Skip to content

Commit 55b58ed

Browse files
committed
enhancements to documentation
1 parent 78d3beb commit 55b58ed

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

documentation/modules/ROOT/pages/02-architecture.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -67,13 +67,13 @@ Refer to the https://developers.redhat.com/articles/2024/06/12/getting-started-r
6767
6868
.. https://gateway-api.sigs.k8s.io/api-types/gateway/[*Gateway*^]: create a new Gateway (using the Gateway API and Istio-based controllers) as an entrypoint for all requests to Globex's system. The Gateway uses the TLS Certificates created by the TLS Issuer. Also a number of policies are setup to secure and protect the Gateway.
6969
70-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/tls/[*TLS Policy*^]: leverages the TLS-issuer/CertificateIssuer to set up TLS certificates for the listeners defined within the Gateway. Listeners define the hostname for the various incoming requests and is denoted with a wildcard hostname based on the root domain. These gateways can use a subdomain of the Managed Zone. E.g. `*.managed.globex.com`.
70+
.. *TLS Policy*: leverages the TLS-issuer/CertificateIssuer to set up TLS certificates for the listeners defined within the Gateway. Listeners define the hostname for the various incoming requests and is denoted with a wildcard hostname based on the root domain. These gateways can use a subdomain of the Managed Zone. E.g. `*.managed.globex.com`.
7171
72-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/auth/[*Auth Policy*^]: setup a zero-trust deny-all policy that result in a default 403 response for any unprotected endpoints.
72+
.. *Auth Policy*: setup a zero-trust deny-all policy that result in a default 403 response for any unprotected endpoints.
7373
74-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/dns/[*DNS Policy*^]: provide DNS management by managing the lifecycle of DNS records to setup ingress connectivity using DNS to bring traffic to the Gateway.
74+
.. *DNS Policy*: provide DNS management by managing the lifecycle of DNS records to setup ingress connectivity using DNS to bring traffic to the Gateway.
7575
76-
.. https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/rate-limiting/[*RateLimit Policy*^]: set up a default artificially low global limit to further protect any endpoints exposed by this Gateway.
76+
.. *RateLimit Policy*^: set up a default, artificially low, global limit to further protect any endpoints exposed by this Gateway.
7777
====
7878

7979
. *Developer/Application owners* workflow: +
@@ -140,7 +140,7 @@ If needed, one can create the certificates manually and inject them, rather than
140140

141141
video::euWAMvQojP4[youtube, width=800, height=480]
142142

143-
It enables platform engineers and application developers to easily connect, secure, and protect their services and infrastructure across multiple clusters. It exposes these capabilities in the form of powerful policy APIs that implement the https://gateway-api.sigs.k8s.io/[Gateway API^] concept of https://gateway-api.sigs.k8s.io/reference/policy-attachment/[policy attachment^] - with policies for https://docs.kuadrant.io/latest/kuadrant-operator/doc/tls/[TLS^], https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/reference/dnspolicy/[DNS^], application https://docs.kuadrant.io/latest/kuadrant-operator/doc/auth/[AuthN & AuthZ^], and https://docs.kuadrant.io/latest/kuadrant-operator/doc/rate-limiting/[rate limiting^]. Additionally, Kuadrant offers observability templates to further support infrastructure management.
143+
It enables platform engineers and application developers to easily connect, secure, and protect their services and infrastructure across multiple clusters. It exposes these capabilities in the form of powerful policy APIs that implement the https://gateway-api.sigs.k8s.io/[Gateway API^] concept of https://gateway-api.sigs.k8s.io/reference/policy-attachment/[policy attachment^] - with policies for https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/tls/[TLS^], https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/dns/[DNS^], application https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/auth/[AuthN & AuthZ^], and https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/rate-limiting/[rate limiting^]. Additionally, Kuadrant offers observability templates to further support infrastructure management.
144144

145145

146146
Simply put, Red Hat Connectivity Link
@@ -177,7 +177,7 @@ DNS operator consumes DNSRecord resources that are configured via the *DNSPolicy
177177
==== Authorino Operator for Auth Policy
178178

179179
External authorization server fully manageable via Kubernetes Custom Resources. Supports JWT authentication, API key, mTLS, pattern-matching authz, OPA, K8s SA tokens, K8s RBAC, external metadata fetching, and more, with minimum to no coding at all, no rebuilding of your applications. +
180-
Ref: https://docs.kuadrant.io/0.8.0/authorino/
180+
Ref: https://docs.kuadrant.io/1.0.x/authorino/
181181

182182

183183
==== Limitador Operator for Ratelimits
@@ -203,7 +203,7 @@ Ref: https://gateway-api.sigs.k8s.io/reference/policy-attachment/
203203

204204
AuthPolicy and RateLimitPolicy can be attached to Gateways or to HTTPRoutes, with cascading effects through the hierarchy that result in one effective policy per gateway-route combination.
205205

206-
Ref: More about https://docs.kuadrant.io/0.8.0/architecture/rfcs/0009-defaults-and-overrides/#policy-spec-resembling-more-the-target-spec[defaults and overrides^]
206+
Ref: More about https://docs.kuadrant.io/1.0.x/architecture/rfcs/0009-defaults-and-overrides/[defaults and overrides^]
207207

208208
// For example, we can apply a RateLimit Policy to a Gateway which will by *default* be applied across all the resources (such as HTTPRoute) attached to it. But developers might want to apply different rate limits based on the service endpoint they are exposing. This could be higher than the Gateway's rate limits for inexpensive requests, or could be quite low if for e.g., they would like to expose an LLM API as a service. This can be achieved by applying another RateLimit Policy to the HTTPRoute thereby *overriding* the default value.
209209

documentation/modules/ROOT/pages/03.1-platform.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
The ansible scripts we just run has setup the following as ArgoCD applicatiopns:
1414

15-
* Red Hat Connectivity Link/Kuadrant operator and a Kuadrant instance
15+
* Red Hat Connectivity Link operator and a Kuadrant instance
1616
* A TLS issuer for TLS certificates. [https://console-openshift-console.%OPENSHIFTSUBDOMAIN%/k8s/cluster/cert-manager.io\~v1~ClusterIssuer/prod-web-lets-encrypt-issuer/yaml[View CR^]]
1717
+
1818
.[underline]#Click to see an example and description#
@@ -303,7 +303,7 @@ spec:
303303
----
304304
for i in {1..10}; do curl -k -w "%{http_code}" https://echo.globex.%AWSROOTZONE%; done
305305
----
306-
* Learn more about Rate Limiting https://docs.kuadrant.io/0.8.0/kuadrant-operator/doc/rate-limiting/[here^]
306+
* Learn more about Rate Limiting https://docs.kuadrant.io/1.0.x/kuadrant-operator/doc/overviews/rate-limiting/[here^]
307307

308308

309309
=== What's next

documentation/modules/ROOT/pages/03.3-observability.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,4 +74,4 @@ With this setup, Globex is all set to onboard further service enpoints to be acc
7474

7575
We will also extend this pattern to include the all important Observability aspects as well.
7676

77-
Read more https://docs.kuadrant.io/0.8.0/architecture/docs/design/architectural-overview-v1/#multi-cluster[here^]
77+
Read more https://docs.kuadrant.io/1.0.x/architecture/docs/design/architectural-overview-v1/#multi-cluster[here^]

0 commit comments

Comments
 (0)