diff --git a/README.md b/README.md
index 83ebe80a..94d3ed0c 100644
--- a/README.md
+++ b/README.md
@@ -8,7 +8,7 @@
## Installation
-Please [review the documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/) for the agent.
+Please [review the documentation](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/) for the agent.
Detailed installation instructions are available for a variety of methods.
diff --git a/RELEASE.md b/RELEASE.md
index 6cce6548..d386a0a7 100644
--- a/RELEASE.md
+++ b/RELEASE.md
@@ -68,7 +68,7 @@ The release process is semi-automated.
or `venctl generate`.
9. Inform Michael McLoughlin of the new release so he can update the
- documentation at .
+ documentation at .
[tests-workflow]: https://github.com/jetstack/jetstack-secure/actions/workflows/tests.yaml?query=branch%3Amaster
diff --git a/deploy/charts/venafi-kubernetes-agent/Chart.yaml b/deploy/charts/venafi-kubernetes-agent/Chart.yaml
index 45efd93a..706283ed 100644
--- a/deploy/charts/venafi-kubernetes-agent/Chart.yaml
+++ b/deploy/charts/venafi-kubernetes-agent/Chart.yaml
@@ -6,9 +6,9 @@ description: |-
The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberArk Certificate Manager.
maintainers:
- - name: Venafi
- email: support@venafi.cloud
- url: https://venafi.com
+ - name: CyberArk
+ email: mis.support@cyberark.com
+ url: https://www.cyberark.com
sources:
- https://github.com/jetstack/jetstack-secure
diff --git a/deploy/charts/venafi-kubernetes-agent/README.md b/deploy/charts/venafi-kubernetes-agent/README.md
index 25259e3f..b99f89be 100644
--- a/deploy/charts/venafi-kubernetes-agent/README.md
+++ b/deploy/charts/venafi-kubernetes-agent/README.md
@@ -4,9 +4,9 @@ The Discovery Agent connects your Kubernetes or OpenShift cluster to the CyberAr
You will require a CyberArk Certificate Manager account to connect your cluster.
If you do not have one, you can sign up for a free trial now at:
-- https://venafi.com/try-venafi/tls-protect/
+- https://www.cyberark.com/try-buy/certificate-manager-saas-trial/
-> 📖 Read the [Discovery Agent documentation](https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/),
+> 📖 Read the [Discovery Agent documentation](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/),
> to learn how install and configure this Helm chart.
## Values
@@ -226,7 +226,7 @@ Add Container specific SecurityContext settings to the container. Takes preceden
Set resource requests and limits for the pod.
-Read [Venafi Kubernetes components deployment best practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.
+Read [Venafi Kubernetes components deployment best practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.
#### **nodeSelector** ~ `object`
> Default value:
@@ -343,7 +343,7 @@ Configure VenafiConnection authentication
> false
> ```
-When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
+When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the
Discovery Agent Pod.
#### **authentication.venafiConnection.name** ~ `string`
> Default value:
diff --git a/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml b/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml
index 73418755..e44e5bcc 100644
--- a/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml
+++ b/deploy/charts/venafi-kubernetes-agent/tests/deployment_test.yaml
@@ -101,7 +101,7 @@ tests:
path: ca-certificates.crt
# Check proxy settings are additive not overriding and set to correct values.
- # Values from our documentation: https://docs.venafi.cloud/vaas/k8s-components/c-vcp-network-requirements/#modifying-network-settings-for-kubernetes
+ # Values from our documentation: https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-vcp-network-requirements/#modifying-network-settings-for-kubernetes
- it: All environment variables present when all proxy settings are supplied
set:
http_proxy: "http://:"
diff --git a/deploy/charts/venafi-kubernetes-agent/values.schema.json b/deploy/charts/venafi-kubernetes-agent/values.schema.json
index 876f4b5c..0b4076c7 100644
--- a/deploy/charts/venafi-kubernetes-agent/values.schema.json
+++ b/deploy/charts/venafi-kubernetes-agent/values.schema.json
@@ -131,7 +131,7 @@
},
"helm-values.authentication.venafiConnection.enabled": {
"default": false,
- "description": "When set to true, the Discovery Agent will authenticate to. Venafi using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.",
+ "description": "When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager using the configuration in a VenafiConnection resource. Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/). When set to true, the `authentication.secret` values will be ignored and the. Secret with `authentication.secretName` will _not_ be mounted into the\nDiscovery Agent Pod.",
"type": "boolean"
},
"helm-values.authentication.venafiConnection.name": {
@@ -525,7 +525,7 @@
"memory": "200Mi"
}
},
- "description": "Set resource requests and limits for the pod.\n\nRead [Venafi Kubernetes components deployment best practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.",
+ "description": "Set resource requests and limits for the pod.\n\nRead [Venafi Kubernetes components deployment best practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling) to learn how to choose suitable CPU and memory resource requests and limits.",
"type": "object"
},
"helm-values.securityContext": {
diff --git a/deploy/charts/venafi-kubernetes-agent/values.yaml b/deploy/charts/venafi-kubernetes-agent/values.yaml
index 75010de4..a2eaaec6 100644
--- a/deploy/charts/venafi-kubernetes-agent/values.yaml
+++ b/deploy/charts/venafi-kubernetes-agent/values.yaml
@@ -124,7 +124,7 @@ securityContext:
# Set resource requests and limits for the pod.
#
# Read [Venafi Kubernetes components deployment best
-# practices](https://docs.venafi.cloud/vaas/k8s-components/c-k8s-components-best-practice/#scaling)
+# practices](https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-k8s-components-best-practice/#scaling)
# to learn how to choose suitable CPU and memory resource requests and limits.
# +docs:property
resources:
@@ -200,9 +200,9 @@ authentication:
# +docs:section=Venafi Connection
# Configure VenafiConnection authentication
venafiConnection:
- # When set to true, the Discovery Agent will authenticate to
- # Venafi using the configuration in a VenafiConnection resource.
- # Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.venafi.cloud/vaas/k8s-components/t-install-tlspk-agent/).
+ # When set to true, the Discovery Agent will authenticate to CyberArk Certificate Manager
+ # using the configuration in a VenafiConnection resource.
+ # Use `venafiConnection.enabled=true` for [secretless authentication](https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-install-tlspk-agent/).
# When set to true, the `authentication.secret` values will be ignored and the
# Secret with `authentication.secretName` will _not_ be mounted into the
# Discovery Agent Pod.
@@ -239,7 +239,7 @@ config:
# API server by omitting various common Secret types when listing Secrets.
# These Secret types will be added to a "type!=" field selector in the
# agent config.
- # * https://docs.venafi.cloud/vaas/k8s-components/t-cfg-tlspk-agent/#configuration
+ # * https://docs.cyberark.com/mis-saas/vaas/k8s-components/t-cfg-tlspk-agent/#configuration
# * https://kubernetes.io/docs/concepts/configuration/secret/#secret-types
# * https://kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/#list-of-supported-fields
ignoredSecretTypes:
diff --git a/hack/e2e/test.sh b/hack/e2e/test.sh
index dbf2195d..c76a2bae 100755
--- a/hack/e2e/test.sh
+++ b/hack/e2e/test.sh
@@ -10,7 +10,7 @@
#
# Prerequisites:
# * kubectl: https://kubernetes.io/docs/tasks/tools/#kubectl
-# * venctl: https://docs.venafi.cloud/vaas/venctl/t-venctl-install/
+# * venctl: https://docs.cyberark.com/mis-saas/vaas/venctl/t-venctl-install/
# * jq: https://jqlang.github.io/jq/download/
# * step: https://smallstep.com/docs/step-cli/installation/
# * curl: https://www.man7.org/linux/man-pages/man1/curl.1.html
diff --git a/make/00_mod.mk b/make/00_mod.mk
index df1a1353..25dd3526 100644
--- a/make/00_mod.mk
+++ b/make/00_mod.mk
@@ -35,11 +35,11 @@ oci_preflight_image_name_development := jetstack.local/venafi-agent
oci_preflight_build_args := \
--image-annotation="org.opencontainers.image.vendor"="CyberArk Software Ltd." \
--image-annotation="org.opencontainers.image.licenses"="EULA - https://www.cyberark.com/contract-terms/" \
- --image-annotation="org.opencontainers.image.authors"="support@venafi.cloud" \
- --image-annotation="org.opencontainers.image.title"="Venafi Kubernetes Agent" \
+ --image-annotation="org.opencontainers.image.authors"="support@cyberark.com" \
+ --image-annotation="org.opencontainers.image.title"="Discovery Agent for CyberArk Certificate Manager in Kubernetes and OpenShift Environments" \
--image-annotation="org.opencontainers.image.description"="Gathers machine identity data from Kubernetes clusters." \
--image-annotation="org.opencontainers.image.url"="https://www.cyberark.com/products/certificate-manager-for-kubernetes/" \
- --image-annotation="org.opencontainers.image.documentation"="https://docs.venafi.cloud/vaas/k8s-components/c-tlspk-agent-overview/" \
+ --image-annotation="org.opencontainers.image.documentation"="https://docs.cyberark.com/mis-saas/vaas/k8s-components/c-tlspk-agent-overview/" \
--image-annotation="org.opencontainers.image.version"="$(VERSION)" \
--image-annotation="org.opencontainers.image.revision"="$(GITCOMMIT)"
diff --git a/make/02_mod.mk b/make/02_mod.mk
index 12760fa0..17ca723b 100644
--- a/make/02_mod.mk
+++ b/make/02_mod.mk
@@ -76,7 +76,7 @@ helm-plugins: $(NEEDS_HELM)
echo "helm-diff plugin already installed"; \
fi
-# https://docs.venafi.cloud/vaas/venctl/c-venctl-releases/
+# https://docs.cyberark.com/mis-saas/vaas/venctl/c-venctl-releases/
venctl_linux_amd64_SHA256SUM=26e7b7a7e134f1cf1f3ffacf4ae53ec6849058db5007ce4088d51f404ededb4a
venctl_darwin_amd64_SHA256SUM=2e76693901abcb2c018f66d3a10558c66ca09d1a3be912258bcd6c58e89aae80
venctl_darwin_arm64_SHA256SUM=4350912d67683773302655e2a0151320514d1ccf82ee99c895e6780f86b6f031