You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* For information about requesting bound service account tokens, see xref:../authentication/bound-service-account-tokens.html#bound-sa-tokens-configuring_bound-service-account-tokens[Configuring bound service account tokens using volume projection]
18
18
19
-
* For information about creating a service account token secret, see see xref:../nodes/pods/nodes-pods-secrets.html#nodes-pods-secrets-creating-sa_nodes-pods-secrets[Creating a service account token secret].
19
+
* For information about creating a service account token secret, see xref:../nodes/pods/nodes-pods-secrets.html#nodes-pods-secrets-creating-sa_nodes-pods-secrets[Creating a service account token secret].
* To include pipelines as code along with with the application source code in the same repository, see xref:../../cicd/pipelines/using-pipelines-as-code.adoc#using-pipelines-as-code[Using Pipelines as code].
79
+
* To include pipelines as code along with the application source code in the same repository, see xref:../../cicd/pipelines/using-pipelines-as-code.adoc#using-pipelines-as-code[Using Pipelines as code].
80
80
* For more details on pipelines in the *Developer* perspective, see the xref:../../cicd/pipelines/working-with-pipelines-using-the-developer-perspective.adoc#working-with-pipelines-using-the-developer-perspective[working with pipelines in the *Developer* perspective] section.
81
81
* To learn more about Security Context Constraints (SCCs), see the xref:../../authentication/managing-security-context-constraints.adoc#managing-pod-security-policies[Managing Security Context Constraints] section.
82
82
* For more examples of reusable tasks, see the link:https://github.com/openshift/pipelines-catalog[OpenShift Catalog] repository. Additionally, you can also see the Tekton Catalog in the Tekton project.
@@ -33,15 +33,15 @@ You can determine the cause of the problem by reviewing the following questions:
33
33
34
34
To ensure that the `ClusterGroupUpgrade` configuration is functional, you can do the following:
35
35
36
-
. Create the `ClusterGroupUpgrade` CR with the `spec.enable` field set to `false`.
36
+
. Create the `ClusterGroupUpgrade` CR with the `spec.enable` field set to `false`.
37
37
38
-
. Wait for the status to be updated and go through the troubleshooting questions.
38
+
. Wait for the status to be updated and go through the troubleshooting questions.
39
39
40
40
. If everything looks as expected, set the `spec.enable` field to `true` in the `ClusterGroupUpgrade` CR.
41
41
42
42
[WARNING]
43
43
====
44
-
After you set the `spec.enable` field to `true` in the `ClusterUpgradeGroup` CR, the update procedure starts and you cannot edit the CR's `spec` fields anymore.
44
+
After you set the `spec.enable` field to `true` in the `ClusterUpgradeGroup` CR, the update procedure starts and you cannot edit the CR's `spec` fields anymore.
45
45
====
46
46
47
47
[id="talo-troubleshooting-modify-cgu_{context}"]
@@ -51,7 +51,7 @@ Issue:: You cannot edit the `ClusterUpgradeGroup` CR after enabling the update.
51
51
52
52
Resolution:: Restart the procedure by performing the following steps:
53
53
+
54
-
. Remove the old `ClusterGroupUpgrade` CR by running the following command:
54
+
. Remove the old `ClusterGroupUpgrade` CR by running the following command:
Copy file name to clipboardExpand all lines: modules/dr-restoring-cluster-state.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -292,7 +292,7 @@ If the status is `Pending`, or the output lists more than one running etcd pod,
292
292
For bare metal installations on installer-provisioned infrastructure, control plane machines are not recreated. For more information, see "Replacing a bare-metal control plane node".
293
293
====
294
294
+
295
-
If you are running installer-provisioned infrastructure, or you used the Machine API to create your machines, follow these steps. Otherwise, you must create the new master node using the same method that was used to originally create it.
295
+
If you are running installer-provisioned infrastructure, or you used the Machine API to create your machines, follow these steps. Otherwise, you must create the new control plane node using the same method that was used to originally create it.
Copy file name to clipboardExpand all lines: modules/installation-configuration-parameters.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1284,7 +1284,7 @@ Additional {rh-virtualization} configuration parameters for machine pools are de
1284
1284
|Number
1285
1285
1286
1286
|`<machine-pool>.platform.ovirt.vmType`
1287
-
|Optional. The VM workload type, such as `high-performance`, `server`, or `desktop`. By default, master nodes use `high-performance`, and worker nodes use `server`. For details, see link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Virtual_Machine_General_settings_explained[Explanation of Settings in the New Virtual Machine and Edit Virtual Machine Windows] and link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Configuring_High_Performance_Virtual_Machines_Templates_and_Pools[Configuring High Performance Virtual Machines, Templates, and Pools] in the _Virtual Machine Management Guide_.
1287
+
|Optional. The VM workload type, such as `high-performance`, `server`, or `desktop`. By default, control plane nodes use `high-performance`, and worker nodes use `server`. For details, see link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Virtual_Machine_General_settings_explained[Explanation of Settings in the New Virtual Machine and Edit Virtual Machine Windows] and link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Configuring_High_Performance_Virtual_Machines_Templates_and_Pools[Configuring High Performance Virtual Machines, Templates, and Pools] in the _Virtual Machine Management Guide_.
1288
1288
[NOTE]
1289
1289
====
1290
1290
`high_performance` improves performance on the VM, but there are limitations. For example, you cannot access the VM with a graphical console. For more information, see link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Configuring_High_Performance_Virtual_Machines_Templates_and_Pools[Configuring High Performance Virtual Machines, Templates, and Pools] in the _Virtual Machine Management Guide_.
Copy file name to clipboardExpand all lines: modules/installation-nutanix-installer-infra-reqs.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ You must use AHV IP Address Management (IPAM) for the network and ensure that it
44
44
45
45
[NOTE]
46
46
====
47
-
It is recommended that each {product-title} node in the cluster have access to a Network Time Protocol (NTP) server that is discoverable via DHCP. Installation is possible without an NTP server. However, an NTP server prevents errors typically assoicated with asynchronous server clocks.
47
+
It is recommended that each {product-title} node in the cluster have access to a Network Time Protocol (NTP) server that is discoverable via DHCP. Installation is possible without an NTP server. However, an NTP server prevents errors typically associated with asynchronous server clocks.
Copy file name to clipboardExpand all lines: modules/mirror-registry-release-notes.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@
7
7
8
8
The _mirror registry for Red Hat OpenShift_ is a small and streamlined container registry that you can use as a target for mirroring the required container images of {product-title} for disconnected installations.
9
9
10
-
These release notes track the development of the _mirror registry for Red Hat Openshift_ in {product-title}.
10
+
These release notes track the development of the _mirror registry for Red Hat OpenShift_ in {product-title}.
11
11
12
12
For an overview of the _mirror registry for Red Hat OpenShift_, see xref:../../installing/disconnected_install/installing-mirroring-creating-registry.html#mirror-registry-flags_installing-mirroring-creating-registry[Creating a mirror registry with mirror registry for Red Hat OpenShift].
Copy file name to clipboardExpand all lines: modules/monitoring-supported-remote-write-authentication-settings.adoc
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ You cannot use this method simultaneously with authorization, OAuth 2.0, or basi
22
22
23
23
|authorization|`authorization`|Authorization sets the `Authorization` header on every remote write request using the configured token.
24
24
25
-
|OAuth 2.0|`oauth2`|An OAuth 2.0 configuration uses the client credentials grant type.
25
+
|OAuth 2.0|`oauth2`|An OAuth 2.0 configuration uses the client credentials grant type.
26
26
Prometheus fetches an access token from `tokenUrl` with the specified client ID and client secret to access the remote write endpoint.
27
27
You cannot use this method simultaneously with authorization, AWS Signature Version 4, or basic authentication.
28
28
@@ -50,12 +50,12 @@ data:
50
50
----
51
51
<1> The URL of the remote write endpoint.
52
52
<2> The required configuration details for the authentication method for the endpoint.
53
-
Currently supported authentication methods are Amazon Web Services (AWS) Signature Version 4, authorization, basic authentication, OAuth 2.0, and TLS client.
53
+
Currently supported authentication methods are Amazon Web Services (AWS) Signature Version 4, authorization, basic authentication, OAuth 2.0, and TLS client.
54
54
55
55
[NOTE]
56
56
====
57
57
If you configure remote write for the Prometheus instance that monitors user-defined projects, edit the `user-workload-monitoring-config` config map in the `openshift-user-workload-monitoring` namespace.
58
-
Note that the Prometheus config map component is called `prometheus` in the `user-workload-monitoring-config` `ConfigMap` object and not `prometheusK8s`, as it is in the `cluster-monitoring-config` `ConfigMap` object.
58
+
Note that the Prometheus config map component is called `prometheus` in the `user-workload-monitoring-config` `ConfigMap` object and not `prometheusK8s`, as it is in the `cluster-monitoring-config` `ConfigMap` object.
59
59
====
60
60
61
61
== Example remote write authentication settings
@@ -111,13 +111,13 @@ data:
111
111
<1> The AWS region.
112
112
<2> The name of the `Secret` object containing the AWS API access credentials.
113
113
<3> The key that contains the AWS API access key in the specified `Secret` object.
114
-
<4> The key that contains teh AWS API secret key in the specified `Secret` object.
114
+
<4> The key that contains the AWS API secret key in the specified `Secret` object.
115
115
<5> The name of the AWS profile that is being used to authenticate.
116
116
<6> The unique identifier for the Amazon Resource Name (ARN) assigned to your role.
117
117
118
118
.Sample YAML for basic authentication
119
119
120
-
The following shows sample basic authentication settings for a `Secret` object named `rw-basic-auth` in the `openshift-monitoring` namespace:
120
+
The following shows sample basic authentication settings for a `Secret` object named `rw-basic-auth` in the `openshift-monitoring` namespace:
121
121
122
122
[source,yaml]
123
123
----
@@ -135,7 +135,7 @@ type: Opaque
135
135
<2> The password.
136
136
137
137
The following sample shows a `basicAuth` remote write configuration that uses a `Secret` object named `rw-basic-auth` in the `openshift-monitoring` namespace.
138
-
It assumes that you have already set up authentication credentials for the endpoint.
138
+
It assumes that you have already set up authentication credentials for the endpoint.
139
139
140
140
[source,yaml]
141
141
----
@@ -277,7 +277,7 @@ data:
277
277
client.key: <client_key> <3>
278
278
type: tls
279
279
----
280
-
<1> The CA certificate in the Prometheus container with which to validate the server certificate.
280
+
<1> The CA certificate in the Prometheus container with which to validate the server certificate.
281
281
<2> The client certificate for authentication with the server.
282
282
<3> The client key.
283
283
@@ -311,4 +311,4 @@ data:
311
311
<1> The name of the corresponding `Secret` object that contains the TLS authentication credentials. Note that `ca` and `cert` can alternatively refer to a `ConfigMap` object, though `keySecret` must refer to a `Secret` object.
312
312
<2> The key in the specified `Secret` object that contains the CA certificate for the endpoint.
313
313
<3> The key in the specified `Secret` object that contains the client certificate for the endpoint.
314
-
<4> The key in the specified `Secret` object that contains the client key secret.
314
+
<4> The key in the specified `Secret` object that contains the client key secret.
0 commit comments