Skip to content

Commit

Permalink
update
Browse files Browse the repository at this point in the history
  • Loading branch information
karl-johan-grahn committed Jan 10, 2025
1 parent 4c5e702 commit 9802a76
Show file tree
Hide file tree
Showing 7 changed files with 9 additions and 9 deletions.
2 changes: 1 addition & 1 deletion content/about/key-features.md
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ More details on [Sandboxes](../tutorials/tenant/create-sandbox.md)

Multi Tenant Operator supports cloning of secrets and configmaps from one namespace to another namespace based on label selectors. It uses templates to enable users to provide reference to secrets and configmaps. It uses a template group instance to distribute those secrets and namespaces in matching namespaces, even if namespaces belong to different tenants. If template instance is used then the resources will only be mapped if namespaces belong to same tenant.

More details on [Copying Secrets and ConfigMaps](../tutorials/distributing-resources/copying-resources.md)
More details on [Copying Secrets and Configmaps](../tutorials/distributing-resources/copying-resources.md)

### Self-Service

Expand Down
2 changes: 1 addition & 1 deletion content/crds-api-reference/integration-config.md
Original file line number Diff line number Diff line change
Expand Up @@ -502,7 +502,7 @@ argocd:

### Vault

[Vault](https://www.vaultproject.io/) is used to secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API.
[Vault](https://www.vaultproject.io/) is used to secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or http API.

If `vault` is configured on a cluster, then Vault configuration can be enabled.

Expand Down
2 changes: 1 addition & 1 deletion content/how-to-guides/deploying-private-helm-charts.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Multi Tenant Operator will pick up the credentials from the mentioned namespace

Afterward, Bill can see that manifests in the chart have been successfully created in all label matching namespaces.

## Deploying Helm Chart to Namespaces via TemplateGroupInstances from HTTPS Registry
## Deploying Helm Chart to Namespaces via TemplateGroupInstances from `HTTPS` Registry

Bill, the cluster admin, wants to deploy a helm chart from `HTTPS` registry in namespaces where certain labels exists.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ spec:

Bill has added support for a new label `distribute-image-pull-secret: true"` for tenant projects/namespaces, now MTO will add that label depending on the used field.

Finally, Bill creates a `TemplateGroupInstance` which will deploy the sealed secrets using the newly created project label and template.
Finally, Bill creates a `TemplateGroupInstance` which will deploy the Sealed Secrets using the newly created project label and template:

```yaml
apiVersion: tenantoperator.stakater.com/v1alpha1
Expand All @@ -86,4 +86,4 @@ spec:
sync: true
```

MTO will now deploy the sealed secrets mentioned in `Template` to namespaces which have the mentioned label. The rest of the work to deploy secret from a sealed secret has to be done by Sealed Secrets Controller.
MTO will now deploy the Sealed Secrets mentioned in `Template` to namespaces which have the mentioned label. The rest of the work to deploy secret from a Sealed Secret has to be done by Sealed Secrets Controller.
2 changes: 1 addition & 1 deletion content/how-to-guides/enabling-multi-tenancy-vault.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Configuring Vault in IntegrationConfig

[Vault](https://www.vaultproject.io/) is used to secure, store and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API.
[Vault](https://www.vaultproject.io/) is used to secure, store and tightly control access to tokens, passwords, certificates, and encryption keys for protecting secrets and other sensitive data using a UI, CLI, or http API.

To enable Vault multi-tenancy, a role has to be created in Vault under [Kubernetes authentication](https://developer.hashicorp.com/vault/docs/auth/kubernetes) with the following permissions:

Expand Down
4 changes: 2 additions & 2 deletions content/how-to-guides/integrating-vault.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ This guide provides step-by-step instructions for integrating **Vault** with **K
## Prerequisites

- Microsoft Entra ID configured for OIDC.
- Keycloak setup with an Identity Provider (IdP) pointing to Microsoft Entra ID.
- Keycloak setup with an Identity Provider (IDP) pointing to Microsoft Entra ID.
- HashiCorp Vault installed and configured.
- [Vault Configured in IntegrationConfig](enabling-multi-tenancy-vault.md)

Expand All @@ -32,7 +32,7 @@ This guide provides step-by-step instructions for integrating **Vault** with **K
- Claim: groups
- Sync Mode: FORCE

![Keycloak IdP Mapper showing how the group IDs claim is mapped to the user attribute.](../images/keycloak-idp-mapper.png)
![Keycloak IDP Mapper showing how the group IDs claim is mapped to the user attribute.](../images/keycloak-idp-mapper.png)

### Step 3: Set Up a Mapper for Vault Client in Keycloak

Expand Down
2 changes: 1 addition & 1 deletion content/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ If the user needs to be added immediately and it is not feasible to wait for nex

## Pod Creation Error

### Q. Errors in ReplicaSet Events about pods not being able to schedule on OpenShift because scc annotation is not found
### Q. Errors in ReplicaSet Events about pods not being able to schedule on OpenShift because SCC annotation is not found

```terminal
unable to find annotation openshift.io/sa.scc.uid-range
Expand Down

0 comments on commit 9802a76

Please sign in to comment.