Skip to content

Commit a3ac232

Browse files
authored
Merge pull request #3176 from replicatedhq/cursor-rules
Swap gerunds for present tense verbs and add link-updating script
2 parents 3ae8b4b + 407be4f commit a3ac232

File tree

203 files changed

+673
-501
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

203 files changed

+673
-501
lines changed

.cursor/rules/docs-style-guide.mdc

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
description:
3+
globs:
4+
alwaysApply: true
5+
---
6+
# Replicated Documentation Style Guide
7+
8+
## Overview
9+
10+
This set of rules provides guidelines for writing clear and consistent product documentation for the Replicated Platform.
11+
12+
## General Principles
13+
14+
### Tone and Voice
15+
- Use active voice instead of passive voice
16+
- Use the second person "you" to address the reader
17+
- Never use "we" or "let's"
18+
- Write in a friendly tone without using slang, jargon, or frivolous words.
19+
20+
### Accessibility and Inclusivity
21+
- Write for a global audience by avoiding culturally-specific references, jargon, and figures of speech.
22+
- In HTML, use semantic tagging.
23+
- Avoid unnecessary font formatting.
24+
- Avoid large blocks of text by using short paragraphs, headings, and lists
25+
- Use shorter sentences. Try to use fewer than 26 words per sentence.
26+
27+
### Excessive Claims, Future Claims, and Marketing-Focused Language
28+
- Never use phrases like "simply" or "easily" in a procedure.
29+
- Avoid superlatives like best, worst, simplest, fastest, never, and always
30+
- Don't make any claims about a product that the user would not be able to easily verify.
31+
32+
### Timeless Documentation
33+
- Avoid time-bound terminology like "currently", "new", "at this time", and "now". Instead, write timeless documentation that makes no assumptions about a reader's prior knowledge.
34+
35+
## Formatting
36+
37+
### Text Formatting
38+
- Use bold for UI elements
39+
- Use bold for navigation steps in a UI, such as **Releases > Create Release**.
40+
- Use italics to draw attention to a word or phrase, such as when defining the term for the first time
41+
42+
### Capitalization
43+
- Use title case for titles and headings
44+
- Use all caps with underscores between words for placeholder text
45+
- Avoid all caps outside of placeholder text and code examples
46+
47+
### Symbols
48+
- Avoid using the ampersand symbol (&) except when describing UI elements, writing code examples, or in tables where space is limited
49+
50+
### Punctuation
51+
- Avoid semicolons
52+
- Avoid exclamation marks
53+
- Avoid question marks
54+
55+
## Linking
56+
57+
### Cross-references
58+
- A good cross-reference describes what information the reader can expect to learn, as well as the exact title (and location) of the page they will be taken to.
59+
- Do not embed links within a sentence.
60+
- Use the following format for cross references: "For more information about X, see [Topic Title](mdc:url)."
61+
- For links to other websites outside of docs.replicated.com, use the following format: "For more information about X, see [Topic Title](mdc:url) in the Company Name documentation."
62+

docs/enterprise/auth-changing-passwords.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Changing an Admin Console Password
1+
# Change an Admin Console Password
22

33
When you install for the first time with Replicated kURL, the Replicated KOTS Admin Console is secured with a single shared password that is set automatically for all users. Replicated recommends that you change this to a new, unique password for security purposes as this automated password is displayed to the user in plain text.
44

@@ -7,7 +7,7 @@ The Admin Console password is salted and one-way hashed using bcrypt. The irreve
77
For more information about bcrypt, see [bcrypt](https://en.wikipedia.org/wiki/Bcrypt) on Wikipedia.
88

99
:::note
10-
Users with Identity Provider (IDP) access cannot change their password using this procedure. If an attempt is made, IDP users receive a message in the user interface to contact the identity service provider to change their password. For more information about resetting an IDP user password, see [Resetting Authentication](auth-identity-provider#resetting-authentication) in _Using an Identity Provider for User Access (Beta)_.
10+
Users with Identity Provider (IDP) access cannot change their password using this procedure. If an attempt is made, IDP users receive a message in the user interface to contact the identity service provider to change their password. For more information about resetting an IDP user password, see [Resetting Authentication](auth-identity-provider#resetting-authentication) in _Use an Identity Provider for User Access (Beta)_.
1111
:::
1212

1313
To change your Admin Console password:

docs/enterprise/auth-configuring-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Configuring Role-based Access Control (Beta)
1+
# Configure Role-based Access Control (Beta)
22

33
You can regulate access to the Replicated KOTS Admin Console resources based on the roles of individual users within your organization.
44

docs/enterprise/auth-identity-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Using an Identity Provider for User Access (Beta)
1+
# Use an Identity Provider for User Access (Beta)
22

33
When you install an application for the first time, the Replicated KOTS Admin Console is secured with a single shared password for all users. It is possible to further configure the Admin Console to authenticate users with your organization's user management system. This feature is only available for licenses that have the Replicated identity service feature enabled.
44

docs/enterprise/cluster-management-add-nodes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
import KurlAvailability from "../partials/kurl/_kurl-availability.mdx"
22

3-
# Adding Nodes to kURL Clusters
3+
# Add Nodes to kURL Clusters
44

55
<KurlAvailability/>
66

docs/enterprise/delete-admin-console.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Deleting the Admin Console and Removing Applications
1+
# Delete the Admin Console and Remove Applications
22

33
This topic describes how to remove installed applications and delete the Replicated KOTS Admin Console. The information in this topic applies to existing cluster installations with KOTS.
44

@@ -81,4 +81,4 @@ To completely delete the Admin Console from an existing cluster:
8181
kubectl delete clusterrolebinding kotsadm-rolebinding
8282
```
8383
84-
1. (Optional) To uninstall the KOTS CLI, see [Uninstall](https://docs.replicated.com/reference/kots-cli-getting-started#uninstall) in _Installing the KOTS CLI_.
84+
1. (Optional) To uninstall the KOTS CLI, see [Uninstall](https://docs.replicated.com/reference/kots-cli-getting-started#uninstall) in _Installing the KOTS CLI_.

docs/enterprise/embedded-manage-nodes.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
import HaArchitecture from "../partials/embedded-cluster/_multi-node-ha-arch.mdx"
22

3-
# Managing Multi-Node Clusters with Embedded Cluster
3+
# Manage Multi-Node Clusters with Embedded Cluster
44

55
This topic describes managing nodes in clusters created with Replicated Embedded Cluster, including how to add nodes and enable high-availability for multi-node clusters.
66

@@ -36,7 +36,7 @@ To add nodes to a cluster:
3636

3737
1. Log in to the Admin Console.
3838

39-
1. If you promoted a new release that configures the `roles` key in the Embedded Cluster Config, update the instance to the new version. See [Performing Updates in Embedded Clusters](/enterprise/updating-embedded).
39+
1. If you promoted a new release that configures the `roles` key in the Embedded Cluster Config, update the instance to the new version. See [Perform Updates in Embedded Clusters](/enterprise/updating-embedded).
4040

4141
1. Go to **Cluster Management > Add node** at the top of the page.
4242

@@ -50,7 +50,7 @@ To add nodes to a cluster:
5050

5151
* If the Embedded Cluster Config [roles](/reference/embedded-config#roles) key is not configured, all new nodes joined to the cluster are assigned the `controller` role by default. The `controller` role designates nodes that run the Kubernetes control plane. Controller nodes can also run other workloads, such as application or Replicated KOTS workloads.
5252

53-
* Roles are not updated or changed after a node is added. If you need to change a nodes role, reset the node and add it again with the new role.
53+
* Roles are not updated or changed after a node is added. If you need to change a node's role, reset the node and add it again with the new role.
5454

5555
* For multi-node clusters with high availability (HA), at least three `controller` nodes are required. You can assign both the `controller` role and one or more `custom` roles to the same node. For more information about creating HA clusters with Embedded Cluster, see [Enable High Availability for Multi-Node Clusters (Alpha)](#ha) below.
5656

docs/enterprise/embedded-tls-certs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Updating Custom TLS Certificates in Embedded Cluster Installations
1+
# Update Custom TLS Certificates in Embedded Cluster Installations
22

33
This topic describes how to update custom TLS certificates in Replicated Embedded Cluster installations.
44

docs/enterprise/gitops-managing-secrets.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
import GitOpsNotRecommended from "../partials/gitops/_gitops-not-recommended.mdx"
22

3-
# Managing Secrets with KOTS Auto-GitOps (Alpha)
3+
# Manage Secrets with KOTS Auto-GitOps (Alpha)
44

55
<GitOpsNotRecommended/>
66

docs/enterprise/gitops-workflow.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ If you have more than one application installed, you can selectively enable Auto
1313

1414
After enabling the Auto-GitOps workflow for an application, the Admin Console makes your first commit with the latest available version in the Admin Console. The latest available version is often the current version that is deployed. Subsequently, the Admin Console makes separate commits with any available updates.
1515

16-
If you configure automatic updates for the application, any updates from your vendor are automatically committed to your Git repository. For more information about configuring automatic updates, see [Configuring Automatic Updates](/enterprise/updating-apps).
16+
If you configure automatic updates for the application, any updates from your vendor are automatically committed to your Git repository. For more information about configuring automatic updates, see [Configure Automatic Updates](/enterprise/updating-apps).
1717

1818
You can change your GitOps settings or disable Auto-GitOps at any time from the **GitOps** tab in the Admin Console.
1919

0 commit comments

Comments
 (0)