Skip to content

Commit 2e26b23

Browse files
Address asciidoctor-dita-vale issues for rex (#4379)
* Add abstract role and create basic abstracts * Apply various small fixes to address asciidoctor-dita-vale * Remove links in additional resources for transport modes If users have trouble navigating through an assembly, the solution is not to start throwing links at them; the solution is to fix up the assembly's structure * Split modules into web UI + CLI * Rewrite setting up job templates to resolve asciidoctor-dita-vale issues --------- Co-authored-by: Maximilian Kolb <[email protected]>
1 parent cb61f61 commit 2e26b23

File tree

44 files changed

+229
-156
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+229
-156
lines changed

guides/common/assembly_configuring-and-setting-up-remote-jobs.adoc

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,21 @@ ifdef::katello,orcharhino,satellite[]
1818
include::modules/proc_configuring-a-host-to-use-the-pull-client.adoc[leveloffset=+1]
1919
endif::[]
2020

21-
include::modules/proc_creating-a-job-template.adoc[leveloffset=+1]
21+
include::modules/proc_creating-a-job-template-by-using-web-ui.adoc[leveloffset=+1]
22+
23+
include::modules/proc_creating-a-job-template-by-using-cli.adoc[leveloffset=+1]
2224

2325
include::modules/proc_importing-an-ansible-playbook-by-name.adoc[leveloffset=+1]
2426

2527
include::modules/proc_importing-all-available-ansible-playbooks.adoc[leveloffset=+1]
2628

27-
include::modules/proc_configuring-the-fallback-to-any-smartproxy-remote-execution-setting-in-project.adoc[leveloffset=+1]
29+
include::modules/proc_configuring-the-fallback-to-any-smartproxy-remote-execution-setting-by-using-web-ui.adoc[leveloffset=+1]
30+
31+
include::modules/proc_configuring-the-fallback-to-any-smartproxy-remote-execution-setting-by-using-cli.adoc[leveloffset=+1]
2832

29-
include::modules/proc_configuring-the-global-smartproxy-remote-execution-setting-in-project.adoc[leveloffset=+1]
33+
include::modules/proc_configuring-the-global-smartproxy-remote-execution-setting-by-using-web-ui.adoc[leveloffset=+1]
34+
35+
include::modules/proc_configuring-the-global-smartproxy-remote-execution-setting-by-using-cli.adoc[leveloffset=+1]
3036

3137
include::modules/proc_setting-an-alternative-directory-for-remote-execution-jobs-in-push-mode.adoc[leveloffset=+1]
3238

@@ -67,9 +73,11 @@ include::modules/proc_configuring-a-keytab-for-kerberos-ticket-granting-tickets.
6773

6874
include::modules/proc_configuring-kerberos-authentication-for-remote-execution.adoc[leveloffset=+1]
6975

70-
include::modules/proc_setting-up-job-templates.adoc[leveloffset=+1]
76+
include::modules/proc_customizing-job-templates.adoc[leveloffset=+1]
77+
78+
include::modules/proc_executing-a-remote-job-by-using-web-ui.adoc[leveloffset=+1]
7179

72-
include::modules/proc_executing-a-remote-job.adoc[leveloffset=+1]
80+
include::modules/proc_executing-a-remote-job-by-using-cli.adoc[leveloffset=+1]
7381

7482
include::modules/ref_advanced-settings-in-the-job-wizard.adoc[leveloffset=+1]
7583

guides/common/modules/con_configuring-and-setting-up-remote-jobs.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,5 +3,6 @@
33
[id="Configuring_and_Setting_Up_Remote_Jobs_{context}"]
44
= Configuring and setting up remote jobs
55

6+
[role="_abstract"]
67
{ProjectName} supports remote execution of commands on hosts.
78
Using remote execution, you can perform various tasks on multiple hosts simultaneously.

guides/common/modules/con_permissions-for-remote-execution.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,9 @@
33
[id="permissions-for-remote-execution_{context}"]
44
= Permissions for remote execution
55

6+
[role="_abstract"]
67
You can control which roles can run which jobs within your infrastructure, including which hosts they can target.
8+
79
The remote execution feature provides two built-in roles:
810

911
* *Remote Execution Manager*: Can access all remote execution features and functionality.

guides/common/modules/con_remote-execution-in-project.adoc

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
[id="Remote-Execution-in-{ProjectNameID}_{context}"]
44
= Remote execution in {ProjectName}
55

6+
[role="_abstract"]
67
With remote execution, you can run jobs on hosts from {SmartProxies} by using shell scripts or Ansible roles and playbooks.
78

89
Use remote execution for the following benefits in {Project}:
@@ -31,13 +32,10 @@ endif::[]
3132

3233
By default, {Project} includes several job templates for shell scripts and Ansible.
3334
ifdef::configuring-ansible,managing-hosts[]
34-
For more information, see xref:setting-up-job-templates_{context}[].
35+
For more information, see xref:customizing-job-templates[].
3536
endif::[]
37+
ifeval::["{context}" == "planning"]
3638

3739
.Additional resources
38-
ifdef::configuring-ansible,managing-hosts[]
39-
* See xref:executing-a-remote-job_{context}[].
40-
endif::[]
41-
ifeval::["{context}" == "planning"]
42-
* See {ManagingConfigurationsAnsibleDocURL}Configuring_and_Setting_Up_Remote_Jobs_ansible[Configuring and setting up remote jobs] in _{ManagingConfigurationsAnsibleDocTitle}_.
40+
* {ManagingConfigurationsAnsibleDocURL}Configuring_and_Setting_Up_Remote_Jobs_ansible[Configuring and setting up remote jobs in _{ManagingConfigurationsAnsibleDocTitle}_]
4341
endif::[]

guides/common/modules/con_remote-execution-workflow.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,12 @@
33
[id="remote-execution-workflow_{context}"]
44
= Remote execution workflow
55

6+
[role="_abstract"]
7+
When you run a remote job on hosts, for every host, {Project} performs a series of actions to find a remote execution {SmartProxy} to use.
8+
69
For custom Ansible roles that you create, or roles that you download, you must install the package containing the roles on your {SmartProxyServer}.
710
Before you can use Ansible roles, you must import the roles into {Project} from the {SmartProxy} where they are installed.
811

9-
When you run a remote job on hosts, for every host, {Project} performs the following actions to find a remote execution {SmartProxy} to use.
10-
1112
ifeval::["{context}" == "managing-hosts"]
1213
{Project} searches only for {SmartProxies} that have the remote execution feature enabled.
1314
endif::[]

guides/common/modules/con_transport-modes-for-remote-execution.adoc

Lines changed: 3 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,10 @@
33
[id="transport-modes-for-remote-execution_{context}"]
44
= Transport modes for remote execution
55

6+
[role="_abstract"]
67
You can configure your {Project} to use two different modes of transport for remote job execution.
8+
9+
The following transport modes are available for remote execution.
710
You can configure single {SmartProxy} to use either one mode or the other but not both.
811

912
Push-based transport::
@@ -33,21 +36,3 @@ If your {SmartProxy} already uses the `pull-mqtt` mode and you want to switch ba
3336
# {foreman-installer} --foreman-proxy-plugin-remote-execution-script-mode ssh
3437
----
3538
====
36-
37-
.Additional resources
38-
* To enable pull mode on {SmartProxyServer}, see {InstallingSmartProxyDocURL}configuring-pull-based-transport-for-remote-execution_{smart-proxy-context}[Configuring pull-based transport for remote execution] in _{InstallingSmartProxyDocTitle}_.
39-
ifdef::katello,orcharhino,satellite[]
40-
* To enable pull mode on a registered host, continue with xref:Configuring_a_Host_to_Use_the_Pull_Client_{context}[].
41-
endif::[]
42-
ifdef::managing-hosts[]
43-
* To enable pull mode on a new host, continue with the following:
44-
45-
** xref:Creating_a_Host_{context}[]
46-
** xref:Registering_Hosts_by_Using_Global_Registration_{context}[]
47-
endif::[]
48-
ifndef::managing-hosts[]
49-
* To enable pull mode on a new host, continue with the following in _{ManagingHostsDocTitle}_:
50-
51-
** {ManagingHostsDocURL}Creating_a_Host_managing-hosts[Creating a Host]
52-
** {ManagingHostsDocURL}Registering_Hosts_by_Using_Global_Registration_managing-hosts[Registering hosts by using global registration]
53-
endif::[]

guides/common/modules/con_using-extended-cron-lines.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,9 @@
33
[id="using-extended-cron-lines_{context}"]
44
= Using extended cron lines
55

6+
[role="_abstract"]
67
When scheduling a cron job with remote execution, you can use an extended cron line to specify the cadence of the job.
8+
79
The standard cron line contains five fields that specify minute, hour, day of the month, month, and day of the week.
810
For example, `0 5 * * *` stands for every day at 5 AM.
911
ifdef::foreman-deb,foreman-el,katello[]

guides/common/modules/proc_adding-a-passphrase-to-ssh-key-used-for-remote-execution.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
[id="adding-a-passphrase-to-ssh-key-used-for-remote-execution_{context}"]
44
= Adding a passphrase to SSH key used for remote execution
55

6+
[role="_abstract"]
67
By default, {SmartProxy} uses a non-passphrase protected SSH key to execute remote jobs on hosts.
78
You can protect the SSH key with a passphrase by following this procedure.
89

guides/common/modules/proc_altering-the-privilege-elevation-method.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
[id="altering-the-privilege-elevation-method_{context}"]
44
= Altering the privilege elevation method
55

6+
[role="_abstract"]
67
By default, push-based remote execution uses `sudo` to switch from the SSH user to the effective user that executes the script on your host.
78
In some situations, you might require to use another method, such as `su` or `dzdo`.
89
You can globally configure an alternative method in your {Project} settings.

guides/common/modules/proc_applying-remote-scap-resources-in-a-disconnected-environment.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,5 +62,5 @@ For example, use the `Run Command - Script Default` job template and enter the f
6262
# curl -o /root/_security-data-oval-com.redhat.rhsa-RHEL8.xml.bz2_ http://_{foreman-example-com}_/pulp/content/_My_Organization_Label_/Library/custom/_My_Product_Label_/_My_Repo_Label_/_security-data-oval-com.redhat.rhsa-RHEL8.xml.bz2_
6363
----
6464
+
65-
For more information about running remote jobs, see {ManagingHostsDocURL}executing-a-remote-job_managing-hosts[Executing a Remote Job] in _{ManagingHostsDocTitle}_.
65+
For more information about running remote jobs, see {ManagingHostsDocURL}Configuring_and_Setting_Up_Remote_Jobs_managing-hosts[Configuring and setting up remote jobs] in _{ManagingHostsDocTitle}_.
6666
. Continue with deploying your compliance policy.

0 commit comments

Comments
 (0)