Skip to content

Commit

Permalink
docs: fixed a typo in security.md (#7117)
Browse files Browse the repository at this point in the history
Signed-off-by: Sebastiaan Tammer <sebastiaantammer@gmail.com>
  • Loading branch information
tammert committed Nov 1, 2021
1 parent e716aad commit 863d8b9
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ Argo Workflows requires various levels of network access depending on configurat

The argo server is commonly exposed to end-users to provide users with a user interface for visualizing and managing their workflows. It must also be exposed if leveraging [webhooks](webhooks.md) to trigger workflows. Both of these use cases require that the argo-server Service to be exposed for ingress traffic (e.g. with an Ingress object or load balancer). Note that the Argo UI is also available to be accessed by running the server locally (i.e. `argo server`) using local kubeconfig credentials, and visiting the UI over https://localhost:2746.

The argo server additionally has a feature to allow downloading of artifacts through the user interface. This feature requires that the argo-server be given egress access to the underlying artifact provider (e.g. S3, GCS, MinIO, Arfactory) in order to download and stream the artifact.
The argo server additionally has a feature to allow downloading of artifacts through the user interface. This feature requires that the argo-server be given egress access to the underlying artifact provider (e.g. S3, GCS, MinIO, Artifactory) in order to download and stream the artifact.

### Workflow Controller

Expand Down

0 comments on commit 863d8b9

Please sign in to comment.