Skip to content

Commit 806476d

Browse files
committed
Fixed wording, punctuation, grammar
Small changes according to doc style guide.
1 parent 79e31a4 commit 806476d

File tree

1 file changed

+9
-8
lines changed

1 file changed

+9
-8
lines changed

adoc/SAP-EIC-General.adoc

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ $ means that the command can be run by any user.
1616

1717

1818
# tag::disclaimer-production-versions[]
19-
IMPORTANT: If you want to use different versions of {slem} or {slm}, {rancher}, {rke} or {lh}, make sure to check the support matrix for the related solutions you want to use:
19+
IMPORTANT: If you want to use different versions of {slem} or {slm}, {rancher}, {rke}, or {lh}, make sure to check the support matrix for the related solutions you want to use:
2020
https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/ +
2121
For {redis} and {pg}, make sure to pick versions compatible to {eic}, which can be found at https://me.sap.com/notes/3247839 . +
2222
Other versions of {metallb} or {cm} can be used, but they may not have been tested.
@@ -32,14 +32,14 @@ Other versions of {metallb} or {cm} can be used, but they may not have been test
3232
WARNING: We strongly advise against using self-signed certificates in production environments.
3333

3434
The first step is to create a certificate authority (hereinafter referred to as CA) with a key and certificate.
35-
The following excerpt provides an example of how to create one with a passphrase of your choice:
35+
The following excerpt provides an example of how to create a CA with a passphrase of your choice:
3636

3737
[source, bash]
3838
----
3939
$ openssl req -x509 -sha256 -days 1825 -newkey rsa:2048 -keyout rootCA.key -out rootCA.crt -passout pass:<ca-passphrase> -subj "/C=DE/ST=BW/L=Nuremberg/O=SUSE"
4040
----
4141

42-
This will give you the files _rootCA.key_ and _rootCA.crt_.
42+
This will generate the files _rootCA.key_ and _rootCA.crt_.
4343
The server certificate requires a certificate signing request (hereinafter referred to as CSR).
4444
The following excerpt shows how to create such a CSR:
4545

@@ -68,11 +68,11 @@ The example below shows how to do that by passing the extension file (here calle
6868
$ openssl x509 -req -CA rootCA.crt -CAkey rootCA.key -in domain.csr -out server.pem -days 365 -CAcreateserial -extfile domain.ext -passin pass:<ca-passphrase>
6969
----
7070

71-
This creates a file called _server.pem_ which is your certificate to be used for your application.
71+
This creates a file called _server.pem_, which is the certificate to be used for your application.
7272

7373

7474
Your _domain.key_ is still encrypted at this point, but the application requires an unencrypted server key.
75-
To decrypt, run the given command which will create the _server.key_.
75+
To decrypt it, run the provided command, which will generate the _server.key_.
7676
[source, bash]
7777
----
7878
$ openssl rsa -passin pass:<csr-passphrase> -in domain.key -out server.key
@@ -91,7 +91,7 @@ $ cat server.pem rootCA.crt > chained.pem
9191

9292
# tag::k8s-upload-certificates[]
9393

94-
To use certificate files in Kubernetes, you need to save them as so-called *Secrets*.
94+
To use certificate files in Kubernetes, you need to save them as so-called *secrets*.
9595
For an example of uploading your certificates to Kubernetes, see the following excerpt:
9696

9797
[source, bash]
@@ -106,7 +106,8 @@ NOTE: All applications are expecting to have the secret to be used in the same n
106106

107107
# tag::use-cert-manager[]
108108

109-
`cert-manager` needs to be available in your Downstream Cluster. To install `cert-manager` in your downstream cluster, you can use the same installation steps that are described in the Rancher Prime installation section.
109+
`cert-manager` needs to be available in your Downstream Cluster. To install `cert-manager` in your downstream cluster,
110+
you can follow the same installation steps outlined in the Rancher Prime installation section.
110111
First, create a _selfsigned-issuer.yaml_ file:
111112

112113
[source,yaml]
@@ -180,6 +181,6 @@ $ kubectl apply -f application-name-certificate.yaml
180181
----
181182
182183
When you deploy your applications via Helm Charts, you can use the generated certificate.
183-
In the Kubernetes Secret Certificate, three files are stored. These are the file _tls.crt_, _tls.key_ and _ca.crt_ which you cann use in the _values.yaml_ file of your application.
184+
In the Kubernetes Secret Certificate, three files are stored. These are the files _tls.crt_, _tls.key_ and _ca.crt_, which you can use in the _values.yaml_ file of your application.
184185
185186
# end::use-cert-manager[]

0 commit comments

Comments
 (0)