From 797843c960f82a1974e2c3b632f0d45e5de9d6fe Mon Sep 17 00:00:00 2001 From: Sheogorath <sheogorath@shivering-isles.com> Date: Mon, 1 Jan 2024 21:59:27 +0100 Subject: [PATCH] chore(docs): Add image descriptions in the manual --- docs/src/concepts/ingress-termination.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/src/concepts/ingress-termination.md b/docs/src/concepts/ingress-termination.md index 36b033cde..b96c04fab 100644 --- a/docs/src/concepts/ingress-termination.md +++ b/docs/src/concepts/ingress-termination.md @@ -12,7 +12,7 @@ The solution most elegant solution found was to reroute traffic on TCP level. Al A request for the same website looks like this: - + In both cases the connections are terminated on the Kubernetes Cluster. The external user reaches the VPS and is then rerouted over VPN. The local user is rerouted before the connection reaches the internet, resulting in keeping all traffic locally. @@ -24,4 +24,4 @@ On the VPS, the TCP connection is handled by an HAProxy instance that speaks pro On the Unifi Dream Machine it's a simple iptables rule, which redirects the traffic. In order to also use proxy-protocol with the ingress service, it's actually redirected to an HAProxy running in the Kubernetes cluster besides the ingress-nginx. This is mainly due to the limitation in ingress-nginx that doesn't allow mixed proxy-protocol and non-proxy-protocol ports without using custom config templates. - \ No newline at end of file + \ No newline at end of file -- GitLab