Skip to content

Commit

Permalink
Update website/content/docs/k8s/deployment-configurations/datadog.mdx
Browse files Browse the repository at this point in the history
Co-authored-by: Jeff Boruszak <[email protected]>
  • Loading branch information
natemollica-nm and boruszak authored Jan 16, 2025
1 parent 4aa4a89 commit ebec624
Showing 1 changed file with 1 addition and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -293,10 +293,7 @@ during normal operation beyond that of Consul's available metrics.
See the below [table](#additional-integration-checks-performed) for an outline of the features added by the official integration.
<Note>
Currently, the annotations configured by the Helm overrides, when Consul RPC TLS is enabled,
presume the user has shared the server and ca certificate secrets with the Datadog agent's Kubernetes namespace and
mount the valid <code>tls.crt</code>, <code>tls.key</code>, and <code>ca.crt</code> secret volumes at the <code>/etc/datadog-agent/conf.d/consul.d/certs</code>
path within the Datadog Agent pod's <code>agent</code> container.
When Consul RPC TLS is enabled, the annotations configured by the Helm overrides assume that the user already shared the server and CA certificate secrets with the Datadog agent's Kubernetes namespace. As a result, it mounts `tls.crt`, `tls.key`, and `ca.crt` secret volumes at the `/etc/datadog-agent/conf.d/consul.d/certs` path in the `agent` container of the Datadog agent's Pod.
</Note>
### Helm Chart Configuration
Expand Down

0 comments on commit ebec624

Please sign in to comment.