Skip to content

Commit ae864f9

Browse files
authored
Merge pull request #11 from aireilly/main
fixes section offset and other errors
2 parents 7a0b7d3 + 9a42115 commit ae864f9

5 files changed

+15
-16
lines changed

main.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ Cloud-native network functions (CNFs) best practices
55
:revdate: 2023
66
:toc: left
77
:toclevels: 5
8-
:toc-title: CNF Best Practices v{revnumber}
98
:repo-url: https://github.com/test-network-function/cnf-best-practices
109
:icons: image
1110
:icontype: svg
@@ -81,6 +80,10 @@ include::modules/cnf-best-practices-linux-capabilities.adoc[leveloffset=+2]
8180

8281
include::modules/cnf-best-practices-openshift-operations.adoc[leveloffset=+2]
8382

83+
include::modules/cnf-best-practices-secrets-management.adoc[leveloffset=+3]
84+
85+
include::modules/cnf-best-practices-scc-permissions-for-an-application.adoc[leveloffset=+3]
86+
8487
include::modules/cnf-best-practices-expectations-permissions.adoc[leveloffset=+2]
8588

8689
include::modules/cnf-best-practices-cloud-native-design-best-practices.adoc[leveloffset=+3]

modules/cnf-best-practices-disruption-budgets.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[id="cnf-best-practices-disruption-budgets"]
2-
==== Disruption budgets
2+
= Disruption budgets
33

44
When managing the platform there are at least two types of disruptions that can occur. They are voluntary and involuntary. When dealing with voluntary disruptions a pod disruption budget can be set that determines how many replicas of the application must remain running at any given time. For example, consider the case where an administrator is shutting down a node for
55

modules/cnf-best-practices-openshift-operations.adoc

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -217,17 +217,3 @@ Applications must define network policies that permit only the minimum network a
217217
218218
See test case link:https://github.com/test-network-function/cnf-certification-test/blob/main/CATALOG.md#networking-network-policy-deny-all[networking-network-policy-deny-all]
219219
====
220-
221-
[id="cnf-best-practices-secrets-management"]
222-
== Managing secrets
223-
224-
Secrets objects in OpenShift provide a way to hold sensitive information such as passwords, config files and credentials. There are 4 types of secrets; service account, basic auth, ssh auth and TLS. Secrets can be added via deployment configurations or consumed by pods directly. For more information on secrets and examples, see the following documentation.
225-
226-
link:https://docs.openshift.com/container-platform/latest/nodes/pods/nodes-pods-secrets.html[Providing sensitive data to pods]
227-
228-
[id="cnf-best-practices-scc-permissions-for-an-application"]
229-
== Setting SCC permissions for applications
230-
231-
Permissions to use an SCC is done by adding a cluster role that has _uses_ permissions for the SCC and then rolebindings for the users within a namespace to that role for users that need that SCC. Application admins can create their own role/rolebindings to assign permissions to a Service Account.
232-
233-
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
[id="cnf-best-practices-scc-permissions-for-an-application"]
2+
= Setting SCC permissions for applications
3+
4+
Permissions to use an SCC is done by adding a cluster role that has _uses_ permissions for the SCC and then rolebindings for the users within a namespace to that role for users that need that SCC. Application admins can create their own role/rolebindings to assign permissions to a Service Account.
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
[id="cnf-best-practices-secrets-management"]
2+
= Managing secrets
3+
4+
Secrets objects in OpenShift provide a way to hold sensitive information such as passwords, config files and credentials. There are 4 types of secrets; service account, basic auth, ssh auth and TLS. Secrets can be added via deployment configurations or consumed by pods directly. For more information on secrets and examples, see the following documentation.
5+
6+
link:https://docs.openshift.com/container-platform/latest/nodes/pods/nodes-pods-secrets.html[Providing sensitive data to pods]

0 commit comments

Comments
 (0)