Skip to content

Commit 40c1839

Browse files
GitHub Actionsjmagak
authored andcommitted
Fix inconsistencies with referencing my-rhdh-secrets
1 parent 9e2154b commit 40c1839

File tree

3 files changed

+5
-7
lines changed

3 files changed

+5
-7
lines changed

modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,8 +119,8 @@ data:
119119
<1> The base URL to the Kubernetes control plane. You can run the `kubectl cluster-info` command to get the base URL.
120120
<2> Set the value of this parameter to `false` to enable the verification of the TLS certificate.
121121
<3> Optional: The link to the Kubernetes dashboard managing the ARO cluster.
122-
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you can define in your `{my-product-secrets}` secret.
123-
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you can define in your `{my-product-secrets}` secret.
122+
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you define in your `{my-product-secrets}` secret.
123+
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you define in your `{my-product-secrets}` secret.
124124

125125
. Save the configuration changes.
126126

modules/installation/proc-deploy-rhdh-instance-gke.adoc

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,9 @@ data:
4545
----
4646
--
4747

48-
. Create a Secret named `{my-product-secret}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
48+
. Create a secret named `{my-product-secret}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
4949
+
5050
--
51-
.`{my-product-secrets}` fragment
5251
[source,yaml,subs="+quotes,+attributes"]
5352
----
5453
apiVersion: v1
@@ -110,10 +109,9 @@ spec:
110109
----
111110
--
112111

113-
. Set up a Google-managed certificate by creating a `ManagedCertificate` object which you must attach to the Ingress.
112+
. Set up a Google-managed certificate by creating a `ManagedCertificate` object which you must attach to the Ingress as shown in the following example:
114113
+
115114
--
116-
.Example of a `ManagedCertificate` object
117115
[source,yaml,subs="attributes+"]
118116
----
119117
apiVersion: networking.gke.io/v1

modules/installation/proc-rhdh-deploy-aks-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ data:
114114
----
115115
--
116116

117-
. Create a Secret named `{my-product-secrets}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
117+
. Create a secret named `{my-product-secrets}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
118118
+
119119
--
120120
[source,yaml,subs="+quotes,+attributes"]

0 commit comments

Comments
 (0)