You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Ribbon discovery in Kubernetes](#ribbon-discovery-in-kubernetes)
19
19
-[Zipkin discovery in Kubernetes](#zipkin-discovery-in-kubernetes)
@@ -163,7 +163,7 @@ spec:
163
163
- name: JAVA_APP_DIR
164
164
value: /deployments
165
165
- name: JAVA_OPTIONS
166
-
value: -Dspring.profile.active=developer
166
+
value: -Dspring.profiles.active=developer
167
167
```
168
168
169
169
**Notes:**
@@ -184,8 +184,7 @@ spec:
184
184
185
185
Kubernetes has the notion of [Secrets](https://kubernetes.io/docs/concepts/configuration/secret/) for storing
186
186
sensitive data such as password, OAuth tokens, etc. This project provides integration with `Secrets` to make secrets
187
-
accessible by Spring Boot applications. This feature can be explicitly enabled/disabled using the `spring.cloud
188
-
.kubernetes.secrets.enabled` property.
187
+
accessible by Spring Boot applications. This feature can be explicitly enabled/disabled using the `spring.cloud.kubernetes.secrets.enabled` property.
189
188
190
189
The `SecretsPropertySource` when enabled will lookup Kubernetes for `Secrets` from the following sources:
191
190
1. reading recursively from secrets mounts
@@ -195,7 +194,7 @@ The `SecretsPropertySource` when enabled will lookup Kubernetes for `Secrets` fr
195
194
Please note that by default, consuming Secrets via API (points 2 and 3 above) **is not enabled** for security reasons
196
195
and it is recommend that containers share secrets via mounted volumes.
197
196
198
-
If the secrets are found theirs data is made available to the application.
197
+
If the secrets are found their data is made available to the application.
199
198
200
199
**Example:**
201
200
@@ -397,7 +396,7 @@ That makes it really useful for exposing health related information to the user
397
396
398
397
The Kubernetes health indicator which is part of the core module exposes the following info:
399
398
400
-
- pod name, ip address, namespace, service account, node name amd its ip address
399
+
- pod name, ip address, namespace, service account, node name and its ip address
401
400
- flag that indicates if the Spring Boot application is internal or external to Kubernetes
402
401
403
402
### Transparency
@@ -517,10 +516,10 @@ Examples of application that are using Zipkin discovery in Kubernetes:
517
516
518
517
The section [ConfigMap PropertySource](#configmap-propertysource) introduced how to configure a spring boot application via `Kubernetes ConfigMap` containing your configuration properties file.
519
518
520
-
If you prefer to use the configuration management library [NetFlix Archaius](https://github.com/Netflix/archaius/wiki) instead of using the Spring application.properties|"yaml file,
519
+
If you prefer to use the configuration management library [Netflix Archaius](https://github.com/Netflix/archaius/wiki) instead of using the Spring application.properties|"yaml file,
521
520
then you can also leverage the `ConfigMap feature` by using the [spring-cloud-kubernetes-archaius](spring-cloud-kubernetes-archaius/pom.xml) project.
522
521
523
-
To use it, add the following starter `spring-cloud-starter-kubernetes-all` to yiur pom file definition.
522
+
To use it, add the following starter `spring-cloud-starter-kubernetes-all` to your pom file definition.
524
523
525
524
This module allows you to annotate your application with the `@ArchaiusConfigMapSource` and archaius will automatically use the `Kubernetes configmap` as a watched source *(get notification on changes)*.
0 commit comments