diff --git a/doc/user-guides/secure-protect-connect.md b/doc/user-guides/secure-protect-connect.md index fbceaa835..1b8decbd5 100644 --- a/doc/user-guides/secure-protect-connect.md +++ b/doc/user-guides/secure-protect-connect.md @@ -80,7 +80,7 @@ spec: name: glbc-ca EOF -k wait tlspolicy api-gateway-tls -n kuadrant-system --for=condition=ready +kubectl wait tlspolicy api-gateway-tls -n kuadrant-system --for=condition=ready ``` @@ -95,7 +95,7 @@ Lets define a HTTPRoute and test our policy. We will re-use this with some of th export INGRESS_PORT=$(kubectl get gtw api-gateway -o jsonpath='{.spec.listeners[?(@.name=="api")].port}' -n kuadrant-system) -export INGRESS_PORT=$(kubectl get gtw api-gateway -o jsonpath='{.spec.listeners[?(@.name=="api")].port}' -n kuadrant-system) +export INGRESS_HOST=$(kubectl get gtw api-gateway -o jsonpath='{.status.addresses[0].value}' -n kuadrant-system) export GATEWAY_URL=$INGRESS_HOST:$INGRESS_PORT @@ -168,7 +168,7 @@ spec: EOF -k wait ratelimitpolicy infra-ratelimit -n kuadrant-system --for=condition=available +kubectl wait ratelimitpolicy infra-ratelimit -n kuadrant-system --for=condition=available ``` @@ -182,7 +182,7 @@ Here we should see `409s` start returning after the 5th request. ### Define a Gateway `AuthPolicy` -So communication is secured and we have some protection for our infrastrucure, but we do not trust any client to access our endpoints. By default we want to allow only authenticated access. To protect our gateway we will add a `DENY ALL` `AuthPolicy`. Later we will override this with a specific `AuthPolicy` for the API. +So communication is secured and we have some protection for our infrastructure, but we do not trust any client to access our endpoints. By default we want to allow only authenticated access. To protect our gateway we will add a `DENY ALL` `AuthPolicy`. Later we will override this with a specific `AuthPolicy` for the API. ``` kubectl --context kind-kuadrant-local apply -f - <