-
Notifications
You must be signed in to change notification settings - Fork 8
Commit
- Loading branch information
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -38,6 +38,24 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( | |
|
||
<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }> | ||
<GitHubPrerequisites /> | ||
### Install the CA (Certificate Authority) of mkcert in your trusted store | ||
Check failure on line 41 in docs/akamai/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Headings should be surrounded by blank lines
|
||
|
||
We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. | ||
|
||
To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: | ||
|
||
```shell | ||
Check failure on line 47 in docs/akamai/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Code block style
|
||
brew install mkcert | ||
mkcert -install | ||
``` | ||
|
||
This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. | ||
|
||
If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): | ||
|
||
```shell | ||
Check failure on line 56 in docs/akamai/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Code block style
|
||
brew install nss | ||
``` | ||
Check failure on line 58 in docs/akamai/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Fenced code blocks should be surrounded by blank lines
|
||
<GitHubClusterCreateCmd /> | ||
<CommonTerminalOutput cloud="Akamai" minutes="10" handoffScreen={GitHubHandoffScreen} /> | ||
</TabItem> | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -37,11 +37,47 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( | |
<Tabs groupId="git_provider" defaultValue="github" queryString> | ||
<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }> | ||
<GitHubPrerequisites /> | ||
### Install the CA (Certificate Authority) of mkcert in your trusted store | ||
|
||
We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. | ||
|
||
To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: | ||
|
||
```shell | ||
brew install mkcert | ||
mkcert -install | ||
``` | ||
|
||
This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. | ||
|
||
If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): | ||
|
||
```shell | ||
brew install nss | ||
``` | ||
Check failure on line 57 in docs/aws/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Fenced code blocks should be surrounded by blank lines
|
||
<GitHubClusterCreateCmd /> | ||
Check failure on line 58 in docs/aws/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Code block style
|
||
<CommonTerminalOutput cloud="Aws" minutes="10" handoffScreen={GitHubHandoffScreen} /> | ||
</TabItem> | ||
<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }> | ||
<GitLabPrerequisites /> | ||
### Install the CA (Certificate Authority) of mkcert in your trusted store | ||
|
||
We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. | ||
|
||
To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: | ||
|
||
```shell | ||
brew install mkcert | ||
mkcert -install | ||
``` | ||
|
||
This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. | ||
|
||
If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): | ||
|
||
```shell | ||
brew install nss | ||
``` | ||
Check failure on line 80 in docs/aws/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Fenced code blocks should be surrounded by blank lines
|
||
<GitLabClusterCreateCmd /> | ||
Check failure on line 81 in docs/aws/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Code block style
|
||
<CommonTerminalOutput cloud="Aws" minutes="10" handoffScreen={GitLabHandoffScreen} /> | ||
</TabItem> | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -27,12 +27,48 @@ import GitLabHandoffScreen from "../../../img/azure/gitlab/handoff-screen.png"; | |
|
||
<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }> | ||
<GitHubPrerequisites /> | ||
### Install the CA (Certificate Authority) of mkcert in your trusted store | ||
Check failure on line 30 in docs/azure/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Headings should be surrounded by blank lines
|
||
|
||
We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. | ||
|
||
To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: | ||
|
||
```shell | ||
Check failure on line 36 in docs/azure/quick-start/install/cli.mdx GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)Code block style
|
||
brew install mkcert | ||
mkcert -install | ||
``` | ||
|
||
This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. | ||
|
||
If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): | ||
|
||
```shell | ||
brew install nss | ||
``` | ||
<GitHubClusterCreateCmd /> | ||
<CommonTerminalOutput cloud="Azure" minutes="20" handoffScreen={GitHubHandoffScreen} /> | ||
</TabItem> | ||
|
||
<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }> | ||
<GitLabPrerequisites /> | ||
### Install the CA (Certificate Authority) of mkcert in your trusted store | ||
|
||
We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. | ||
|
||
To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: | ||
|
||
```shell | ||
brew install mkcert | ||
mkcert -install | ||
``` | ||
|
||
This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. | ||
|
||
If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): | ||
|
||
```shell | ||
brew install nss | ||
``` | ||
<GitLabClusterCreateCmd /> | ||
<CommonTerminalOutput cloud="Azure" minutes="20" handoffScreen={GitLabHandoffScreen} /> | ||
</TabItem> | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,3 @@ | ||
### Installed Applications | ||
|
||
To see what is installed by kubefirst, check the [overview page](../../overview.mdx). | ||
To see what is installed by Kubefirst, check the [overview page](../../overview.mdx). |