@@ -60,27 +60,18 @@ services:
6060local networking between internal Sourcegraph services.</Callout> 
6161
6262# # Docker networking configuration
63- To avoid IP range collisions with the host network, it is recommended to explicitly configure a CIDR range for the 
64- Docker network. 
65- 
66- ` ` ` yaml
67- networks: 
68-   default: 
69-     ipam: 
70-       driver: default 
71-       config: 
72-         - subnet: "172.20.2.0/27" # CIDR range for the Docker network that doesn't overlap with the host network. 
73- ` ` ` 
63+ If there is an IP conflict on between the host network and the Docker network, you may need to configure the docker CIDR 
64+ range in the docker-compose override file. 
7465
7566Additional information on docker networking can be found here :
7667* [Docker networking overview](https://docs.docker.com/network/) 
7768* [Networking in Compose](https://docs.docker.com/compose/how-tos/networking/) 
7869
79- # # Configuring  TLS certificates for private networks 
70+ # # Trusting  TLS certificates using internal PKI 
8071
81- When deploying Sourcegraph in private networks, you'll often need  to configure  TLS certificates  to establish trusted 
82- connections with internal services like code hosts. The recommended approach is to configure root CA certificates 
83- through Sourcegraph's site configuration using `tls.external` in the `experimentalFeatures` section .
72+ If your organization uses internal Public Key Infrastructure  to manage  TLS certificates, you may need  to configure your 
73+ Sourcegraph instance to trust your internal Root Certificate Authorities, so your instance can connect to other internal 
74+ services, ex. code hosts, authentication providers, etc .
8475
8576This method offers several advantages :
8677- Works consistently across both Cloud and self-hosted deployments 
0 commit comments