Skip to content

Commit 7b30283

Browse files
Apply suggestions from code review
Co-authored-by: shainaraskas <[email protected]>
1 parent f77d85e commit 7b30283

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

deploy-manage/remote-clusters/_snippets/eck_expose_transport.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ spec:
1212
type: LoadBalancer <1>
1313
```
1414
15-
1. On cloud providers which support external load balancers, setting the type field to LoadBalancer provisions a load balancer for your service. Alternatively, expose the service `<cluster-name>-es-transport` through one of the Kubernetes Ingress controllers that support TCP services.
15+
1. On cloud providers which support external load balancers, setting the type field to `LoadBalancer` provisions a load balancer for your service. Alternatively, expose the service `<cluster-name>-es-transport` through one of the Kubernetes Ingress controllers that support TCP services.

deploy-manage/remote-clusters/_snippets/eck_rcs_expose.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,15 @@ kubectl expose service quickstart-es-remote-cluster \
1515
--port=9443 --target-port=9443
1616
```
1717

18-
1. On cloud providers which support external load balancers, setting the type to LoadBalancer provisions a load balancer for your service. Alternatively, expose the service `<cluster-name>-es-remote-cluster` through one of the Kubernetes Ingress controllers that support TCP services.
18+
1. On cloud providers that support external load balancers, setting the type to `LoadBalancer` provisions a load balancer for your service. Alternatively, expose the service `<cluster-name>-es-remote-cluster` through one of the Kubernetes Ingress controllers that support TCP services.
1919

2020

2121
:::{admonition} About exposing the service and TLS certificates
2222
When exposing the remote cluster service, determine which TLS certificate will be presented to clients and whether a certificate authority (CA) is required to establish trust. This depends on how traffic to port `9443` is routed in your environment and which component terminates the TLS connection:
2323

2424
* **{{es}} TLS termination**
2525

26-
If the connection reaches the {{es}} Pods without intermediate TLS termination, the {{es}} nodes present their transport certificates managed by ECK. The local cluster must therefore trust these certificates by including the ECK-managed transport CA, which you can retrieve in the next section.
26+
If the connection reaches the {{es}} Pods without intermediate TLS termination, the {{es}} nodes present transport certificates managed by ECK. The local cluster must therefore trust these certificates by including the ECK-managed transport CA, which you can retrieve in the next section.
2727

2828
This setup is typical when using standard `LoadBalancer` services provided by most cloud providers.
2929

deploy-manage/remote-clusters/_snippets/eck_rcs_retrieve_ca.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@ The certificate authority (CA) used by ECK to issue certificates for the remote
22

33
If the external connections reach the {{es}} Pods on port `9443` without any intermediate TLS termination, you must retrieve this CA, as it will be required in the local cluster configuration to establish trust.
44

5-
For example, to save the transport CA certificate of a cluster named `quickstart` into a local file, run:
5+
For example, to save the transport CA certificate of a cluster named `quickstart` into a local file, run the following command:
66

77
```sh
88
kubectl get secret quickstart-es-transport-certs-public \
99
-o go-template='{{index .data "ca.crt" | base64decode}}' > eck_transport_ca.crt
1010
```
1111

12-
You can verify that the file contains a valid CA certificate by running:
12+
You can verify that the file contains a valid CA certificate by running the following command:
1313

1414
```bash
1515
openssl x509 -in eck_transport_ca.crt -noout -text
@@ -18,6 +18,6 @@ openssl x509 -in eck_transport_ca.crt -noout -text
1818
::::{important}
1919
ECK-managed CA certificates are automatically rotated after one year by default, but you can [configure](/deploy-manage/deploy/cloud-on-k8s/configure-eck.md) a different validity period.
2020

21-
Ensure that this CA is updated in all environments where it's used after rotation to preserve trust.
21+
When the CA certificate is rotated, ensure that this CA is updated in all environments where it's used to preserve trust.
2222
::::
2323

0 commit comments

Comments
 (0)