Skip to content

Commit 4501813

Browse files
committed
docs: updated private-network docs
* removed docker-compose networking recommendations * updated TLS certificate section heading and overview
1 parent fbba25a commit 4501813

File tree

1 file changed

+6
-15
lines changed

1 file changed

+6
-15
lines changed

docs/admin/config/private-network.mdx

Lines changed: 6 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -60,27 +60,18 @@ services:
6060
local networking between internal Sourcegraph services.</Callout>
6161

6262
## Docker networking configuration
63-
To avoid IP range collisions with the host network, it is recommended to explicitly configure a CIDR range for the
64-
Docker network.
65-
66-
```yaml
67-
networks:
68-
default:
69-
ipam:
70-
driver: default
71-
config:
72-
- subnet: "172.20.2.0/27" # CIDR range for the Docker network that doesn't overlap with the host network.
73-
```
63+
If there is an IP conflict on between the host network and the Docker network, you may need to configure the docker CIDR
64+
range in the docker-compose override file.
7465

7566
Additional information on docker networking can be found here:
7667
* [Docker networking overview](https://docs.docker.com/network/)
7768
* [Networking in Compose](https://docs.docker.com/compose/how-tos/networking/)
7869

79-
## Configuring TLS certificates for private networks
70+
## Trusting TLS certificates using internal PKI
8071

81-
When deploying Sourcegraph in private networks, you'll often need to configure TLS certificates to establish trusted
82-
connections with internal services like code hosts. The recommended approach is to configure root CA certificates
83-
through Sourcegraph's site configuration using `tls.external` in the `experimentalFeatures` section.
72+
If your organization uses internal Public Key Infrastructure to manage TLS certificates, you may need to configure your
73+
Sourcegraph instance to trust your internal Root Certificate Authorities, so your instance can connect to other internal
74+
services, ex. code hosts, authentication providers, etc.
8475

8576
This method offers several advantages:
8677
- Works consistently across both Cloud and self-hosted deployments

0 commit comments

Comments
 (0)