Skip to content

Commit

Permalink
Reword public vs private intro
Browse files Browse the repository at this point in the history
Signed-off-by: Alex Ellis (OpenFaaS Ltd) <alexellis2@gmail.com>
  • Loading branch information
alexellis committed Jan 21, 2025
1 parent 24bdc89 commit a045c22
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion blog/_posts/2024-12-09-quickstart-uplink.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,11 @@ By default, each HTTP and TCP endpoint is kept private, and can only be accessed

This approach is ideal for managing customer endpoints or internal services that are hosted in private or hard to reach environments.

For hosting providers, like [inlets cloud](https://inlets.dev/cloud), additional features can be enabled to make the data plane for tunnels available on the public Internet.
For hosting providers, where you want some or all of the tunnels to be publicly accessible, you can turn on the "data router" component and use Kubernetes Ingress or Istio to route traffic from your custom domains to the tunnel server.

When exposing tunnels to the Internet, you can create a new Ingress record for each domain, or use a wildcard domain so that a single Ingress record and TLS certificate can serve all tunnels. Learn more in: [Ingress for Tunnels](https://docs.inlets.dev/uplink/ingress-for-tunnels/).

Our [inlets cloud](https://inlets.dev/cloud) product is built on top of multiple inlets uplink installations in different regions around the world. Our UI makes use of the REST API (client-api) that's built into inlets uplink.

## Quick start

Expand Down

0 comments on commit a045c22

Please sign in to comment.