Skip to content

Commit

Permalink
RED-64539 - replacing namespace placeholders with the name "demo"
Browse files Browse the repository at this point in the history
this is to improve clarity of the doc, and be consistent with the "demo" namespace that is used in the examples in the doc
  • Loading branch information
randv1r committed Nov 14, 2021
1 parent 900cc39 commit 97982de
Showing 1 changed file with 7 additions and 5 deletions.
12 changes: 7 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,8 @@ The "Basic" installation deploys the operator (from the current release) from Do
This is the fastest way to get up and running with a new Redis Enterprise on Kubernetes.

1. Create a new namespace:
> Note:
For the purpose of this doc, we'll use the name "demo" for our cluster's namespace.

```bash
kubectl create namespace demo
Expand Down Expand Up @@ -111,16 +113,18 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
NAME TYPE DATA AGE
admission-tls Opaque 2 2m43s
```
> **Note:** If you're not using multiple namespaces you may proceed to step 6.

* Enable the Kubernetes webhook using the generated certificate

**NOTE**: One must replace REPLACE_WITH_NAMESPACE in the following command with the namespace the REC was installed into.
* Save the certificate into a local environmental variable
```shell script
CERT=`kubectl get secret admission-tls -o jsonpath='{.data.cert}'`
```
* Create a patch file
```shell script
sed 's/NAMESPACE_OF_SERVICE_ACCOUNT/REPLACE_WITH_NAMESPACE/g' admission/webhook.yaml | kubectl create -f -
sed 's/NAMESPACE_OF_SERVICE_ACCOUNT/demo/g' admission/webhook.yaml | kubectl create -f -
cat > modified-webhook.yaml <<EOF
webhooks:
Expand Down Expand Up @@ -264,12 +268,10 @@ Other custom configurations are referenced in this repository.
```
* Enable the Kubernetes webhook using the generated certificate
**NOTE**: One must replace REPLACE_WITH_NAMESPACE in the following command with the namespace the REC was installed into.
```shell script
# save cert
CERT=`kubectl get secret admission-tls -o jsonpath='{.data.cert}'`
sed 's/NAMESPACE_OF_SERVICE_ACCOUNT/REPLACE_WITH_NAMESPACE/g' admission/webhook.yaml | kubectl create -f -
sed 's/NAMESPACE_OF_SERVICE_ACCOUNT/demo/g' admission/webhook.yaml | kubectl create -f -
# create patch file
cat > modified-webhook.yaml <<EOF
Expand Down

0 comments on commit 97982de

Please sign in to comment.