You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/advanced/peering/inter-cluster-authentication.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -208,9 +208,9 @@ As a result of the command, you should be able to see:
208
208
NAME TYPE DATA AGE
209
209
liqo-signed-nonce Opaque 2 78s
210
210
```
211
-
211
+
212
212
```{admonition} Note
213
-
If you want to use the [in-band](UsagePeeringInBand) approach, use the `spec.proxyURL` field inside the `Tenant` CRD.
213
+
If you want to use the [in-band](UsagePeeringInBand) approach, use the `spec.proxyURL` field inside the `Tenant` CRD.
214
214
Check the [Kubernetes API Server Proxy](/advanced/k8s-api-server-proxy.md) page
215
215
```
216
216
@@ -259,11 +259,11 @@ spec:
259
259
status: {}
260
260
```
261
261
262
-
Which can be applied **on the cluster consumer**:
262
+
Which can be applied **on the cluster consumer**, making sure that the resource is created in the tenant namespace (`liqo-tenant-cl-consumer` in this case):
Once the Identity resource is correctly applied, the clusters are able to negotiate the resources for the [offloading](/advanced/peering/offloading-in-depth).
@@ -292,10 +292,10 @@ All in all, these are the steps to be followed by the administrators of each of
0 commit comments