Describe the issue: Most of the s3 application requires TLS as an option in Deployment config or passed as the file in the request or store it /etc/pki paths The TLS certs for RGW are stored as k8s secret, so we need to mention steps to fetch details Describe the task you were trying to accomplish: Provide steps to fetch TLS certs for s3 application Suggestions for improvement: In the default: * for the internal rgw server, the k8s secret name will be <objectstore-name>-cos-ceph-rgw-tls-cert. This TLS type k8s secret. oc get secrets/<secret-name> --template={{.data.tls.crt}} | base64 -D oc get secrets/<secret-name> --template={{.data.tls.key}} | base64 -D * For external rgw, the k8s secret name will be "ceph-rgw-tls-cert" and it is an opaque type secret and the key value for storing tls certificates is "cert" oc get secrets/<secret-name> --template={{.data.cert}} | base64 -D Document URL: https://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.10/html/managing_hybrid_and_multicloud_resources/ Chapter/Section Number and Title: Either separate section or include it OBC Product Version: 4.10 Environment Details: Baremetal or VMware Any other versions of this document that also needs this update: all versions Additional information:
Agreed with Kusuma and Eran to move this to 4.13.0 and revert the addition of this feature in the ODF docs.
I have verified the changes with the latest corrected commands, and the document looks good now.