Skip to content

Commit 27a19de

Browse files
Fix danger alert (#35443)
Co-authored-by: Alex Nguyen <[email protected]>
1 parent e252054 commit 27a19de

File tree

2 files changed

+4
-10
lines changed

2 files changed

+4
-10
lines changed

content/admin/monitoring-and-managing-your-instance/configuring-clustering/monitoring-the-health-of-your-cluster.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -76,11 +76,8 @@ You can configure [Nagios](https://www.nagios.org/) to monitor {% data variables
7676
> Your public key has been saved in /home/nagiosuser/.ssh/id_ed25519.pub.
7777
```
7878

79-
{% danger %}
80-
81-
**Security Warning:** An SSH key without a passphrase can pose a security risk if authorized for full access to a host. Limit this key's authorization to a single read-only command.
82-
83-
{% enddanger %}
79+
> [!CAUTION]
80+
> An SSH key without a passphrase can pose a security risk if authorized for full access to a host. Limit this key's authorization to a single read-only command.
8481
8582
> [!NOTE]
8683
> If you're using a distribution of Linux that doesn't support the Ed25519 algorithm, use the command:
Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,2 @@
1-
{% danger %}
2-
3-
**Security Warning:** When either PROXY support or HTTP forwarding is enabled, it is critical that no external traffic can directly reach the {% data variables.product.prodname_ghe_server %} appliances. If external traffic is not properly blocked, the source IP addresses can be forged.
4-
5-
{% enddanger %}
1+
> [!CAUTION]
2+
> When either PROXY support or HTTP forwarding is enabled, it is critical that no external traffic can directly reach the {% data variables.product.prodname_ghe_server %} appliances. If external traffic is not properly blocked, the source IP addresses can be forged.

0 commit comments

Comments
 (0)