Skip to content

Commit 4588bbe

Browse files
Apply suggestions from code review
Co-authored-by: David Dougherty <[email protected]>
1 parent cf8f2e8 commit 4588bbe

File tree

4 files changed

+16
-16
lines changed

4 files changed

+16
-16
lines changed

content/operate/kubernetes/networking/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Configure networking and external access for your Redis Enterprise deployment on
1717

1818
Connect applications to your Redis Enterprise databases:
1919

20-
- [Database connectivity]({{< relref "/operate/kubernetes/networking/database-connectivity" >}}) - Comprehensive guide to in-cluster and external database access, service discovery, and credentials management
20+
- [Database connectivity]({{< relref "/operate/kubernetes/networking/database-connectivity" >}}) - Comprehensive guide to in-cluster and external database access, service discovery, and credentials management.
2121

2222
## External routing methods
2323

content/operate/kubernetes/networking/database-connectivity.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ When you create a RedisEnterpriseDatabase (REDB), the Redis Enterprise operator
2020

2121
By default, the operator creates two services for each database:
2222

23-
- ClusterIP service - Provides a stable cluster-internal IP address
24-
- Headless service - Enables direct pod-to-pod communication and service discovery
23+
- ClusterIP service - Provides a stable cluster-internal IP address.
24+
- Headless service - Enables direct pod-to-pod communication and service discovery.
2525

2626
Both services are created in the same namespace as your database and follow predictable naming conventions.
2727

@@ -139,9 +139,9 @@ See [OpenShift routes]({{< relref "/operate/kubernetes/networking/routes" >}}) f
139139
140140
### Default port behavior
141141
142-
- Redis Enterprise databases use dynamic port allocation
143-
- Port numbers are assigned automatically during database creation
144-
- The actual port is stored in the database secret
142+
- Redis Enterprise databases use dynamic port allocation.
143+
- Port numbers are assigned automatically during database creation.
144+
- The actual port is stored in the database secret.
145145
146146
### Custom port configuration
147147
@@ -264,10 +264,10 @@ client.on('connect', () => {
264264

265265
### Common issues
266266

267-
1. Connection refused - Verify service names and ports from the database secret
268-
2. Authentication failed - Check password encoding and special characters
269-
3. DNS resolution - Ensure applications use correct service FQDNs
270-
4. Network policies - Verify Kubernetes network policies allow traffic
267+
1. Connection refused - Verify service names and ports from the database secret.
268+
2. Authentication failed - Check password encoding and special characters.
269+
3. DNS resolution - Ensure applications use correct service FQDNs.
270+
4. Network policies - Verify Kubernetes network policies allow traffic.
271271

272272
### Debugging steps
273273

content/operate/kubernetes/re-databases/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Explore advanced database features and configurations:
3737

3838
Connect applications to your Redis Enterprise databases:
3939

40-
- [Database connectivity]({{< relref "/operate/kubernetes/networking/database-connectivity" >}}) - Comprehensive guide to in-cluster and external database access, service discovery, and credentials management
40+
- [Database connectivity]({{< relref "/operate/kubernetes/networking/database-connectivity" >}}) - Comprehensive guide to in-cluster and external database access, service discovery, and credentials management.
4141
- [Networking]({{< relref "/operate/kubernetes/networking" >}}) - Configure ingress, routes, and service exposure for database access
4242
- [Security]({{< relref "/operate/kubernetes/security" >}}) - Set up TLS, authentication, and access control for secure database connections
4343

content/operate/kubernetes/security/configuration-secrets.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,11 +81,11 @@ kubectl create secret generic <secret-name> \
8181

8282
## Best practices
8383

84-
- Store sensitive configuration in Secrets rather than directly in YAML files
85-
- Use `--from-file` to avoid manual base64 encoding
86-
- Create secrets in the same namespace as your REC or REDB resources
87-
- Use descriptive secret names for easy identification
88-
- Regularly rotate certificates and update secrets
84+
- Store sensitive configuration in Secrets rather than directly in YAML files.
85+
- Use `--from-file` to avoid manual base64 encoding.
86+
- Create secrets in the same namespace as your REC or REDB resources.
87+
- Use descriptive secret names for easy identification.
88+
- Regularly rotate certificates and update secrets.
8989

9090
## See also
9191

0 commit comments

Comments
 (0)