@@ -38,19 +38,7 @@ GATEWAY_NAME=inference-gateway \
3838
3939## Manual Setup
4040
41- ### Step 1: Copy Pull Secret
42-
43- The Gateway pod needs to pull Istio images from ` registry.redhat.io ` :
44-
45- ``` bash
46- # Copy pull secret to opendatahub namespace
47- kubectl delete secret redhat-pull-secret -n opendatahub --ignore-not-found
48- kubectl get secret redhat-pull-secret -n istio-system -o json | \
49- jq ' del(.metadata.resourceVersion, .metadata.uid, .metadata.creationTimestamp, .metadata.annotations, .metadata.labels) | .metadata.namespace = "opendatahub"' | \
50- kubectl create -f -
51- ```
52-
53- ### Step 2: Extract CA and Create ConfigMap
41+ ### Step 1: Extract CA and Create ConfigMap
5442
5543``` bash
5644# Extract CA certificate from cert-manager secret
@@ -71,7 +59,7 @@ kubectl create configmap odh-ca-bundle \
7159 --dry-run=client -o yaml | kubectl apply -f -
7260```
7361
74- ### Step 3 : Create Gateway Configuration ConfigMap
62+ ### Step 2 : Create Gateway Configuration ConfigMap
7563
7664This configures the Gateway pod to mount the CA bundle at the path expected by
7765LLM workloads (` /var/run/secrets/opendatahub/ca.crt ` ).
10189EOF
10290```
10391
104- ### Step 4 : Create the Gateway
92+ ### Step 3 : Create the Gateway
10593
10694``` bash
10795kubectl apply -f - << 'EOF '
@@ -129,7 +117,7 @@ spec:
129117EOF
130118```
131119
132- ### Step 5 : Patch ServiceAccount and Restart Pod
120+ ### Step 4 : Patch ServiceAccount and Restart Pod
133121
134122The Gateway ServiceAccount needs the pull secret to pull Istio images:
135123
@@ -147,7 +135,7 @@ kubectl wait --for=condition=Ready pod \
147135 -n opendatahub --timeout=120s
148136```
149137
150- ### Step 6 : Verify
138+ ### Step 5 : Verify
151139
152140``` bash
153141# Check Gateway is programmed
0 commit comments