You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: kustomize/certmanager/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ This example shows how to use custom self-signed certificates generated by Cert-
11
11
The first step is to deploy Cert-Manager to the Kubernetes cluster. To do this, follow the instructions on the Cert-Manager website (https://cert-manager.io/docs/installation/).
12
12
13
13
## Setup Certificate Issuer
14
-
After Cert-Manager has been deployed, the next step used in this example is to setup a Certificate Issuer. The Certificate Issuer can be configured to be local to a namespace or cluster wide. In the examples provided here, a cluster wide issuer is created.
14
+
After Cert-Manager has been deployed, the next step used in this example is to set up a Certificate Issuer. The Certificate Issuer can be configured to be local to a namespace or cluster wide. In the examples provided here, a cluster wide issuer is created.
15
15
16
16
### Configure Issuer
17
17
@@ -25,7 +25,7 @@ This Kustomize deployment performs the following actions:
25
25
* Generates a common CA certificate.
26
26
* Creates a cluster wide (ClusterIssuer) CA certificate issuer using the generated CA certificate.
27
27
28
-
By default the issues are created in the cert-manager namespace which is the default namespace for Cert-Manager.
28
+
By default, the issues are created in the cert-manager namespace which is the default namespace for Cert-Manager.
29
29
30
30
The CA certificate issuer is important as the Postgres components require that the ca.crt be the same for the certificates generated to support Postgres.
0 commit comments