Skip to content

Commit 7ad480a

Browse files
committed
more descriptions
1 parent 70f203b commit 7ad480a

5 files changed

+5
-1
lines changed

modules/guides/pages/custom-images.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
= Using customized product images
2-
32
:stackable-docker-registry: https://repo.stackable.tech/#browse/browse:docker:v2%2Fstackable
43
:kind: https://kind.sigs.k8s.io/
54
:kind-load-image: https://kind.sigs.k8s.io/docs/user/quick-start/#loading-an-image-into-your-cluster
5+
:description: Customize Stackable product images by modifying base images, deploying to a registry or Kubernetes cluster, and configuring your Stacklet to use them.
66

77
The Stackable operator require a certain structure inside the product images, but modifications can be made.
88
This is useful to for example load additional extensions or database drivers into an image.

modules/guides/pages/enabling-verification-of-image-signatures.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
= Enabling verification of image signatures
22
:page-aliases: tutorials:enabling-verification-of-image-signatures.adoc
3+
:description: Learn to enable and verify image signatures in Kubernetes using Sigstore’s Policy Controller, ensuring image authenticity and security in your cluster.
34

45
Image signing is a security measure that helps ensure the authenticity and integrity of container images. Starting with SDP 23.11, all our images are signed https://docs.sigstore.dev/cosign/openid_signing/["keyless"]. By verifying these signatures, cluster administrators can ensure that the images pulled from Stackable's container registry are authentic and have not been tampered with.
56
Since Kubernetes does not have native support for verifying image signatures yet, we will use Sigstore's https://docs.sigstore.dev/policy-controller/overview/[Policy Controller] in this tutorial.

modules/guides/pages/providing-resources-with-pvcs.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
:pvcs: https://kubernetes.io/docs/concepts/storage/persistent-volumes/
44
:pvc-capacity: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#capacity
55
:pvc-access-modes: https://kubernetes.io/docs/concepts/storage/persistent-volumes/#access-modes
6+
:description: Learn how to use PersistentVolumeClaims to provide external resources to Stacklets in Kubernetes, including access modes, node selection, and practical examples.
67

78
Several of the tools on the Stackable platform can use external resources that the cluster administrator makes available via a PersistentVolume.
89
Airflow users can access DAG jobs this way, and Spark users can do the same for data or other job dependencies, to name just two examples.

modules/guides/pages/running-stackable-in-an-airgapped-environment.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
= Running Stackable in an air-gapped environment
22
:page-aliases: tutorials:running-stackable-in-an-airgapped-environment.adoc
3+
:description: Learn how to run Stackable in an air-gapped environment by mirroring images, setting up a reverse proxy, and configuring container runtimes.
34

45
The main challenge with running Stackable in an air-gapped environment is how to get the artifacts (container images and Helm charts) into the environment. There are a few ways to do this:
56

modules/guides/pages/viewing-and-verifying-sboms.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
= Viewing and verifying SBOMs of the Stackable Data Platform
22
:page-aliases: tutorials:viewing-and-verifying-sboms.adoc
3+
:description: Learn to view and verify SBOMs for Stackable Data Platform using CycloneDX standards and cosign. Ensure SBOM authenticity with Policy Controller.
34

45
With release 24.3 of SDP, we started providing SBOMs (Software Bill of Materials) for our container images. Please note that they currently are in a draft stage and we are continually working on improving them. As a first step, we aim to provide a list of all primary (top level) components and their versions included in each container image. Our SBOMs follow the https://cyclonedx.org/[CycloneDX] standard and are available in JSON format.
56

0 commit comments

Comments
 (0)