Skip to content

Commit fd49078

Browse files
author
GitHub Actions
committed
Fix mentions to the product project
1 parent e5491ec commit fd49078

7 files changed

+8
-8
lines changed

modules/authorization/proc-defining-authorizations-in-external-files-by-using-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ conditions: _<conditions>_
6666
+
6767
See: xref:ref-rbac-conditional-policy-definition_{context}[Conditional policies reference].
6868

69-
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {my-product-namespace} {ocp-short} project.
69+
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {ocp-short} project containing {product-short}.
7070
+
7171
[source,terminal]
7272
----

modules/authorization/proc-defining-authorizations-in-external-files-by-using-the-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ conditions: _<conditions>_
6666
+
6767
See: xref:ref-rbac-conditional-policy-definition_{context}[Conditional policies reference].
6868

69-
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {my-product-namespace}{ocp-short} project.
69+
. Upload your `rbac-policies.csv` and `rbac-conditional-policies.yaml` files to a `rbac-policies` config map in your {ocp-short} project containing {product-short}.
7070
+
7171
[source,terminal]
7272
----

modules/installation/proc-deploy-rhdh-instance-eks.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ node-p'require("crypto").randomBytes(24).toString("base64")'
7878
----
7979
kubectl patch serviceaccount default \
8080
-p '{"imagePullSecrets": [{"name": "rhdh-pull-secret"}]}' \
81-
-n <{my-product-namespace}>
81+
-n <your_namespace>
8282
----
8383
--
8484

modules/installation/proc-deploy-rhdh-instance-gke.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ node-p'require("crypto").randomBytes(24).toString("base64")'
8080
----
8181
kubectl patch serviceaccount default \
8282
-p '{"imagePullSecrets": [{"name": "rhdh-pull-secret"}]}' \
83-
-n <{my-product-namespace}>
83+
-n <your_namespace>
8484
----
8585
--
8686

modules/installation/proc-install-rhdh-airgapped-environment-ocp-helm.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,12 +75,12 @@ podman pull registry.redhat.io/rhel9/postgresql-15:latest
7575
+
7676
[source,terminal,source,subs="attributes+"]
7777
----
78-
podman push --remove-signatures registry.redhat.io/rhdh/rhdh-hub-rhel9:{product-version} default-route-openshift-image-registry.<hostname>/ {my-product-namespace}/rhdh-hub-rhel9:{product-version}
78+
podman push --remove-signatures registry.redhat.io/rhdh/rhdh-hub-rhel9:{product-version} default-route-openshift-image-registry.<hostname>/ <project_name>/rhdh-hub-rhel9:{product-version}
7979
----
8080
+
8181
[source,terminal]
8282
----
83-
podman push --remove-signatures registry.redhat.io/rhel9/postgresql-15:latest default-route-openshift-image-registry.<hostname>/ {my-product-namespace}/postgresql-15:latest
83+
podman push --remove-signatures registry.redhat.io/rhel9/postgresql-15:latest default-route-openshift-image-registry.<hostname>/<project_name>/postgresql-15:latest
8484
----
8585
+
8686
For more information about pushing images directly to the {ocp-short} image registry, see https://access.redhat.com/solutions/6959306[How do I push an Image directly into the OpenShift 4 registry].

modules/observe/proc-admin-enabling-metrics-ocp-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ spec:
4242
path: '/metrics'
4343
----
4444
<1> Replace `<custom_resource_name>` with the name of your {product} CR.
45-
<2> Replace {my-product-namespace} with the name of the {ocp-short} project where your {product} instance is running.
45+
<2> Replace `<project_name>` with the name of the {ocp-short} project where your {product} instance is running.
4646

4747
. Apply the `ServiceMonitor` CR by running the following command:
4848
+

modules/observe/proc-forward-audit-log-splunk.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ You can use the {logging-brand-name} ({logging-short}) Operator and a `ClusterLo
1818
.Example command to switch to a namespace
1919
[source,bash]
2020
----
21-
oc project {my-product-namespace}
21+
oc project openshift-logging
2222
----
2323
--
2424
. Create a `serviceAccount` named `log-collector` and bind the `collect-application-logs` role to the `serviceAccount` :

0 commit comments

Comments
 (0)