docs: minor

This commit is contained in:
Thomas Tendyck 2023-11-19 18:31:54 +01:00 committed by Thomas Tendyck
parent 69c64d6c69
commit 5f249eedcb
6 changed files with 5 additions and 19 deletions

View File

@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b
## About observability
Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces.
Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces.
In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation.
Learn more about the [observability capabilities in Constellation](./observability.md).

View File

@ -98,7 +98,7 @@ This will bring you to an overview of your buckets.
If you want to deploy Filestash in production, take a look at its [documentation](https://www.filestash.app/docs/).
5. To see the logs of s3proxy intercepting requests made to S3, run: `kubectl logs -f pod/$(kubectl get pod --selector='app=s3proxy' -o=jsonpath='{.items[*].metadata.name}')`
Look out for log messages labeled "intercepting".
Look out for log messages labeled `intercepting`.
There is one such log message for each message that's encrypted, decrypted, or blocked.
6. Once you have uploaded a file with Filestash, you should be able to view the file in Filestash.

View File

@ -171,20 +171,6 @@ If you encounter any problem with the following steps, make sure to use the [lat
:::
:::note
**AWS**: Currently, confidential VMs may temporarily fail to boot.
AWS is actively working on a solution.
If creating or initializing a cluster fails, terminate the cluster and try again later.
Alternatively, you can use non-confidential Nitro VMs for evaluation purposes.
To do so, generate a new configuration with the `aws-nitro-tpm` attestation variant:
```bash
constellation config generate aws --attestation aws-nitro-tpm
```
:::
5. Configure kubectl.
```bash

View File

@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b
## About observability
Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces.
Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces.
In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation.
Learn more about the [observability capabilities in Constellation](./observability.md).

View File

@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b
## About observability
Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces.
Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces.
In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation.
Learn more about the [observability capabilities in Constellation](./observability.md).

View File

@ -98,7 +98,7 @@ This will bring you to an overview of your buckets.
If you want to deploy Filestash in production, take a look at its [documentation](https://www.filestash.app/docs/).
5. To see the logs of s3proxy intercepting requests made to S3, run: `kubectl logs -f pod/$(kubectl get pod --selector='app=s3proxy' -o=jsonpath='{.items[*].metadata.name}')`
Look out for log messages labeled "intercepting".
Look out for log messages labeled `intercepting`.
There is one such log message for each message that's encrypted, decrypted, or blocked.
6. Once you have uploaded a file with Filestash, you should be able to view the file in Filestash.