Skip to content

Commit 2e9d5fc

Browse files
enozcankwart
authored andcommitted
Move sources under Antora module.
1 parent aa2e633 commit 2e9d5fc

File tree

8 files changed

+7
-7
lines changed

8 files changed

+7
-7
lines changed
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

doc/modules/ROOT/pages/index.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ port numbers (`5701-5703`). You can use the following PowerShell command:
7070

7171
[source,powershell]
7272
----
73-
include::../../../../allow-hazelcast-port.ps1[]
73+
include::example$allow-hazelcast-port.ps1[]
7474
----
7575

7676
.Screenshot - Adding Windows Firewall Rule in PowerShell
@@ -88,7 +88,7 @@ on both servers.
8888
.C:\Windows\krb5.ini
8989
[source,powershell]
9090
----
91-
include::../../../../krb5.ini[]
91+
include::example$krb5.ini[]
9292
----
9393

9494
NOTE: Kerberos protocol checks are often case-sensitive. Use the proper form
@@ -156,7 +156,7 @@ Following configuration is for the application server:
156156
.C:\hazelcast-enterprise-4.1\demo\hazelcast.yml
157157
[source,yaml]
158158
----
159-
include::../../../../hazelcast-simple.yml[]
159+
include::example$hazelcast-simple.yml[]
160160
----
161161

162162
Use similar configuration on the domain controller. Just update principal name and
@@ -259,7 +259,7 @@ as a member of the "Acme Cache Czechia" group.
259259

260260
[source,powershell]
261261
----
262-
include::../../../../create-groups-and-map-user.ps1[]
262+
include::example$create-groups-and-map-user.ps1[]
263263
----
264264

265265
=== Re-configure members
@@ -272,7 +272,7 @@ interface.
272272
.C:\hazelcast-enterprise-4.1\demo\hazelcast.yml
273273
[source,yaml]
274274
----
275-
include::../../../../hazelcast.yml[]
275+
include::example$hazelcast.yml[]
276276
----
277277

278278
What's new here are the explicitly defined `Krb5LoginModule` configurations
@@ -337,7 +337,7 @@ within the Hazelcast installation.
337337
.C:\hazelcast-enterprise-4.1\demo\hazelcast-client.yml
338338
[source,yaml]
339339
----
340-
include::../../../../hazelcast-client.yml[]
340+
include::example$hazelcast-client.yml[]
341341
----
342342

343343
The Kerberos configuration on the client side is similar to the member configuration.
@@ -386,7 +386,7 @@ Create the new `debug-logging.properties` file beside the batch file:
386386

387387
[source,properties]
388388
----
389-
include::../../../../debug-logging.properties[]
389+
include::example$debug-logging.properties[]
390390
----
391391

392392
You can also add the `debug` option to `Krb5LoginModule` configuration. E.g.

0 commit comments

Comments
 (0)