From 92041d5676db11a39c25b062ceb7ffad55818c4d Mon Sep 17 00:00:00 2001 From: jmagak Date: Tue, 26 Nov 2024 14:17:05 +0100 Subject: [PATCH 1/2] Updates the context --- ...roc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc b/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc index 39e432151f..46d680da52 100644 --- a/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc +++ b/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc @@ -1,7 +1,7 @@ [id="proc-configuring-an-rhdh-instance-with-tls-in-kubernetes_{context}"] = Configuring an {product-very-short} instance with a TLS connection in Kubernetes -You can configure an {product-very-short} instance with a Transport Layer Security (TLS) connection in a Kubernetes cluster, such as an Azure Red Hat OpenShift (ARO) cluster, any cluster from a supported cloud provider, or your own cluster with proper configuration. However, You must use a public Certificate Authority (CA)-signed certificate to configure your Kubernetes cluster. +You can configure a {product-very-short} instance with a Transport Layer Security (TLS) connection in a Kubernetes cluster, such as an Azure Red Hat OpenShift (ARO) cluster, any cluster from a supported cloud provider, or your own cluster with proper configuration. Communication between the {product-very-short} and the cluster is enabled by using the Transport Layer Security (TLS). Users can encrypt data and verify identity. However, you must use a public Certificate Authority (CA)-signed certificate to configure your Kubernetes cluster. .Prerequisites From b1a31591a71562735b392668490a9cca43db388f Mon Sep 17 00:00:00 2001 From: jmagak Date: Wed, 27 Nov 2024 19:53:44 +0100 Subject: [PATCH 2/2] Updates the context --- ...roc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc b/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc index 46d680da52..1b6c85af69 100644 --- a/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc +++ b/modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc @@ -1,7 +1,7 @@ [id="proc-configuring-an-rhdh-instance-with-tls-in-kubernetes_{context}"] = Configuring an {product-very-short} instance with a TLS connection in Kubernetes -You can configure a {product-very-short} instance with a Transport Layer Security (TLS) connection in a Kubernetes cluster, such as an Azure Red Hat OpenShift (ARO) cluster, any cluster from a supported cloud provider, or your own cluster with proper configuration. Communication between the {product-very-short} and the cluster is enabled by using the Transport Layer Security (TLS). Users can encrypt data and verify identity. However, you must use a public Certificate Authority (CA)-signed certificate to configure your Kubernetes cluster. +You can configure a {product-very-short} instance with a Transport Layer Security (TLS) connection in a Kubernetes cluster, such as an Azure Red Hat OpenShift (ARO) cluster, any cluster from a supported cloud provider, or your own cluster with proper configuration. Transport Layer Security (TLS) ensures a secure connection for the {product-very-short} instance with other entities, such as third-party applications, or external databases. However, you must use a public Certificate Authority (CA)-signed certificate to configure your Kubernetes cluster. .Prerequisites