Skip to content

Commit 3396193

Browse files
docs: format headings and placeholders (#772)
1 parent 7440c96 commit 3396193

18 files changed

+86
-88
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ spec:
2727
connInfoSecretTarget:
2828
name: pg-connection
2929

30-
project: <your-project-name>
30+
project: PROJECT_NAME
3131
cloudName: google-europe-west1
3232
plan: hobbyist
3333
maintenanceWindowDow: friday

docs/docs/authentication.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ weight: 10
55
---
66

77
To get authenticated and authorized, set up the communication between the Aiven Operator for Kubernetes and Aiven by
8-
using a token stored in a Kubernetes secret. You can then refer to the secret name on every custom resource in
8+
using a token stored in a Kubernetes Secret. You can then refer to the Secret name on every custom resource in
99
the `authSecretRef` field.
1010

1111
**If you don't have an Aiven account yet, sign
@@ -19,10 +19,10 @@ authentication token.
1919

2020
2\. Create the Kubernetes Secret
2121

22-
The following command creates a secret named `aiven-token` with a `token` field containing the authentication token:
22+
The following command creates a Secret named `aiven-token` with a `token` field containing the authentication token:
2323

2424
```shell
25-
kubectl create secret generic aiven-token --from-literal=token="<your-token-here>"
25+
kubectl create secret generic aiven-token --from-literal=token="TOKEN"
2626
```
2727

2828
When managing your Aiven resources, we will be using the created Secret in the `authSecretRef` field. It will look like
@@ -52,6 +52,6 @@ kind: PostgreSQL
5252
metadata:
5353
name: pg-sample
5454
spec:
55-
project: <your-project-name-here>
55+
project: PROJECT_NAME
5656
[ ... ]
5757
```

docs/docs/contributing/developer-guide.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ linkTitle: "Developer guide"
44
weight: 10
55
---
66

7-
## Getting Started
7+
## Get Started
88

99
To get started, make sure you have a working [Go environment](https://golang.org/doc/install) and clone the repository:
1010

@@ -103,7 +103,7 @@ kubectl apply -f aiven-pg.yaml
103103
You should see the service be created on Aiven's side using either [Aiven Console](https://console.aiven.io/) or Aiven CLI:
104104

105105
```{ .sh .no-copy }
106-
$ avn project switch <your-project-name>
106+
$ avn project switch PROJECT_NAME
107107
$ avn service list
108108
SERVICE_NAME SERVICE_TYPE STATE CLOUD_NAME PLAN CREATE_TIME UPDATE_TIME NOTIFICATIONS
109109
================ ============ ========== =================== ======== ==================== ==================== =============

docs/docs/installation/helm.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "Installing with Helm (recommended)"
3-
linkTitle: "Installing with Helm (recommended)"
2+
title: "Install with Helm (recommended)"
3+
linkTitle: "Install with Helm (recommended)"
44
weight: 10
55
---
66

@@ -16,7 +16,7 @@ First add the [Aiven Helm repository](https://github.com/aiven/aiven-charts):
1616
helm repo add aiven https://aiven.github.io/aiven-charts && helm repo update
1717
```
1818

19-
### Installing Custom Resource Definitions
19+
### Install Custom Resource Definitions
2020

2121
```shell
2222
helm install aiven-operator-crds aiven/aiven-operator-crds
@@ -37,7 +37,7 @@ databases aiven.io/v1alpha1 true Database
3737
... < several omitted lines >
3838
```
3939

40-
### Installing the Operator
40+
### Install the Operator
4141

4242
```shell
4343
helm install aiven-operator aiven/aiven-operator
@@ -73,7 +73,7 @@ helm install aiven-operator aiven/aiven-operator --set webhooks.enabled=false
7373

7474
Please refer to the [values.yaml](https://github.com/aiven/aiven-charts/blob/main/charts/aiven-operator/values.yaml) of the chart.
7575

76-
#### Installing without full cluster administrator access
76+
#### Install without full cluster administrator access
7777

7878
If the person installing the Helm chart does not have the necessary permissions to create cluster-wide resources such as `ClusterRole` and `ClusterRoleBinding`, a cluster administrator can manually install these roles. This ensures that the operator can function properly.
7979

docs/docs/installation/kubectl.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "Installing with kubectl"
3-
linkTitle: "Installing with kubectl"
2+
title: "Install with kubectl"
3+
linkTitle: "Install with kubectl"
44
weight: 15
55
---
66

+7-9
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "Uninstalling"
3-
linkTitle: "Uninstalling"
2+
title: "Uninstall"
3+
linkTitle: "Uninstall"
44
weight: 90
55
---
66

@@ -13,21 +13,19 @@ Depending on your installation, please follow one of:
1313
- [Helm](../installation/helm.md#uninstalling)
1414
- [kubectl](../installation/kubectl.md#uninstalling)
1515

16-
## Dealing with expired tokens
16+
## Expired tokens
1717

1818
Aiven resources need to have an accompanying secret that contains the token that is used to authorize the manipulation of that resource.
1919
If that token expired then you will not be able to delete the custom resource and deletion will also hang until the situation is resolved.
2020
The recommended approach to deal with that situation is to patch a valid token into the secret again so that proper cleanup of aiven resources can take place.
2121

2222
## Hanging deletions
2323

24-
To protect the secrets that the operator is using from deletion, it adds the [finalizer](https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/) `finalizers.aiven.io/needed-to-delete-services` to the secret.
25-
This solves a race condition that happens when deleting a namespace, where there is a possibility of the secret getting deleted before the resource that uses it.
26-
When the controller is deleted it may not cleanup the finalizers from all secrets.
27-
If there is a secret with this finalizer blocking deletion of a namespace, for now please do
24+
To protect the Secrets that the operator is using from deletion, it adds the [finalizer](https://kubernetes.io/docs/concepts/overview/working-with-objects/finalizers/) `finalizers.aiven.io/needed-to-delete-services` to the Secret.
25+
This solves a race condition that happens when deleting a namespace, where there is a possibility of the Secret getting deleted before the resource that uses it.
26+
When the controller is deleted it may not cleanup the finalizers from all Secrets.
27+
If there is a Secret with this finalizer blocking deletion of a namespace, you can remove the finalizer by running:
2828

2929
```shell
3030
kubectl patch secret <offending-secret> -p '{"metadata":{"finalizers":null}}' --type=merge
3131
```
32-
33-
to remove the finalizer.

docs/docs/resources/cassandra.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Aiven for Apache Cassandra® is a distributed database designed to handle large
99
!!! note
1010
Before going through this guide, make sure you have a [Kubernetes cluster](../installation/prerequisites.md) with the operator installed (see instructions for [helm](../installation/helm.md) or [kubectl](../installation/kubectl.md)), and a [Kubernetes Secret with an Aiven authentication token](../authentication.md).
1111

12-
## Creating a Cassandra instance
12+
## Create a Cassandra instance
1313

1414
1\. Create a file named `cassandra-sample.yaml`, and add the following content:
1515

@@ -29,7 +29,7 @@ spec:
2929
name: cassandra-secret
3030

3131
# add your Project name here
32-
project: <your-project-name>
32+
project: PROJECT_NAME
3333

3434
# cloud provider and plan of your choice
3535
# you can check all of the possibilities here https://aiven.io/pricing
@@ -81,7 +81,7 @@ Status:
8181

8282
The resource can be in the `REBUILDING` state for a few minutes. Once the state changes to `RUNNING`, you can access the resource.
8383

84-
## Using the connection Secret
84+
## Use the connection Secret
8585

8686
For your convenience, the operator automatically stores the Cassandra connection information in a Secret created with the
8787
name specified on the `connInfoSecretTarget` field.
@@ -131,7 +131,7 @@ The output is similar to the following:
131131
}
132132
```
133133

134-
## Creating a Cassandra user
134+
## Create a Cassandra user
135135

136136
You can create service users for your instance of Aiven for Apache Cassandra. Service users are unique to this instance and are not shared with any other services.
137137

@@ -150,7 +150,7 @@ spec:
150150
connInfoSecretTarget:
151151
name: cassandra-service-user-secret
152152

153-
project: <your-project-name>
153+
project: PROJECT_NAME
154154
serviceName: cassandra-sample
155155
```
156156

docs/docs/resources/kafka/connect.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This section involves a few different Kubernetes CRDs:
1414
4. A `PostgreSQL` used as a sink to receive messages from `Kafka`
1515
5. A `KafkaConnector` to finally connect the `Kafka` with the `PostgreSQL`
1616

17-
## Creating the resources
17+
## Create the resources
1818

1919
Create a file named `kafka-sample-connect.yaml` with the following content:
2020

@@ -34,7 +34,7 @@ spec:
3434
name: kafka-auth
3535

3636
# add your Project name here
37-
project: <your-project-name>
37+
project: PROJECT_NAME
3838

3939
# cloud provider and plan of your choice
4040
# you can check all of the possibilities here https://aiven.io/pricing
@@ -60,7 +60,7 @@ spec:
6060
name: aiven-token
6161
key: token
6262

63-
project: <your-project-name>
63+
project: PROJECT_NAME
6464
serviceName: kafka-sample-connect
6565

6666
replication: 2
@@ -81,7 +81,7 @@ spec:
8181
key: token
8282

8383
# add your Project name here
84-
project: <your-project-name>
84+
project: PROJECT_NAME
8585

8686
# cloud provider and plan of your choice
8787
# you can check all of the possibilities here https://aiven.io/pricing
@@ -106,7 +106,7 @@ spec:
106106
name: aiven-token
107107
key: token
108108

109-
project: <your-project-name>
109+
project: PROJECT_NAME
110110

111111
# indicates the type of the integration
112112
integrationType: kafka_connect
@@ -134,7 +134,7 @@ spec:
134134
name: pg-connection
135135

136136
# add your Project name here
137-
project: <your-project-name>
137+
project: PROJECT_NAME
138138

139139
# cloud provider and plan of your choice
140140
# you can check all of the possibilities here https://aiven.io/pricing
@@ -160,7 +160,7 @@ spec:
160160
name: aiven-token
161161
key: token
162162
163-
project: <your-project-name>
163+
project: PROJECT_NAME
164164
165165
# the Kafka cluster name
166166
serviceName: kafka-sample-connect

docs/docs/resources/kafka/index.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ you can get up and running with a suitably sized Apache Kafka service in a few m
1212
operator installed (see instructions for [helm](../../installation/helm.md) or [kubectl](../../installation/kubectl.md)),
1313
and a [Kubernetes Secret with an Aiven authentication token](../../authentication.md).
1414

15-
## Creating a Kafka instance
15+
## Create a Kafka instance
1616

1717
1\. Create a file named `kafka-sample.yaml`, and add the following content:
1818

@@ -32,7 +32,7 @@ spec:
3232
name: kafka-auth
3333

3434
# add your Project name here
35-
project: <your-project-name>
35+
project: PROJECT_NAME
3636

3737
# cloud provider and plan of your choice
3838
# you can check all of the possibilities here https://aiven.io/pricing
@@ -65,12 +65,12 @@ The output has the project name and state, similar to the following:
6565
```{ .shell .no-copy }
6666
6767
NAME PROJECT REGION PLAN STATE
68-
kafka-sample <your-project> google-europe-west1 startup-2 RUNNING
68+
kafka-sample PROJECT_NAME google-europe-west1 startup-2 RUNNING
6969
```
7070

7171
After a couple of minutes, the `STATE` field is changed to `RUNNING`, and is ready to be used.
7272

73-
## Using the connection Secret
73+
## Use the connection Secret
7474

7575
For your convenience, the operator automatically stores the Kafka connection information in a Secret created with the
7676
name specified on the `connInfoSecretTarget` field.
@@ -119,7 +119,7 @@ The output is similar to the following:
119119
}
120120
```
121121

122-
## Testing the connection
122+
## Test the connection
123123

124124
You can verify your access to the Kafka cluster from a Pod using the authentication data from the `kafka-auth` Secret. [kcat](https://github.com/edenhill/kcat) is used for our examples below.
125125

@@ -197,7 +197,7 @@ Metadata for all topics (from broker -1: ssl://kafka-sample-your-project.aivencl
197197
0 topics:
198198
```
199199

200-
## Creating a `KafkaTopic` and `KafkaACL`
200+
## Create a `KafkaTopic` and `KafkaACL`
201201

202202
To properly produce and consume content on Kafka, you need topics and ACLs. The operator supports both with
203203
the `KafkaTopic` and `KafkaACL` resources.
@@ -216,7 +216,7 @@ spec:
216216
name: aiven-token
217217
key: token
218218

219-
project: <your-project-name>
219+
project: PROJECT_NAME
220220
serviceName: kafka-sample
221221

222222
# here we can specify how many partitions the topic should have
@@ -258,7 +258,7 @@ spec:
258258
name: kafka-crab-connection
259259

260260
# the Aiven project the user is related to
261-
project: <your-project-name>
261+
project: PROJECT_NAME
262262

263263
# the name of our Kafka Service
264264
serviceName: kafka-sample
@@ -273,7 +273,7 @@ spec:
273273
name: aiven-token
274274
key: token
275275

276-
project: <your-project-name>
276+
project: PROJECT_NAME
277277
serviceName: kafka-sample
278278

279279
# the username from the ServiceUser above
@@ -292,7 +292,7 @@ To create the `crab` user and its permissions, execute the following command:
292292
kubectl apply -f kafka-acl-user-crab.yaml
293293
```
294294

295-
## Producing and consuming events
295+
## Produce and consume events
296296

297297
Using the previously created `KafkaTopic`, `ServiceUser`, `KafkaACL`, you can produce and consume events.
298298

docs/docs/resources/kafka/schema.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ linkTitle: "Kafka Schema"
44
weight: 40
55
---
66

7-
## Creating a `KafkaSchema`
7+
## Create a `KafkaSchema`
88

99
Aiven develops and maintain [Karapace](https://github.com/aiven/karapace), an open source implementation of Kafka REST
1010
and schema registry. Is available out of the box for our managed Kafka service.
@@ -28,7 +28,7 @@ spec:
2828
connInfoSecretTarget:
2929
name: kafka-auth
3030

31-
project: <your-project-name>
31+
project: PROJECT_NAME
3232
cloudName: google-europe-west1
3333
plan: startup-2
3434
maintenanceWindowDow: friday
@@ -61,7 +61,7 @@ spec:
6161
name: aiven-token
6262
key: token
6363

64-
project: <your-project-name>
64+
project: PROJECT_NAME
6565
serviceName: kafka-sample-schema
6666

6767
# the name of the Schema
@@ -100,7 +100,7 @@ The output is similar to the following:
100100

101101
```{ .shell .no-copy }
102102
NAME SERVICE NAME PROJECT SUBJECT COMPATIBILITY LEVEL VERSION
103-
kafka-schema kafka-sample <your-project> MySchema BACKWARD 1
103+
kafka-schema kafka-sample PROJECT_NAME MySchema BACKWARD 1
104104
```
105105

106106
Now you can follow the instructions to [use a schema registry in Java](https://aiven.io/docs/products/kafka/howto/schema-registry) on how to use the schema created.

0 commit comments

Comments
 (0)