Skip to content

Commit

Permalink
Remove duplicate paragraph (kedacore#507)
Browse files Browse the repository at this point in the history
Signed-off-by: Jatin Sanghvi <20547963+JatinSanghvi@users.noreply.github.com>
  • Loading branch information
JatinSanghvi authored Aug 10, 2021
1 parent 97c303b commit c1ec31f
Show file tree
Hide file tree
Showing 8 changed files with 0 additions and 16 deletions.
2 changes: 0 additions & 2 deletions content/docs/1.4/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `containerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down
2 changes: 0 additions & 2 deletions content/docs/1.5/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `containerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down
2 changes: 0 additions & 2 deletions content/docs/2.0/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `envSourceContainerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down
2 changes: 0 additions & 2 deletions content/docs/2.1/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `envSourceContainerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down
2 changes: 0 additions & 2 deletions content/docs/2.2/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `envSourceContainerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down
2 changes: 0 additions & 2 deletions content/docs/2.3/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `envSourceContainerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down
2 changes: 0 additions & 2 deletions content/docs/2.4/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `envSourceContainerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down
2 changes: 0 additions & 2 deletions content/docs/2.5/concepts/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,6 @@ spec:
If you have multiple containers in a deployment, you will need to include the name of the container that has the references in the `ScaledObject`. If you do not include a `envSourceContainerName` it will default to the first container. KEDA will attempt to resolve references from secrets, config maps, and environment variables of the container.

While this method works for many scenarios, there are some downsides. This method makes it difficult to efficiently share auth config across `ScaledObjects`. It also doesn’t support referencing a secret directly, only secrets that are referenced by the container. This method also doesn't support a model where other types of authentication may work - namely "pod identity" where access to a source could be acquired with no secrets or connection strings. For these and other reasons, we also provide a `TriggerAuthentication` resource to define authentication as a separate resource to a `ScaledObject`, which can reference secrets directly or supply configuration like pod identity.

### The downsides

While this method works for many scenarios, there are some downsides:
Expand Down

0 comments on commit c1ec31f

Please sign in to comment.