mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-24 15:09:39 -05:00
docs: minor
This commit is contained in:
parent
69c64d6c69
commit
5f249eedcb
@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b
|
||||
|
||||
## About observability
|
||||
|
||||
Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces.
|
||||
Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces.
|
||||
In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation.
|
||||
Learn more about the [observability capabilities in Constellation](./observability.md).
|
||||
|
@ -98,7 +98,7 @@ This will bring you to an overview of your buckets.
|
||||
If you want to deploy Filestash in production, take a look at its [documentation](https://www.filestash.app/docs/).
|
||||
|
||||
5. To see the logs of s3proxy intercepting requests made to S3, run: `kubectl logs -f pod/$(kubectl get pod --selector='app=s3proxy' -o=jsonpath='{.items[*].metadata.name}')`
|
||||
Look out for log messages labeled "intercepting".
|
||||
Look out for log messages labeled `intercepting`.
|
||||
There is one such log message for each message that's encrypted, decrypted, or blocked.
|
||||
|
||||
6. Once you have uploaded a file with Filestash, you should be able to view the file in Filestash.
|
||||
|
@ -171,20 +171,6 @@ If you encounter any problem with the following steps, make sure to use the [lat
|
||||
|
||||
:::
|
||||
|
||||
:::note
|
||||
|
||||
**AWS**: Currently, confidential VMs may temporarily fail to boot.
|
||||
AWS is actively working on a solution.
|
||||
If creating or initializing a cluster fails, terminate the cluster and try again later.
|
||||
Alternatively, you can use non-confidential Nitro VMs for evaluation purposes.
|
||||
To do so, generate a new configuration with the `aws-nitro-tpm` attestation variant:
|
||||
|
||||
```bash
|
||||
constellation config generate aws --attestation aws-nitro-tpm
|
||||
```
|
||||
|
||||
:::
|
||||
|
||||
5. Configure kubectl.
|
||||
|
||||
```bash
|
||||
|
@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b
|
||||
|
||||
## About observability
|
||||
|
||||
Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces.
|
||||
Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces.
|
||||
In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation.
|
||||
Learn more about the [observability capabilities in Constellation](./observability.md).
|
||||
|
@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b
|
||||
|
||||
## About observability
|
||||
|
||||
Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces.
|
||||
Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces.
|
||||
In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation.
|
||||
Learn more about the [observability capabilities in Constellation](./observability.md).
|
||||
|
@ -98,7 +98,7 @@ This will bring you to an overview of your buckets.
|
||||
If you want to deploy Filestash in production, take a look at its [documentation](https://www.filestash.app/docs/).
|
||||
|
||||
5. To see the logs of s3proxy intercepting requests made to S3, run: `kubectl logs -f pod/$(kubectl get pod --selector='app=s3proxy' -o=jsonpath='{.items[*].metadata.name}')`
|
||||
Look out for log messages labeled "intercepting".
|
||||
Look out for log messages labeled `intercepting`.
|
||||
There is one such log message for each message that's encrypted, decrypted, or blocked.
|
||||
|
||||
6. Once you have uploaded a file with Filestash, you should be able to view the file in Filestash.
|
||||
|
Loading…
Reference in New Issue
Block a user