Skip to content

Commit 4ec42ec

Browse files
authored
Merge pull request #39038 from pneedle-rh/osdocs-2869-removing-residual-osd-ifdefs-main
OSDOCS-2869 - Removing some of the residual OSD conditionals
2 parents b0baea5 + 5f78da8 commit 4ec42ec

26 files changed

+5
-405
lines changed

_unused_topics/builds-output-image-digest.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
Built images can be uniquely identified by their digest, which can
99
later be used to pull the image by digest regardless of its current tag.
1010

11-
ifdef::openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated[]
11+
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
1212
`Docker` and
1313
endif::[]
1414
`Source-to-Image (S2I)` builds store the digest in

_unused_topics/security-overview.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ All communication channels with the REST API, as well as between master
4141
components such as etcd and the API server, are secured with TLS. TLS provides
4242
strong encryption, data integrity, and authentication of servers with X.509
4343
server certificates and public key infrastructure.
44-
ifdef::openshift-origin,openshift-enterprise,openshift-dedicated[]
44+
ifdef::openshift-origin,openshift-enterprise[]
4545
By default, a new internal PKI is created for each deployment of
4646
{product-title}. The internal PKI uses 2048 bit RSA keys and SHA-256 signatures.
4747
endif::[]

applications/projects/configuring-project-creation.adoc

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,6 @@ As
1414
a cluster administrator, you can allow and configure how developers and service
1515
accounts can create, or _self-provision_, their own projects.
1616

17-
////
18-
ifdef::openshift-dedicated[]
19-
A dedicated administrator is by default an administrator for all projects on the
20-
cluster that are not managed by Red Hat Operations.
21-
endif::[]
22-
////
23-
2417
include::modules/about-project-creation.adoc[leveloffset=+1]
2518
include::modules/modifying-template-for-new-projects.adoc[leveloffset=+1]
2619
include::modules/disabling-project-self-provisioning.adoc[leveloffset=+1]

authentication/bound-service-account-tokens.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@ include::modules/bound-sa-tokens-about.adoc[leveloffset=+1]
1313
// Configuring bound service account tokens using volume projection
1414
include::modules/bound-sa-tokens-configuring.adoc[leveloffset=+1]
1515

16-
// TODO: Verify distros: openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated
16+
// TODO: Verify distros: openshift-enterprise,openshift-webscale,openshift-origin

authentication/ldap-syncing.adoc

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,6 @@ toc::[]
88
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
99
As an administrator,
1010
endif::[]
11-
ifdef::openshift-dedicated[]
12-
As a xref:../authentication/understanding-and-creating-service-accounts.html#dedicated-admin-role-overview_{context}[dedicated administrator],
13-
endif::[]
1411
you can use groups to manage users, change
1512
their permissions, and enhance collaboration. Your organization may have already
1613
created user groups and stored them in an LDAP server. {product-title} can sync
@@ -29,13 +26,6 @@ You must have `cluster-admin` privileges to sync groups.
2926
====
3027
endif::[]
3128

32-
ifdef::openshift-dedicated[]
33-
[NOTE]
34-
====
35-
You must have `dedicated-admins` privileges to sync groups.
36-
====
37-
endif::[]
38-
3929
include::modules/ldap-syncing-about.adoc[leveloffset=+1]
4030
include::modules/ldap-syncing-config-rfc2307.adoc[leveloffset=+2]
4131
include::modules/ldap-syncing-config-activedir.adoc[leveloffset=+2]

authentication/understanding-and-creating-service-accounts.adoc

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,6 @@ toc::[]
77

88
include::modules/service-accounts-overview.adoc[leveloffset=+1]
99

10-
include::modules/service-accounts-dedicated-admin-role.adoc[leveloffset=+1]
11-
12-
include::modules/dedicated-admin-role-overview.adoc[leveloffset=+1]
13-
1410
// include::modules/service-accounts-enabling-authentication.adoc[leveloffset=+1]
1511

1612
include::modules/service-accounts-creating.adoc[leveloffset=+1]

logging/cluster-logging.adoc

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -24,21 +24,6 @@ Because the internal {product-title} Elasticsearch log store does not provide se
2424
====
2525
endif::[]
2626

27-
ifdef::openshift-dedicated[]
28-
As an administrator, you can deploy OpenShift Logging to
29-
aggregate logs for a range of {product-title} services.
30-
31-
OpenShift Logging runs on worker nodes. As an
32-
administrator, you can monitor resource consumption in the
33-
console and via Prometheus and Grafana. Due to the high work load required for
34-
logging, more worker nodes may be required for your environment.
35-
36-
Logs in {product-title} are retained for seven days before rotation. Logging
37-
storage is capped at 600GiB. This is independent of a cluster's allocated base
38-
storage.
39-
endif::[]
40-
41-
4227
// The following include statements pull in the module files that comprise
4328
// the assembly. Include any combination of concept, procedure, or reference
4429
// modules required to cover the user story. You can also include other

modules/cluster-logging-about-crd.adoc

Lines changed: 0 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -13,59 +13,6 @@ The following example shows a typical custom resource for OpenShift Logging.
1313

1414
[id="efk-logging-configuring-about-sample_{context}"]
1515
.Sample `ClusterLogging` custom resource (CR)
16-
ifdef::openshift-dedicated[]
17-
[source,yaml]
18-
----
19-
apiVersion: "logging.openshift.io/v1"
20-
kind: "ClusterLogging"
21-
metadata:
22-
name: "instance"
23-
namespace: "openshift-logging"
24-
spec:
25-
managementState: "Managed"
26-
logStore:
27-
type: "elasticsearch"
28-
retentionPolicy:
29-
application:
30-
maxAge: 1d
31-
infra:
32-
maxAge: 7d
33-
audit:
34-
maxAge: 7d
35-
elasticsearch:
36-
nodeCount: 3
37-
storage:
38-
storageClassName: "gp2"
39-
size: "200Gi"
40-
redundancyPolicy: "SingleRedundancy"
41-
nodeSelector:
42-
node-role.kubernetes.io/worker: ""
43-
resources:
44-
limits:
45-
memory: "16Gi"
46-
requests:
47-
memory: "16Gi"
48-
proxy:
49-
resources:
50-
limits:
51-
memory: 256Mi
52-
requests:
53-
memory: 256Mi
54-
visualization:
55-
type: "kibana"
56-
kibana:
57-
replicas: 1
58-
nodeSelector:
59-
node-role.kubernetes.io/worker: ""
60-
collection:
61-
logs:
62-
type: "fluentd"
63-
fluentd: {}
64-
nodeSelector:
65-
node-role.kubernetes.io/worker: ""
66-
----
67-
endif::[]
68-
6916
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
7017
[source,yaml]
7118
----

modules/cluster-logging-about.adoc

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,6 @@ other resources necessary to support OpenShift Logging. The operators are
2020
responsible for deploying, upgrading, and maintaining OpenShift Logging.
2121
endif::openshift-enterprise,openshift-webscale,openshift-origin[]
2222

23-
ifdef::openshift-dedicated[]
24-
{product-title} administrators can deploy the Red Hat OpenShift Logging Operator and the
25-
OpenShift Elasticsearch Operator by using the {product-title} web console and can configure logging in the
26-
`openshift-logging` namespace. Configuring logging will deploy Elasticsearch,
27-
Fluentd, and Kibana in the `openshift-logging` namespace. The operators are
28-
responsible for deploying, upgrading, and maintaining OpenShift Logging.
29-
endif::openshift-dedicated[]
30-
3123
The `ClusterLogging` CR defines a complete OpenShift Logging environment that includes all the components
3224
of the logging stack to collect, store and visualize logs. The Red Hat OpenShift Logging Operator watches the OpenShift Logging
3325
CR and adjusts the logging deployment accordingly.

modules/cluster-logging-deploy-cli.adoc

Lines changed: 0 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -284,52 +284,6 @@ This default OpenShift Logging configuration should support a wide array of envi
284284
configuring OpenShift Logging components for information on modifications you can make to your OpenShift Logging cluster.
285285
====
286286
+
287-
ifdef::openshift-dedicated[]
288-
[source,yaml]
289-
----
290-
apiVersion: "logging.openshift.io/v1"
291-
kind: "ClusterLogging"
292-
metadata:
293-
name: "instance"
294-
namespace: "openshift-logging"
295-
spec:
296-
managementState: "Managed"
297-
logStore:
298-
type: "elasticsearch"
299-
retentionPolicy:
300-
application:
301-
maxAge: 1d
302-
infra:
303-
maxAge: 7d
304-
audit:
305-
maxAge: 7d
306-
elasticsearch:
307-
nodeCount: 3
308-
storage:
309-
storageClassName: gp2
310-
size: "200Gi"
311-
redundancyPolicy: "SingleRedundancy"
312-
nodeSelector:
313-
node-role.kubernetes.io/worker: ""
314-
limits:
315-
memory: "16Gi"
316-
requests:
317-
memory: "16Gi"
318-
visualization:
319-
type: "kibana"
320-
kibana:
321-
replicas: 1
322-
nodeSelector:
323-
node-role.kubernetes.io/worker: ""
324-
collection:
325-
logs:
326-
type: "fluentd"
327-
fluentd: {}
328-
nodeSelector:
329-
node-role.kubernetes.io/worker: ""
330-
----
331-
endif::[]
332-
333287
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
334288
[source,yaml]
335289
----

0 commit comments

Comments
 (0)