Skip to content

Commit

Permalink
docs(examples): align database release name with zitadel configuration (
Browse files Browse the repository at this point in the history
  • Loading branch information
dbourasseau authored Sep 22, 2023
1 parent ac8590b commit fbc97fe
Show file tree
Hide file tree
Showing 6 changed files with 14 additions and 14 deletions.
2 changes: 1 addition & 1 deletion examples/1-postgres-insecure/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ Also, you deploy [a correctly configured ZITADEL](https://artifacthub.io/package
```bash
# Install Postgres
helm repo add bitnami https://charts.bitnami.com/bitnami
helm install --wait postgres bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/1-postgres-insecure/postgres-values.yaml
helm install --wait db bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/1-postgres-insecure/postgres-values.yaml

# Install ZITADEL
helm repo add zitadel https://charts.zitadel.com
Expand Down
4 changes: 2 additions & 2 deletions examples/2-postgres-secure/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ kubectl wait --for=condition=complete job/create-certs

# Install Postgres
helm repo add bitnami https://charts.bitnami.com/bitnami
helm install --wait postgres bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/2-postgres-secure/postgres-values.yaml
helm install --wait db bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/2-postgres-secure/postgres-values.yaml

# Install ZITADEL
helm repo add zitadel https://charts.zitadel.com
Expand All @@ -26,5 +26,5 @@ kubectl port-forward svc/my-zitadel 8080

Now, open http://localhost:8080 in your browser and log in with the following credentials:

**Username**: [email protected]
**Username**: [email protected]
**Password**: Password1!
6 changes: 3 additions & 3 deletions examples/3-cockroach-insecure/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,15 @@
By running the commands below, you deploy a simple insecure Cockroach database to your Kubernetes cluster [by using the Cockroach official chart](https://artifacthub.io/packages/helm/cockroachdb/cockroachdb).
Also, you deploy [a correctly configured ZITADEL](https://artifacthub.io/packages/helm/zitadel/zitadel).

> [!WARNING]
> [!WARNING]
> Anybody with network access to the Cockroach database can connect to it and read and write data.
> Use this example only for testing purposes.
> For deploying a secure Cockroach database, see [the secure Cockroach example](../4-cockroach-secure/README.md).
```bash
# Install Cockroach
helm repo add cockroachdb https://charts.cockroachdb.com/
helm install --wait cockroach cockroachdb/cockroachdb --version 11.1.5 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/3-cocroach-insecure/cockroach-values.yaml
helm install --wait db cockroachdb/cockroachdb --version 11.1.5 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/3-cocroach-insecure/cockroach-values.yaml

# Install ZITADEL
helm repo add zitadel https://charts.zitadel.com
Expand All @@ -26,5 +26,5 @@ kubectl port-forward svc/my-zitadel 8080

Now, open http://localhost:8080 in your browser and log in with the following credentials:

**Username**: [email protected]
**Username**: [email protected]
**Password**: Password1!
4 changes: 2 additions & 2 deletions examples/4-cockroach-secure/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Therefore, you create a Kubernetes job that creates a client certificate and key
```bash
# Install Cockroach
helm repo add cockroachdb https://charts.cockroachdb.com/
helm install --wait cockroach cockroachdb/cockroachdb --version 11.1.5 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/4-cockroach-secure/cockroach-values.yaml
helm install --wait db cockroachdb/cockroachdb --version 11.1.5 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/4-cockroach-secure/cockroach-values.yaml

# Generate a TLS certificate for the zitadel DB user
kubectl apply -f https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/4-cockroach-secure/zitadel-cert-job.yaml
Expand All @@ -28,5 +28,5 @@ kubectl port-forward svc/my-zitadel 8080

Now, open http://localhost:8080 in your browser and log in with the following credentials:

**Username**: [email protected]
**Username**: [email protected]
**Password**: Password1!
6 changes: 3 additions & 3 deletions examples/5-referenced-secrets/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,15 +6,15 @@ This is especially handy in case you manage your Kubernetes secrets using a secr
By running the commands below, you deploy a simple insecure Postgres database to your Kubernetes cluster [by using the Bitnami chart](https://artifacthub.io/packages/helm/bitnami/postgresql).
Also, you deploy [a correctly configured ZITADEL](https://artifacthub.io/packages/helm/zitadel/zitadel).

> [!WARNING]
> [!WARNING]
> Anybody with network access to the Postgres database can connect to it and read and write data.
> Use this example only for testing purposes.
> For deploying a secure Postgres database, see [the secure Postgres example](../2-postgres-secure/README.md).
```bash
# Install Postgres
helm repo add bitnami https://charts.bitnami.com/bitnami
helm install --wait postgres bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/5-referenced-secrets/postgres-values.yaml
helm install --wait db bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/5-referenced-secrets/postgres-values.yaml

# Create a secret for arbitrary ZITADEL configuration as well as the ZITADEL masterkey
kubectl apply --filename https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/5-referenced-secrets/zitadel-masterkey.yaml,https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/5-referenced-secrets/zitadel-secrets.yaml
Expand All @@ -32,5 +32,5 @@ kubectl port-forward svc/my-zitadel 8080

Now, open http://localhost:8080 in your browser and log in with the following credentials:

**Username**: [email protected]
**Username**: [email protected]
**Password**: Password1!
6 changes: 3 additions & 3 deletions examples/6-machine-user/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,15 +9,15 @@ To achieve a fully declared ZITADEL setup, also check out the [ZITADEL Terraform
By running the commands below, you deploy a simple insecure Postgres database to your Kubernetes cluster [by using the Bitnami chart](https://artifacthub.io/packages/helm/bitnami/postgresql).
Also, you deploy [a correctly configured ZITADEL](https://artifacthub.io/packages/helm/zitadel/zitadel).

> [!WARNING]
> [!WARNING]
> Anybody with network access to the Postgres database can connect to it and read and write data.
> Use this example only for testing purposes.
> For deploying a secure Postgres database, see [the secure Postgres example](../2-postgres-secure/README.md).
```bash
# Install Postgres
helm repo add bitnami https://charts.bitnami.com/bitnami
helm install --wait postgres bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/6-machine-user/postgres-values.yaml
helm install --wait db bitnami/postgresql --version 12.10.0 --values https://raw.githubusercontent.com/zitadel/zitadel-charts/main/examples/6-machine-user/postgres-values.yaml

# Install ZITADEL
helm repo add zitadel https://charts.zitadel.com
Expand All @@ -32,5 +32,5 @@ kubectl port-forward svc/my-zitadel 8080

Now, open http://localhost:8080 in your browser and log in with the following credentials:

**Username**: [email protected]
**Username**: [email protected]
**Password**: Password1!

0 comments on commit fbc97fe

Please sign in to comment.