Skip to content

Commit 1a9537e

Browse files
committed
RED-64539 - fix admission instruction in README
1 parent 40276ab commit 1a9537e

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,8 +113,6 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
113113
NAME TYPE DATA AGE
114114
admission-tls Opaque 2 2m43s
115115
```
116-
117-
> **Note:** If you're not using multiple namespaces you may proceed to step 6.
118116
119117
* Enable the Kubernetes webhook using the generated certificate
120118
@@ -138,7 +136,9 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
138136
```shell script
139137
kubectl patch ValidatingWebhookConfiguration redb-admission --patch "$(cat modified-webhook.yaml)"
140138
```
141-
139+
140+
> **Note:** If you're not using multiple namespaces you may skip to ["Verify the installation"](#verify_admission_installation) step.
141+
142142
* Limiting the webhook to the relevant namespaces:
143143
Unless limited, webhooks will intercept requests from all namespaces.<br>
144144
In case you have several REC objects on your K8S cluster you need to limit the webhook to the relevant namespace.
@@ -170,6 +170,7 @@ This is the fastest way to get up and running with a new Redis Enterprise on Kub
170170
```shell script
171171
kubectl patch ValidatingWebhookConfiguration redb-admission --patch "$(cat modified-webhook.yaml)"
172172
```
173+
<a name="verify_admission_installation"></a>
173174
* Verify the installation
174175
In order to verify that the all the components of the Admission Controller are installed correctly, we will try to apply an invalid resource that should force the admission controller to reject it. If it applies succesfully, it means the admission controller has not been hooked up correctly.
175176

0 commit comments

Comments
 (0)