diff --git a/docs/docs/architecture/overview.md b/docs/docs/architecture/overview.md index b7049b441..386f93b2f 100644 --- a/docs/docs/architecture/overview.md +++ b/docs/docs/architecture/overview.md @@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b ## About observability -Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces. +Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces. In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation. Learn more about the [observability capabilities in Constellation](./observability.md). diff --git a/docs/docs/getting-started/examples/filestash-s3proxy.md b/docs/docs/getting-started/examples/filestash-s3proxy.md index fb96e4d11..b9a394256 100644 --- a/docs/docs/getting-started/examples/filestash-s3proxy.md +++ b/docs/docs/getting-started/examples/filestash-s3proxy.md @@ -98,7 +98,7 @@ This will bring you to an overview of your buckets. If you want to deploy Filestash in production, take a look at its [documentation](https://www.filestash.app/docs/). 5. To see the logs of s3proxy intercepting requests made to S3, run: `kubectl logs -f pod/$(kubectl get pod --selector='app=s3proxy' -o=jsonpath='{.items[*].metadata.name}')` -Look out for log messages labeled "intercepting". +Look out for log messages labeled `intercepting`. There is one such log message for each message that's encrypted, decrypted, or blocked. 6. Once you have uploaded a file with Filestash, you should be able to view the file in Filestash. diff --git a/docs/docs/getting-started/first-steps.md b/docs/docs/getting-started/first-steps.md index 1b155f66c..040be5478 100644 --- a/docs/docs/getting-started/first-steps.md +++ b/docs/docs/getting-started/first-steps.md @@ -171,20 +171,6 @@ If you encounter any problem with the following steps, make sure to use the [lat ::: - :::note - - **AWS**: Currently, confidential VMs may temporarily fail to boot. - AWS is actively working on a solution. - If creating or initializing a cluster fails, terminate the cluster and try again later. - Alternatively, you can use non-confidential Nitro VMs for evaluation purposes. - To do so, generate a new configuration with the `aws-nitro-tpm` attestation variant: - - ```bash - constellation config generate aws --attestation aws-nitro-tpm - ``` - - ::: - 5. Configure kubectl. ```bash diff --git a/docs/versioned_docs/version-2.11/architecture/overview.md b/docs/versioned_docs/version-2.11/architecture/overview.md index b7049b441..386f93b2f 100644 --- a/docs/versioned_docs/version-2.11/architecture/overview.md +++ b/docs/versioned_docs/version-2.11/architecture/overview.md @@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b ## About observability -Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces. +Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces. In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation. Learn more about the [observability capabilities in Constellation](./observability.md). diff --git a/docs/versioned_docs/version-2.12/architecture/overview.md b/docs/versioned_docs/version-2.12/architecture/overview.md index b7049b441..386f93b2f 100644 --- a/docs/versioned_docs/version-2.12/architecture/overview.md +++ b/docs/versioned_docs/version-2.12/architecture/overview.md @@ -25,6 +25,6 @@ Encryption of data at-rest, in-transit, and in-use is the fundamental building b ## About observability -Observability in Kubernetes refers to the capability to swiftly troubleshoot issues using telemetry signals such as logs, metrics, and traces. +Observability in Kubernetes refers to the capability to troubleshoot issues using telemetry signals such as logs, metrics, and traces. In the realm of Confidential Computing, it's crucial that observability aligns with confidentiality, necessitating careful implementation. Learn more about the [observability capabilities in Constellation](./observability.md). diff --git a/docs/versioned_docs/version-2.12/getting-started/examples/filestash-s3proxy.md b/docs/versioned_docs/version-2.12/getting-started/examples/filestash-s3proxy.md index fb96e4d11..b9a394256 100644 --- a/docs/versioned_docs/version-2.12/getting-started/examples/filestash-s3proxy.md +++ b/docs/versioned_docs/version-2.12/getting-started/examples/filestash-s3proxy.md @@ -98,7 +98,7 @@ This will bring you to an overview of your buckets. If you want to deploy Filestash in production, take a look at its [documentation](https://www.filestash.app/docs/). 5. To see the logs of s3proxy intercepting requests made to S3, run: `kubectl logs -f pod/$(kubectl get pod --selector='app=s3proxy' -o=jsonpath='{.items[*].metadata.name}')` -Look out for log messages labeled "intercepting". +Look out for log messages labeled `intercepting`. There is one such log message for each message that's encrypted, decrypted, or blocked. 6. Once you have uploaded a file with Filestash, you should be able to view the file in Filestash.