-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update docs for Eventing TLS Beta #5967
Update docs for Eventing TLS Beta #5967
Conversation
✅ Deploy Preview for knative ready!Built without sensitive environment variables
To edit notification comments on pull requests, go to your Netlify site configuration. |
8875b7b
to
7919e4e
Compare
!!! important | ||
The `strict` is only enforced on the Broker and Channel receiver/ingress. Senders can still send | ||
events over plaintext HTTP. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pierDipi could we reword this? I find it a little confusing. To me, Senders can still send events over plaintext HTTP
sounds like I can still send my events over http to a broker. But, my understanding is that we are trying to say that when a broker or channel sends events to a subscriber, if that subscriber only has a HTTP address, the broker or channel will send the event with HTTP instead of HTTPS.
## Configure additional CA trust bundles | ||
|
||
By default, Eventing clients trusts the system root CA (public CA). | ||
|
||
If you need to add additional CA bundles for Eventing, you can do so by creating ConfigMaps in the | ||
`knative-eventing` namespace with label `networking.knative.dev/trust-bundle: true`: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe we can mention trust-manager here as a good way to do this?
@@ -208,7 +208,7 @@ Alternatively, if you are using a GitOps approach, you can add the `consumers` k | |||
|
|||
### Automatic Scaling with KEDA | |||
|
|||
Kafka Sources have experimental (Alpha) support for serverless scaling with KEDA, including scale to zero. If you want Knative and KEDA to scale your Kafka source for you, | |||
Kafka Sources have (Alpha) support for serverless scaling with KEDA, including scale to zero. If you want Knative and KEDA to scale your Kafka source for you, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Kafka Sources have (Alpha) support for serverless scaling with KEDA, including scale to zero. If you want Knative and KEDA to scale your Kafka source for you, | |
Kafka Sources and Brokers have (Alpha) support for serverless scaling with KEDA, including scale to zero. If you want Knative and KEDA to scale your Kafka source for you, |
Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
7919e4e
to
0499d92
Compare
@Cali0707 thanks, see latest commits! |
Signed-off-by: Pierangelo Di Pilato <pierdipi@redhat.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
The eventing features looks a lot clearer now, thanks @pierDipi !
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Cali0707, pierDipi The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Proposed Changes