Skip to content

Commit 8ef715a

Browse files
authored
Update configuration.md
1 parent 0e73b74 commit 8ef715a

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -429,7 +429,7 @@ networks:
429429

430430
You need to change the value of the environment `BASE_URL` of this Dockerfile, so it aims to the IP of your Shuffle frontend+backend node.
431431

432-
## Kubernetes
432+
### Kubernetes
433433

434434
Shuffle use with Kubernetes is now possible due to help from our contributors. You can read more about how it works on our [Github page](https://github.com/Shuffle/Shuffle/tree/main/functions/kubernetes), which includes extensive helm charts and configuration possibilities.
435435

@@ -614,7 +614,7 @@ server {
614614
3. Add a folder called "certs" with **your certificates** named `cert.crt` and `cert.key`.
615615
4. Restart everything: `docker-compose down; docker-compose up -d`
616616

617-
## Internal Certificate Authority
617+
### Internal Certificate Authority
618618
By default, certificates are not being verified when outbound traffic goes from Shuffle. This is due to the massive use of self-signed certificates when using internal services. You may ignore certificate warnings by adding `SHUFFLE_SKIPSSL_VERIFY=true` to the environment of each relevant service - most notably used for Orborus. If you want to accept your Certificate Authority for all requests, there are a few ways to do this:
619619

620620
1. Mount your CA certificates (recommended): Add the `./certs:/certs` mount to the Orborus service in your docker-compose.yml. Ensure that the shuffle directory contains a certs subdirectory with all the necessary certificate files. This will automatically append all certificates in `./certs` to the system's root CA.
@@ -675,7 +675,7 @@ registry-1.docker.io # Dockerhub registry (for apps)
675675
production.cloudflare.docker.com # Protects of DockerHub
676676
```
677677

678-
## Incoming IP Whitelisting
678+
### Incoming IP Whitelisting
679679

680680
When using Shuffle in the cloud (*.shuffler.io), the incoming IP to your services by default will be be from our cloud functions, if you are not using [Runtime Locations](/admin?tab=locations). The range is **not static**, and may wary based on region. Here's a list (mostly IPv6 as of 2025):
681681

0 commit comments

Comments
 (0)