypt.org/[Let's Encrypt^]
47+
* It uses the DNS providers credentials, in this case AWS, to create the TLS certificates
4848
******
4949
====
5050

51-
* A Gateway (based on istio gateway) with a wildcard hostname based on the root domain. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/gateway.networking.k8s.io\~v1~Gateway/prod-web/yaml[View CR^]]
51+
* A Gateway (based on Istio Gateway) with a wildcard hostname based on the root domain. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/gateway.networking.k8s.io\~v1~Gateway/prod-web/yaml[View CR^]]
5252
+
5353
.[underline]#Click to see an example and description#
5454
[%collapsible]
@@ -89,7 +89,7 @@ spec:
8989

9090

9191
* Various policies attached to the Gateway:
92-
** A default `deny-all` Auth Policy to start with zero-trust [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/kuadrant.io\~v1~AuthPolicy/prod-web-deny-all/yaml[View CR^]]
92+
** A default `deny-all` Auth Policy to start with zero trust [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/kuadrant.io\~v1~AuthPolicy/prod-web-deny-all/yaml[View CR^]]
9393
+
9494
.[underline]#Click to see an example and description#
9595
[%collapsible]
@@ -206,7 +206,7 @@ spec:
206206

207207
=== Create a DNS Policy
208208

209-
Now that we have setup a secure, protected application connectivity environment, we are now ready to expose this to the Internet. We will do so by creating a DNSPolicy +
209+
Now that we have set up a secure, protected application connectivity environment, we are now ready to expose this to the Internet. We will do so by creating a DNSPolicy +
210210

211211
* Copy the following into the *Import YAML* utility accessible by the (+) button on top of the https://console-openshift-console.%OPENSHIFTSUBDOMAIN%[OpenShift Console^]
212212
+
@@ -227,8 +227,8 @@ spec:
227227
- name: prod-web-aws-credentials
228228
----
229229

230-
* The DNSPolicy acts against a target Gateway by processing its listeners for hostnames and then create dns records for those hostnames.
231-
* Note that the DNSPolicy doesn't contain a *routingStrategy* because this is a single cluster deployment. But in case of multi-cluster deployments DNSPolicy allows for `routingStrategy: loadbalanced` and can optionally include loadbalancing specifications.
230+
* The DNSPolicy acts against a target Gateway by processing its listeners for hostnames and then creating DNS records for those hostnames.
231+
* Note that the DNSPolicy doesn't contain a *routingStrategy* because this is a single cluster deployment. But in case of multi-cluster deployments DNSPolicy allows for `routingStrategy: loadbalanced` and can optionally include load-balancing specifications.
232232
* The *targetRef* sections refers to the [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/ns/ingress-gateway/gateway.networking.k8s.io\~v1~Gateway/prod-web/yaml[Gateway^]] created when the Ansible script was executed.
233233
* A number of DNS records are created on AWS Route 53.
234234
+
@@ -242,7 +242,7 @@ image::route53-dnsrecords.png[]
242242

243243
* Check if the HTTPRoute works as it should. Run this curl command from a terminal. You can make use of the installed OpenShift Terminal by clicking https://console-openshift-console.apps.%OPENSHIFTSUBDOMAIN%/terminal[here^, window="terminal"] to execute the `curl` command.
244244
+
245-
NOTE: By using the OpenShift terminal, we can circumvent any delays in the DN propogation to local development environements including laptop,. Typicallu,due to the nature of DNS Records it may take a while for it get propagated.
245+
NOTE: By using the OpenShift terminal, we can circumvent any delays in the DN propogation to local development environments, including a laptop. Typically, due to the nature of DNS Records it may take a while for them to get propagated.
246246

247247
+
248248
[.console-input]
@@ -273,8 +273,8 @@ curl -k -w "%{http_code}" https://echo.globex.%AWSROOTZONE%
273273
----
274274
for i in {1..10}; do curl -k -w "%{http_code}" https://echo.globex.%AWSROOTZONE%; done
275275
----
276-
* You would see that you will get a response 5 times, post which you would see *Too Many Requests 429*
277-
* We haven't setup a RateLimitPolicy for the echoAPI itself, and so the gateway's default RateLimitPolicy gets applied to the echoAPI HTTPRoute. You can create another RateLimitPolicy and attach it to the echoAPI HTTPRoute to check this out.
276+
* You will see that you get a response 5 times, after which you see *Too Many Requests 429*
277+
* We haven't set up a RateLimitPolicy for the echoAPI itself, and so the gateway's default RateLimitPolicy gets applied to the echoAPI HTTPRoute. You can create another RateLimitPolicy and attach it to the echoAPI HTTPRoute to check this out.
278278
+
279279
[.console-input]
280280
[source,shell script]

0 commit comments

Comments
 (0)