Skip to content

Commit 301d869

Browse files
maintain headers
Signed-off-by: saurabhraghuvanshii <[email protected]>
1 parent 7f6d332 commit 301d869

File tree

2 files changed

+4
-4
lines changed
  • content/challenges/11111111-1111-1111-1111-111111111111/securing-k8s-traffic-with-calico-ingress-gateway/content

2 files changed

+4
-4
lines changed

content/challenges/11111111-1111-1111-1111-111111111111/securing-k8s-traffic-with-calico-ingress-gateway/content/deploy-gateway/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ weight: 10
1111

1212
In our example, we need to create two key Gateway API resources.
1313

14-
## Gateway
14+
#### Gateway
1515

1616
The Gateway resource defines the cluster’s entry point for external traffic,
1717
something typically owned and managed by the platform or infrastructure team. It

content/challenges/11111111-1111-1111-1111-111111111111/securing-k8s-traffic-with-calico-ingress-gateway/content/overview/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,20 @@ weight: 1
99

1010
![overview](overview.png)
1111

12-
# The Ingress Rut
12+
#### The Ingress Rut
1313

1414
The Ingress controller landscape is a mishmash of vendors with great ideas. While they all can route HTTP/S traffic into your cluster, expanding your services to include other protocols puts you at the mercy of that vendor and the capabilities that they implement. Additionally, if you attempt to migrate from your old Ingress Controller to a new one at some point, there is the concern of vendor lock-in, which ties your hands. If you are wondering how vendor lock-in plays a role, take a closer look at your Ingress resources. Don't they all share some sort of annotation?
1515

1616
![stock-image](stock-image.png)
1717

1818
That "pile of vendor annotations," while functional, is specific to that one great solution you are currently using, highlighting the limitations of a standard that struggled to keep pace and even led to [security vulnerabilities](https://kubernetes.io/blog/2025/03/24/ingress-nginx-cve-2025-1974/).
1919

20-
## What Are We Covering?
20+
#### What Are We Covering?
2121

2222
While Ingress isn’t disappearing tomorrow, the direction is clear. The Gateway API offers a path to a more robust, secure, and manageable ingress strategy. And now, with Calico v3.30, we’re introducing the Calico Ingress Gateway, a powerful, Envoy-based implementation of this next-generation standard at your fingertip.
2323

2424
This microcourse guides you through the settings and basic configurations required to run a secure website deployment. We’ll set up the Calico Ingress Gateway, demonstrate its core concepts in action, and show you how to effortlessly secure your applications with automated TLS certificates and enforced HTTPS, leaving those annotation struggles behind.
2525

26-
## What Makes Gateway API Different?
26+
#### What Makes Gateway API Different?
2727

2828
There are three main points we should highlight when evaluating Gateway API and Ingress controllers.

0 commit comments

Comments
 (0)