Skip to content

Commit 22d02c4

Browse files
committed
docs: remove home module from refs (stackabletech/documentation#637)
1 parent f1f0b3b commit 22d02c4

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

docs/modules/zookeeper/pages/usage_guide/authentication.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
= Authentication
22

33
The communication between nodes (server to server) is encrypted via TLS by default.
4-
In order to enforce TLS authentication for client-to-server communication, you can set an xref:home:concepts:authentication.adoc[AuthenticationClass] reference in the `spec.clusterConfig.authentication` property.
4+
In order to enforce TLS authentication for client-to-server communication, you can set an xref:concepts:authentication.adoc[AuthenticationClass] reference in the `spec.clusterConfig.authentication` property.
55

66
Currently it is possible to configure a single form of authentication (of type TLS) by adding one (and only one) entry
77
in the `authentication` sequence as shown in the example below. Additional authentication methods, such as Kerberos, are
@@ -28,5 +28,5 @@ and unauthenticated access to the ZooKeeper cluster is still possible.
2828

2929
== Learn more
3030

31-
* Read the xref:home:concepts:authentication.adoc[authentication concept] of the Stackable Data Platform.
32-
* Read the {crd-docs}/authentication.stackable.tech/authenticationclass/v1alpha1/[AuthenticationClass reference {external-link-icon}^].
31+
* Read the xref:concepts:authentication.adoc[authentication concept] of the Stackable Data Platform.
32+
* Read the {crd-docs}/authentication.stackable.tech/authenticationclass/v1alpha1/[AuthenticationClass reference {external-link-icon}^].

docs/modules/zookeeper/pages/usage_guide/log_aggregation.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ spec:
2727
----
2828

2929
Further information on how to configure logging, can be found in
30-
xref:home:concepts:logging.adoc[].
30+
xref:concepts:logging.adoc[].

docs/modules/zookeeper/pages/usage_guide/resource_configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can also configure which StorageClass to use, consult the xref:concepts:reso
2222

2323
== Resource requests
2424

25-
include::home:concepts:stackable_resource_requests.adoc[]
25+
include::concepts:stackable_resource_requests.adoc[]
2626

2727
A minimal HA setup consisting of 3 ZooKeeper instances has the following https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/[resource requirements]:
2828

docs/modules/zookeeper/pages/usage_guide/using_multiple_role_groups.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
= Using multiple role groups
22

33
// abstract/summary
4-
ZooKeeper uses a unique ID called _myid_ to identify each server in the cluster. The Stackable Operator for Apache ZooKeeper assigns the _myid_ to each Pod from the https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#ordinal-index[ordinal index] given to the Pod by Kubernetes. This index is unique over the Pods in the StatefulSet of the xref:home:concepts:roles-and-role-groups.adoc[role group].
4+
ZooKeeper uses a unique ID called _myid_ to identify each server in the cluster. The Stackable Operator for Apache ZooKeeper assigns the _myid_ to each Pod from the https://kubernetes.io/docs/concepts/workloads/controllers/statefulset/#ordinal-index[ordinal index] given to the Pod by Kubernetes. This index is unique over the Pods in the StatefulSet of the xref:concepts:roles-and-role-groups.adoc[role group].
55

66
When using multiple role groups in a cluster, this will lead to different ZooKeeper Pods using the same _myid_. Each role group is represented by its own StatefulSet, and therefore always identified starting with `0`.
77

@@ -29,4 +29,4 @@ spec:
2929

3030
<1> The `myidOffset` property set to 10 for the secondary role group
3131

32-
The `secondary` role group _myid_ starts from id `10`. The `primary` role group will start from `0`. This means, the replicas of the role group `primary` should not be scaled higher than `10` which results in `10` `primary` Pods using a _myid_ from `0` to `9`, followed by the `secondary` Pods starting at _myid_ `10`.
32+
The `secondary` role group _myid_ starts from id `10`. The `primary` role group will start from `0`. This means, the replicas of the role group `primary` should not be scaled higher than `10` which results in `10` `primary` Pods using a _myid_ from `0` to `9`, followed by the `secondary` Pods starting at _myid_ `10`.

0 commit comments

Comments
 (0)