@@ -60,27 +60,18 @@ services:
6060local networking between internal Sourcegraph services.</Callout>
6161
6262# # Docker networking configuration
63- To avoid IP range collisions with the host network, it is recommended to explicitly configure a CIDR range for the
64- Docker network.
65-
66- ` ` ` yaml
67- networks:
68- default:
69- ipam:
70- driver: default
71- config:
72- - subnet: "172.20.2.0/27" # CIDR range for the Docker network that doesn't overlap with the host network.
73- ` ` `
63+ If there is an IP conflict on between the host network and the Docker network, you may need to configure the docker CIDR
64+ range in the docker-compose override file.
7465
7566Additional information on docker networking can be found here :
7667* [Docker networking overview](https://docs.docker.com/network/)
7768* [Networking in Compose](https://docs.docker.com/compose/how-tos/networking/)
7869
79- # # Configuring TLS certificates for private networks
70+ # # Trusting TLS certificates using internal PKI
8071
81- When deploying Sourcegraph in private networks, you'll often need to configure TLS certificates to establish trusted
82- connections with internal services like code hosts. The recommended approach is to configure root CA certificates
83- through Sourcegraph's site configuration using `tls.external` in the `experimentalFeatures` section .
72+ If your organization uses internal Public Key Infrastructure to manage TLS certificates, you may need to configure your
73+ Sourcegraph instance to trust your internal Root Certificate Authorities, so your instance can connect to other internal
74+ services, ex. code hosts, authentication providers, etc .
8475
8576This method offers several advantages :
8677- Works consistently across both Cloud and self-hosted deployments
0 commit comments