Skip to content

Commit e5491ec

Browse files
author
GitHub Actions
committed
Fix consistent mentions to the product project
1 parent c2f7c22 commit e5491ec

13 files changed

+19
-19
lines changed

modules/authorization/proc-defining-authorizations-in-external-files-by-using-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ conditions: _<conditions>_
6666
+
6767
See: xref:ref-rbac-conditional-policy-definition_{context}[Conditional policies reference].
6868

69-
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {ocp-short} project containing {product-short}.
69+
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {my-product-namespace} {ocp-short} project.
7070
+
7171
[source,terminal]
7272
----

modules/authorization/proc-defining-authorizations-in-external-files-by-using-the-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ conditions: _<conditions>_
6666
+
6767
See: xref:ref-rbac-conditional-policy-definition_{context}[Conditional policies reference].
6868

69-
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {ocp-short} project containing {product-short}.
69+
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {my-product-namespace}{ocp-short} project.
7070
+
7171
[source,terminal]
7272
----

modules/dynamic-plugins/proc-create-plugin-tgz-file.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ To create a plugin registry using HTTP server on {ocp-short}, run the following
5050
.Example commands to build and deploy an HTTP server in {ocp-short}
5151
[source,terminal]
5252
----
53-
oc project rhdh
53+
oc project {my-product-namespace}
5454
oc new-build httpd --name=plugin-registry --binary
5555
oc start-build plugin-registry --from-dir=dynamic-plugins-root --wait
5656
oc new-app --image-stream=plugin-registry

modules/installation/proc-deploy-rhdh-instance-eks.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ node-p'require("crypto").randomBytes(24).toString("base64")'
7878
----
7979
kubectl patch serviceaccount default \
8080
-p '{"imagePullSecrets": [{"name": "rhdh-pull-secret"}]}' \
81-
-n <your_namespace>
81+
-n <{my-product-namespace}>
8282
----
8383
--
8484

modules/installation/proc-deploy-rhdh-instance-gke.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ node-p'require("crypto").randomBytes(24).toString("base64")'
8080
----
8181
kubectl patch serviceaccount default \
8282
-p '{"imagePullSecrets": [{"name": "rhdh-pull-secret"}]}' \
83-
-n <your_namespace>
83+
-n <{my-product-namespace}>
8484
----
8585
--
8686

modules/installation/proc-install-rhdh-airgapped-environment-ocp-helm.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,12 +75,12 @@ podman pull registry.redhat.io/rhel9/postgresql-15:latest
7575
+
7676
[source,terminal,source,subs="attributes+"]
7777
----
78-
podman push --remove-signatures registry.redhat.io/rhdh/rhdh-hub-rhel9:{product-version} default-route-openshift-image-registry.<hostname>/<project_name>/rhdh-hub-rhel9:{product-version}
78+
podman push --remove-signatures registry.redhat.io/rhdh/rhdh-hub-rhel9:{product-version} default-route-openshift-image-registry.<hostname>/ {my-product-namespace}/rhdh-hub-rhel9:{product-version}
7979
----
8080
+
8181
[source,terminal]
8282
----
83-
podman push --remove-signatures registry.redhat.io/rhel9/postgresql-15:latest default-route-openshift-image-registry.<hostname>/<project_name>/postgresql-15:latest
83+
podman push --remove-signatures registry.redhat.io/rhel9/postgresql-15:latest default-route-openshift-image-registry.<hostname>/ {my-product-namespace}/postgresql-15:latest
8484
----
8585
+
8686
For more information about pushing images directly to the {ocp-short} image registry, see https://access.redhat.com/solutions/6959306[How do I push an Image directly into the OpenShift 4 registry].
@@ -94,7 +94,7 @@ If an x509 error occurs, verify that you have link:https://access.redhat.com/sol
9494
+
9595
[source,terminal]
9696
----
97-
oc get imagestream -n <project_name>
97+
oc get imagestream -n {my-product-namespace}
9898
----
9999

100100
. Enable local image lookup for both images by running the following commands:

modules/installation/proc-install-rhdh-ocp-helm-cli.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ You can use the Helm CLI to install {product} on {ocp-brand-name}.
1414
* You have installed the Helm CLI tool.
1515

1616
.Procedure
17-
. Create and activate the _<rhdh>_ {ocp-short} project:
17+
. Create and activate the _<{my-product-namespace}>_{ocp-short} project:
1818
+
1919
[subs="quotes+"]
2020
----

modules/installation/proc-rhdh-deploy-aks-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ The previous command configures the Kubernetes client and sets the current conte
108108
helm repo add openshift-helm-charts https://charts.openshift.io/
109109
----
110110

111-
. Create and activate the _<rhdh>_ namespace:
111+
. Create and activate the _<{my-product-namespace}>_:
112112
+
113113
[source,terminal,subs="quotes+"]
114114
----

modules/installation/proc-rhdh-deploy-aks-operator.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ apiVersion: networking.k8s.io/v1
6262
kind: Ingress
6363
metadata:
6464
name: rhdh-ingress
65-
namespace: <your_namespace>
65+
namespace: {my-product-namespace}
6666
spec:
6767
ingressClassName: webapprouting.kubernetes.azure.com
6868
rules:
@@ -155,7 +155,7 @@ spec:
155155
--
156156
[source,terminal]
157157
----
158-
kubectl -n <your_namespace> apply -f rhdh.yaml
158+
kubectl -n {my-product-namespace} apply -f rhdh.yaml
159159
----
160160
--
161161

modules/observe/proc-admin-enabling-metrics-ocp-operator.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,14 @@ apiVersion: monitoring.coreos.com/v1
2626
kind: ServiceMonitor
2727
metadata:
2828
name: <custom_resource_name> # <1>
29-
namespace: <project_name> # <2>
29+
namespace: {my-product-namespace} # <2>
3030
labels:
3131
app.kubernetes.io/instance: <custom_resource_name>
3232
app.kubernetes.io/name: backstage
3333
spec:
3434
namespaceSelector:
3535
matchNames:
36-
- <project_name>
36+
- {my-product-namespace}
3737
selector:
3838
matchLabels:
3939
rhdh.redhat.com/app: backstage-<custom_resource_name>
@@ -42,7 +42,7 @@ spec:
4242
path: '/metrics'
4343
----
4444
<1> Replace `<custom_resource_name>` with the name of your {product} CR.
45-
<2> Replace `<project_name>` with the name of the {ocp-short} project where your {product} instance is running.
45+
<2> Replace {my-product-namespace} with the name of the {ocp-short} project where your {product} instance is running.
4646

4747
. Apply the `ServiceMonitor` CR by running the following command:
4848
+

0 commit comments

Comments
 (0)