Skip to content

Commit e1c8cbb

Browse files
committed
Fixed links / formatting
1 parent d686310 commit e1c8cbb

File tree

2 files changed

+3
-4
lines changed

2 files changed

+3
-4
lines changed

modules/tutorials/nav.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,3 +2,4 @@
22
** xref:authentication_with_openldap.adoc[]
33
** xref:logging-vector-aggregator.adoc[]
44
** xref:enabling_verification_of_image_signatures.adoc[]
5+
** xref:running_stackable_in_an_airgapped_environment.adoc[]

modules/tutorials/pages/running_stackable_in_an_airgapped_environment.adoc

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,6 @@ Modify your containerd config (usually located at `/etc/containerd/config.toml`)
2828
[plugins."io.containerd.grpc.v1.cri".registry]
2929
config_path = "/etc/containerd/certs.d"
3030
----
31-
Then restart the `containerd` service.
32-
+
33-
For further information, see https://github.com/containerd/containerd/blob/main/docs/cri/config.md#registry-configuration["Registry configuration"].
31+
Then restart the `containerd` service. For further information, see https://github.com/containerd/containerd/blob/main/docs/cri/config.md#registry-configuration["Registry configuration"].
3432
35-
* Add an alias for `oci.stackable.tech` to the `/etc/hosts` file on every node (like `10.7.228.12 oci.stackable.tech`), issue a self-signed certificate for `oci.stackable.tech` to your registry and add the certificate to the trusted certificates on every node. Note that if you also want to enforce signature checks for Stackable's images via a policy controller, you will need to add this host alias to the Pod of the policy controller as well (and make it trust the certificate). Learn more about image signature verification xref:concepts:enabling_verification_of_image_signatures.adoc[here].
33+
* Add an alias for `oci.stackable.tech` to the `/etc/hosts` file on every node (like `10.7.228.12 oci.stackable.tech`), issue a self-signed certificate for `oci.stackable.tech` to your registry and add the certificate to the trusted certificates on every node. Note that if you also want to enforce signature checks for Stackable's images via a policy controller, you will need to add this host alias to the Pod of the policy controller as well (and make it trust the certificate). Learn more about image signature verification xref:tutorials:enabling_verification_of_image_signatures.adoc[here].

0 commit comments

Comments
 (0)