Skip to content

Commit

Permalink
docs: remove home module from refs (stackabletech/documentation#637)
Browse files Browse the repository at this point in the history
  • Loading branch information
xeniape committed Aug 1, 2024
1 parent 6a27253 commit 5b52ef6
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion docs/modules/airflow/pages/usage-guide/logging.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -41,4 +41,4 @@ spec:
----

Further information on how to configure logging, can be found in
xref:home:concepts:logging.adoc[].
xref:concepts:logging.adoc[].
2 changes: 1 addition & 1 deletion docs/modules/airflow/pages/usage-guide/monitoring.adoc
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
= Monitoring

The managed Airflow instances are automatically configured to export Prometheus metrics. See
xref:home:operators:monitoring.adoc[] for more details.
xref:operators:monitoring.adoc[] for more details.
4 changes: 2 additions & 2 deletions docs/modules/airflow/pages/usage-guide/security.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ image::airflow_security.png[Airflow Security menu]

=== LDAP

Airflow supports xref:home:concepts:authentication.adoc[authentication] of users against an LDAP server. This requires setting up an xref:home:concepts:authentication.adoc#authenticationclass[AuthenticationClass] for the LDAP server.
Airflow supports xref:concepts:authentication.adoc[authentication] of users against an LDAP server. This requires setting up an xref:concepts:authentication.adoc#authenticationclass[AuthenticationClass] for the LDAP server.
The AuthenticationClass is then referenced in the AirflowCluster resource as follows:

[source,yaml]
Expand All @@ -34,7 +34,7 @@ spec:

Users that log in with LDAP are assigned to a default https://airflow.apache.org/docs/apache-airflow/stable/security/access-control.html#access-control[Role] which is specified with the `userRegistrationRole` property.

You can follow the xref:home:tutorials:authentication_with_openldap.adoc[] tutorial to learn how to set up an AuthenticationClass for an LDAP server, as well as consulting the xref:reference:authenticationclass.adoc[] reference.
You can follow the xref:tutorials:authentication_with_openldap.adoc[] tutorial to learn how to set up an AuthenticationClass for an LDAP server, as well as consulting the xref:reference:authenticationclass.adoc[] reference.

The users and roles can be viewed as before in the Webserver UI, but note that the blue "+" button is not available when authenticating against LDAP:

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
= Resource Requests

include::home:concepts:stackable_resource_requests.adoc[]
include::concepts:stackable_resource_requests.adoc[]

A minimal HA setup consisting of 2 schedulers, 2 workers and 2 webservers has the following https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/[resource requirements]:

Expand Down

0 comments on commit 5b52ef6

Please sign in to comment.