You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/cert-manager-operator-update-channels.adoc
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,8 +13,12 @@ Update channels are the mechanism by which you can declare the version of your {
13
13
14
14
[id="stable-v1-channel_{context}"]
15
15
== stable-v1 channel
16
+
The `stable-v1` channel installs and updates the latest release version of the {cert-manager-operator}. Select the `stable-v1` channel if you want to use the latest stable release of the {cert-manager-operator}.
16
17
17
-
The `stable-v1` channel is the default and suggested channel while installing the {cert-manager-operator}. The `stable-v1` channel installs and updates the latest release version of the {cert-manager-operator}. Select the `stable-v1` channel if you want to use the latest stable release of the {cert-manager-operator}.
18
+
[NOTE]
19
+
====
20
+
The `stable-v1` channel is the default and suggested channel while installing the {cert-manager-operator}.
21
+
====
18
22
19
23
The `stable-v1` channel offers the following update approval strategies:
The LokiStack instance comes with default settings according to the configured size. It is possible to override some of these settings, such as the ingestion and query limits. You might want to update them if you get Loki errors showing up in the Console plugin, or in `flowlogs-pipeline` logs. An automatic alert in the web console notifies you when these limits are reached.
8
+
The LokiStack instance comes with default settings according to the configured size. It is possible to override some of these settings, such as the ingestion and query limits. An automatic alert in the web console notifies you when these limits are reached.
9
+
10
+
[NOTE]
11
+
====
12
+
You might want to update the ingestion and query limits if you get Loki errors showing up in the Console plugin, or in `flowlogs-pipeline` logs.
To create containerized applications, you typically start with a trusted base
9
9
image that offers the components that are usually provided by the operating system.
10
10
These include the libraries, utilities, and other features the application
11
11
expects to see in the operating system's file system.
12
12
13
-
RedHat Universal Base Images (UBI) were created to encourage anyone building their
14
-
own containers to start with one that is made entirely from RedHat Enterprise
13
+
Red{nbsp}Hat Universal Base Images (UBI) were created to encourage anyone building their
14
+
own containers to start with one that is made entirely from Red{nbsp}Hat Enterprise
15
15
Linux rpm packages and other content. These UBI images are updated regularly
16
16
to keep up with security patches and free to use and redistribute with
17
-
container images built to include your own software.
17
+
container images built to include your own software.
18
18
19
19
Search the
20
20
link:https://catalog.redhat.com/software/containers/explore[Red Hat Ecosystem Catalog]
@@ -26,20 +26,24 @@ be interested in these two general types of UBI images:
26
26
`ubi8/ubi`, and `ubi9/ubi`), as well as minimal images based on those systems (`ubi7/ubi-minimal`, `ubi8/ubi-mimimal`, and ubi9/ubi-minimal). All of these images are preconfigured to point to free
27
27
repositories of {op-system-base} software that you can add to the container images you build,
28
28
using standard `yum` and `dnf` commands.
29
-
Red Hat encourages people to use these images on other distributions,
29
+
+
30
+
[NOTE]
31
+
====
32
+
Red{nbsp}Hat encourages people to use these images on other distributions,
30
33
such as Fedora and Ubuntu.
34
+
====
31
35
32
-
* **RedHat Software Collections**: Search the RedHat Ecosystem Catalog
36
+
* **Red{nbsp}Hat Software Collections**: Search the Red{nbsp}Hat Ecosystem Catalog
33
37
for `rhscl/` to find images created to use as base images for specific types
34
38
of applications. For example, there are Apache httpd ([x-]`rhscl/httpd-*`),
([x-]`rhscl/nodejs-*`) and Perl ([x-]`rhscl/perl-*`) rhscl images.
37
41
38
42
Keep in mind that while UBI images are freely available and redistributable,
39
-
RedHat support for these images is only available through RedHat
43
+
Red{nbsp}Hat support for these images is only available through Red{nbsp}Hat
40
44
product subscriptions.
41
45
42
46
See
43
-
link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/building_running_and_managing_containers/index#using_red_hat_universal_base_images_standard_minimal_and_runtimes[Using RedHat Universal Base Images]
47
+
link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/building_running_and_managing_containers/index#using_red_hat_universal_base_images_standard_minimal_and_runtimes[Using Red{nbsp}Hat Universal Base Images]
44
48
in the Red Hat Enterprise Linux documentation for information on how to use and build on
Copy file name to clipboardExpand all lines: modules/security-hosts-vms-rhcos.adoc
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,4 +31,7 @@ Disabling SELinux on {op-system} is not supported.
31
31
32
32
{op-system} is a version of {op-system-base-full} that is specially configured to work as control plane (master) and worker nodes on {product-title} clusters. So {op-system} is tuned to efficiently run container workloads, along with Kubernetes and {product-title} services.
33
33
34
+
[NOTE]
35
+
====
34
36
To further protect {op-system} systems in {product-title} clusters, most containers, except those managing or monitoring the host system itself, should run as a non-root user. Dropping the privilege level or creating containers with the least amount of privileges possible is recommended best practice for protecting your own {product-title} clusters.
Copy file name to clipboardExpand all lines: modules/tls-profiles-understanding.adoc
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,10 +28,15 @@ For the Ingress Controller, the minimum TLS version is converted from 1.0 to 1.1
28
28
====
29
29
30
30
|`Intermediate`
31
-
|This profile is the recommended configuration for the majority of clients. It is the default TLS security profile for the Ingress Controller, kubelet, and control plane. The profile is based on the link:https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29[Intermediate compatibility] recommended configuration.
31
+
|This profile is the default TLS security profile for the Ingress Controller, kubelet, and control plane. The profile is based on the link:https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29[Intermediate compatibility] recommended configuration.
32
32
33
33
The `Intermediate` profile requires a minimum TLS version of 1.2.
34
34
35
+
[NOTE]
36
+
====
37
+
This profile is the recommended configuration for the majority of clients.
38
+
====
39
+
35
40
|`Modern`
36
41
|This profile is intended for use with modern clients that have no need for backwards compatibility. This profile is based on the link:https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility[Modern compatibility] recommended configuration.
Installing Loki is a recommended prerequisite for using the Network Observability Operator. You can choose to use xref:../../observability/network_observability/installing-operators.adoc#network-observability-without-loki_network_observability[Network Observability without Loki], but there are some considerations for doing this, described in the previously linked section.
9
10
10
11
The {loki-op} integrates a gateway that implements multi-tenancy and authentication with Loki for data flow storage. The `LokiStack` resource manages Loki, which is a scalable, highly-available, multi-tenant log aggregation system, and a web proxy with {product-title} authentication. The `LokiStack` proxy uses {product-title} authentication to enforce multi-tenancy and facilitate the saving and indexing of data in Loki log stores.
The cryptographic mechanism to recreate the encryption key is based on the _blinded key_ stored on the node and the private key of the involved Tang servers. To protect against the possibility of an attacker who has obtained both the Tang server private key and the node’s encrypted disk, periodic rekeying is advisable.
11
+
The cryptographic mechanism to recreate the encryption key is based on the _blinded key_ stored on the node and the private key of the involved Tang servers.
12
12
13
-
You must perform the rekeying operation for every node before you can delete the old key from the Tang server. The following sections provide procedures for rekeying and deleting old keys.
13
+
[NOTE]
14
+
====
15
+
To protect against the possibility of an attacker who has obtained both the Tang server private key and the node's encrypted disk, periodic rekeying is advisable.
16
+
17
+
You must perform the rekeying operation for every node before you can delete the old key from the Tang server.
18
+
====
19
+
20
+
The following sections provide procedures for rekeying and deleting old keys.
0 commit comments