Skip to content

Commit eb13671

Browse files
authored
Merge pull request #47637 from kalexand-rh/portal_build_fixes
addressing some portal build issues
2 parents bc3a027 + 227f5fc commit eb13671

11 files changed

+10
-15
lines changed

installing/installing_bare_metal_ipi/ipi-install-installation-workflow.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,5 +104,5 @@ include::modules/ipi-preparing-reinstall-cluster-bare-metal.adoc[leveloffset=+1]
104104
[role="_additional-resources"]
105105
[id="additional-resources_creating_manifest_ignition"]
106106
== Additional resources
107-
* xref:../..//installing/installing_bare_metal/installing-bare-metal.html#installation-user-infra-generate-k8s-manifest-ignition_installing-bare-metal.adoc#installation-user-infra-generate-k8s-manifest-ignition_installing-bare-metal[{product-title} Creating the Kubernetes manifest and Ignition config files]
107+
* xref:../../installing/installing_bare_metal/installing-bare-metal.adoc#installation-user-infra-generate-k8s-manifest-ignition_installing-bare-metal[{product-title} Creating the Kubernetes manifest and Ignition config files]
108108
* xref:../../updating/understanding-upgrade-channels-release.adoc#understanding-upgrade-channels_understanding-upgrade-channels-releases[{product-title} upgrade channels and releases]

modules/dr-restoring-cluster-state.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ $ ssh -i <ssh-key-path> core@<master-hostname>
178178
----
179179
+
180180
.Sample `pki` directory
181-
[sample,terminal]
181+
[source,terminal]
182182
----
183183
sh-4.4# pwd
184184
/var/lib/kubelet/pki

modules/enabling-multi-cluster-console.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Do not set this feature gate on production clusters. You will not be able to upg
3232

3333
. A pop-up window that states that a web console update is available will appear a few moments after you enable. Click *Refresh the web console* in the pop-up window to update.
3434
+
35-
[Note]
35+
[NOTE]
3636
====
3737
You might see the pop-up window to refresh the web console twice if the second redeployment has not occurred by the time you click *Refresh the web console*.
3838
====

modules/networking-osp-enabling-metadata.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99

1010
You can apply a machine config to your machine pool that makes the {rh-openstack-first} metadata service available as a mountable drive.
1111

12-
[INFO]
12+
[NOTE]
1313
====
1414
The following machine config enables the display of {rh-openstack} network UUIDs from within the SR-IOV Network Operator. This configuration simplifies the association of SR-IOV resources to cluster SR-IOV resources.
1515
====

modules/nodes-nodes-viewing-listing.adoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,6 @@ Events: <11>
208208
209209
Among the information shown for nodes, the following node conditions appear in the output of the commands shown in this section:
210210

211-
[discrete]
212211
[id="machine-health-checks-resource-conditions"]
213212
.Node Conditions
214213
[cols="3a,8a",options="header"]

modules/op-creating-and-verifying-task-run-signatures-without-any-additional-authentication.adoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,13 @@ To verify signatures of task runs using {tekton-chains} with any additional auth
1515
* Retrieve the signature and payload from the signed task run.
1616
* Verify the signature of the task run.
1717
18-
[discrete]
1918
.Prerequisites
2019
Ensure that the following are installed on the cluster:
2120

2221
* {pipelines-title} Operator
2322
* {tekton-chains}
2423
* link:https://docs.sigstore.dev/cosign/installation/[Cosign]
2524
26-
[discrete]
2725
.Procedure
2826

2927
. Create an encrypted x509 key pair and save it as a Kubernetes secret:

modules/op-using-tekton-chains-to-sign-and-verify-image-and-provenance.adoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ Cluster administrators can use {tekton-chains} to sign and verify images and pro
1515
* Create an image with Kaniko in a task run.
1616
* Verify the signed image and the signed provenance.
1717
18-
[discrete]
1918
.Prerequisites
2019
Ensure that the following are installed on the cluster:
2120

@@ -25,7 +24,6 @@ Ensure that the following are installed on the cluster:
2524
* link:https://docs.sigstore.dev/rekor/installation/[Rekor]
2625
* link:https://stedolan.github.io/jq/[jq]
2726
28-
[discrete]
2927
.Procedure
3028

3129
. Create an encrypted x509 key pair and save it as a Kubernetes secret:

modules/persistent-storage-csi-vsphere-install-issues.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,12 +21,12 @@ To uninstall the third-party vSphere CSI Driver:
2121
. Delete the configmap and secret objects that were installed previously with the third-party vSphere CSI Driver.
2222
. Delete the third-party vSphere CSI driver `CSIDriver` object:
2323
+
24-
[output, terminal]
24+
[source,terminal]
2525
----
2626
~ $ oc delete CSIDriver csi.vsphere.vmware.com
2727
----
2828
+
29-
[output, terminal]
29+
[source,terminal]
3030
----
3131
csidriver.storage.k8s.io "csi.vsphere.vmware.com" deleted
3232
----

modules/persistent-storage-csi-vsphere-stor-policy.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
= vSphere storage policy
88

99
The vSphere CSI Operator Driver storage class uses vSphere's storage policy. {product-title} automatically creates a storage policy that targets datastore configured in cloud configuration:
10-
[output, yaml]
10+
[source,yaml]
1111
----
1212
kind: StorageClass
1313
apiVersion: storage.k8s.io/v1

modules/security-deploy-image-sources.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ applied uniformly across all nodes or targeted for different node workloads (for
2424
example, build, zone, or environment).
2525

2626
.Example image signature policy file
27-
[json]
27+
[source,json]
2828
----
2929
{
3030
"default": [{"type": "reject"}],

0 commit comments

Comments
 (0)