doc: fix links for example yaml files

The yaml files for RBD encryption are located in examples/kms/vault, and
not in the examples/rbd directory.

Signed-off-by: Niels de Vos <ndevos@redhat.com>
This commit is contained in:
Niels de Vos 2020-12-10 16:49:53 +01:00 committed by mergify[bot]
parent db40c06e84
commit b8fec4df64

View File

@ -236,7 +236,8 @@ There are two options to use Hashicorp Vault as a KMS:
To use Vault as KMS set `encryptionKMSID` to a unique identifier for Vault To use Vault as KMS set `encryptionKMSID` to a unique identifier for Vault
configuration. You will also need to create vault configuration similar to the configuration. You will also need to create vault configuration similar to the
[example](../examples/rbd/kms-config.yaml) and use same `encryptionKMSID`. [example](../examples/kms/vault/kms-config.yaml) and use same
`encryptionKMSID`.
To use the Kubernetes ServiceAccount to access Vault, the configuration must To use the Kubernetes ServiceAccount to access Vault, the configuration must
include `encryptionKMSType: "vault"`. If Tenants are expected to place their include `encryptionKMSType: "vault"`. If Tenants are expected to place their
@ -265,8 +266,9 @@ described in [official
documentation](https://www.vaultproject.io/docs/auth/kubernetes.html). documentation](https://www.vaultproject.io/docs/auth/kubernetes.html).
If token reviewer is used, you will need to configure service account for If token reviewer is used, you will need to configure service account for
that also like in [example](../examples/rbd/csi-vaulttokenreview-rbac.yaml) to that also like in
be able to review jwt tokens. [example](../examples/kms/vault/csi-vaulttokenreview-rbac.yaml) to be able to
review jwt tokens.
Configure a role(s) for service accounts used for ceph-csi: Configure a role(s) for service accounts used for ceph-csi: