diff --git a/docs/design.md b/docs/design.md index ae736b187e..3da6b76c2b 100644 --- a/docs/design.md +++ b/docs/design.md @@ -272,12 +272,6 @@ A production deployment can improve upon that by using some other key delivery mechanism, like for example [Vault](https://www.vaultproject.io/). - - ## Volume Persistency In a typical CSI deployment, volumes are provided by a storage backend @@ -430,4 +424,4 @@ named [`Deployment`](./install.md#pmem-csi-deployment-crd) in the `pmem-csi.intel.com/v1alpha1` API group. The operator runs inside the cluster and listens for deployment changes. It makes sure that the required Kubernetes objects are created for a driver deployment. -Refer to [Deployment CRD](./install.md#deployment) for details. \ No newline at end of file +Refer to [Deployment CRD](./install.md#deployment) for details. diff --git a/docs/install.md b/docs/install.md index 2e922b9526..83f8fb616f 100644 --- a/docs/install.md +++ b/docs/install.md @@ -826,28 +826,6 @@ INFO: deploying from /nvme/gopath/src/github.com/intel/pmem-csi/deploy/kubernete ... ``` - - ## PMEM-CSI Deployment CRD `Deployment` is a cluster-scoped Kubernetes resource in the @@ -975,16 +953,3 @@ It is important to include the following details: Vulnerability information is extremely sensitive. Please encrypt all security vulnerability reports using our [PGP key](https://www.intel.com/content/www/us/en/security-center/pgp-public-key.html). A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see: [vulnerability handling guidelines](https://www.intel.com/content/www/us/en/security-center/vulnerability-handling-guidelines.html). - -