OSDOCS-16530: Updated Cloud Expert Tutorials for DITA compliance
Version(s):
enterprise-4.20+
Issue: OSDOCS-16530
Link to docs preview: The following links are all of the Cloud Expert updates across distros:
ROSA
- Tutorials overview
- Red Hat OpenShift Service on AWS activation and account linking
- Red Hat OpenShift Service on AWS private offer acceptance and sharing
- Deploying Red Hat OpenShift Service on AWS with a Custom DNS Resolver
- Using AWS WAF and Amazon CloudFront to protect Red Hat OpenShift Service on AWS workloads
- Using AWS WAF and AWS ALBs to protect Red Hat OpenShift Service on AWS workloads
- Deploying OpenShift API for Data Protection on a Red Hat OpenShift Service on AWS cluster
- AWS Load Balancer Operator on Red Hat OpenShift Service on AWS
- Configuring Microsoft Entra ID (formerly Azure Active Directory) as an identity provider
- Using AWS Secrets Manager CSI on Red Hat OpenShift Service on AWS with STS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS
ROSA Classic
- Tutorials overview
- Verifying permissions for a Red Hat OpenShift Service on AWS (classic architecture) STS deployment
- Deploying Red Hat OpenShift Service on AWS (classic architecture) with a Custom DNS Resolver
- Using AWS WAF and Amazon CloudFront to protect Red Hat OpenShift Service on AWS (classic architecture) workloads
- Using AWS WAF and AWS ALBs to protect Red Hat OpenShift Service on AWS (classic architecture) workloads
- Deploying OpenShift API for Data Protection on a Red Hat OpenShift Service on AWS (classic architecture) cluster
- AWS Load Balancer Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Configuring Microsoft Entra ID (formerly Azure Active Directory) as an identity provider
- Using AWS Secrets Manager CSI on Red Hat OpenShift Service on AWS (classic architecture) with STS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS (classic architecture)
- Deploying the External DNS Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Dynamically issuing certificates using the cert-manager Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Assigning a consistent egress IP for external traffic
- Updating component routes with custom domains and TLS certificates Getting started with Classic architecture
- What is ROSA
OSD
- Tutorials overview
- Updating component routes with custom domains and TLS certificates
- Limit egress with Google Cloud Next Generation Firewall
Additional information: This PR updates the documentation to meet DITA compliance for the Cloud Experts Tutorials book.
@EricPonvelle: This pull request references OSDOCS-16530 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.21.0" version, but no target version was set.
In response to this:
Version(s):
enterprise-4.20+Issue: OSDOCS-16530
Link to docs preview:
Additional information: This PR updates the documentation to meet DITA compliance for the Cloud Experts Tutorials book.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
🤖 Tue Dec 23 20:35:15 - Prow CI generated the docs preview: https://103276--ocpdocs-pr.netlify.app Complete list of updated preview URLs: artifacts/updated_preview_urls.txt
@EricPonvelle: This pull request references OSDOCS-16530 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.21.0" version, but no target version was set.
In response to this:
Version(s):
enterprise-4.20+Issue: OSDOCS-16530
Link to docs preview: The following links are all of the Cloud Expert updates across distros:
ROSA
- Tutorials overview
- Red Hat OpenShift Service on AWS activation and account linking
- Red Hat OpenShift Service on AWS private offer acceptance and sharing
- Deploying Red Hat OpenShift Service on AWS with a Custom DNS Resolver
- Using AWS WAF and Amazon CloudFront to protect Red Hat OpenShift Service on AWS workloads
- Using AWS WAF and AWS ALBs to protect Red Hat OpenShift Service on AWS workloads
- Deploying OpenShift API for Data Protection on a Red Hat OpenShift Service on AWS cluster
- AWS Load Balancer Operator on Red Hat OpenShift Service on AWS
- Configuring Microsoft Entra ID (formerly Azure Active Directory) as an identity provider
- Using AWS Secrets Manager CSI on Red Hat OpenShift Service on AWS with STS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS](https://103276--ocpdocs-pr.netlify.app/openshift-rosa-hcp/latest/cloud_experts_tutorials/cloud-experts-consistent-egress-ip.html)
ROSA Classic
- Tutorials overview
- Verifying permissions for a Red Hat OpenShift Service on AWS (classic architecture) STS deployment
- Deploying Red Hat OpenShift Service on AWS (classic architecture) with a Custom DNS Resolver
- Using AWS WAF and Amazon CloudFront to protect Red Hat OpenShift Service on AWS (classic architecture) workloads
- Using AWS WAF and AWS ALBs to protect Red Hat OpenShift Service on AWS (classic architecture) workloads
- Deploying OpenShift API for Data Protection on a Red Hat OpenShift Service on AWS (classic architecture) cluster
- AWS Load Balancer Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Configuring Microsoft Entra ID (formerly Azure Active Directory) as an identity provider
- Using AWS Secrets Manager CSI on Red Hat OpenShift Service on AWS (classic architecture) with STS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS (classic architecture)
- Deploying the External DNS Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Dynamically issuing certificates using the cert-manager Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Assigning a consistent egress IP for external traffic
- Updating component routes with custom domains and TLS certificates Getting started with Classic architecture
- What is ROSA
OSD
- Tutorials overview
- Updating component routes with custom domains and TLS certificates
- Limit egress with Google Cloud Next Generation Firewall
Additional information: This PR updates the documentation to meet DITA compliance for the Cloud Experts Tutorials book.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
@EricPonvelle: This pull request references OSDOCS-16530 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.21.0" version, but no target version was set.
In response to this:
Version(s):
enterprise-4.20+Issue: OSDOCS-16530
Link to docs preview: The following links are all of the Cloud Expert updates across distros:
ROSA
- Tutorials overview
- Red Hat OpenShift Service on AWS activation and account linking
- Red Hat OpenShift Service on AWS private offer acceptance and sharing
- Deploying Red Hat OpenShift Service on AWS with a Custom DNS Resolver
- Using AWS WAF and Amazon CloudFront to protect Red Hat OpenShift Service on AWS workloads
- Using AWS WAF and AWS ALBs to protect Red Hat OpenShift Service on AWS workloads
- Deploying OpenShift API for Data Protection on a Red Hat OpenShift Service on AWS cluster
- AWS Load Balancer Operator on Red Hat OpenShift Service on AWS
- Configuring Microsoft Entra ID (formerly Azure Active Directory) as an identity provider
- Using AWS Secrets Manager CSI on Red Hat OpenShift Service on AWS with STS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS
ROSA Classic
- Tutorials overview
- Verifying permissions for a Red Hat OpenShift Service on AWS (classic architecture) STS deployment
- Deploying Red Hat OpenShift Service on AWS (classic architecture) with a Custom DNS Resolver
- Using AWS WAF and Amazon CloudFront to protect Red Hat OpenShift Service on AWS (classic architecture) workloads
- Using AWS WAF and AWS ALBs to protect Red Hat OpenShift Service on AWS (classic architecture) workloads
- Deploying OpenShift API for Data Protection on a Red Hat OpenShift Service on AWS (classic architecture) cluster
- AWS Load Balancer Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Configuring Microsoft Entra ID (formerly Azure Active Directory) as an identity provider
- Using AWS Secrets Manager CSI on Red Hat OpenShift Service on AWS (classic architecture) with STS
- Using AWS Controllers for Kubernetes on Red Hat OpenShift Service on AWS (classic architecture)
- Deploying the External DNS Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Dynamically issuing certificates using the cert-manager Operator on Red Hat OpenShift Service on AWS (classic architecture)
- Assigning a consistent egress IP for external traffic
- Updating component routes with custom domains and TLS certificates Getting started with Classic architecture
- What is ROSA
OSD
- Tutorials overview
- Updating component routes with custom domains and TLS certificates
- Limit egress with Google Cloud Next Generation Firewall
Additional information: This PR updates the documentation to meet DITA compliance for the Cloud Experts Tutorials book.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
/re-test
@EricPonvelle: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:
| Test name | Commit | Details | Required | Rerun command |
|---|---|---|---|---|
| ci/prow/validate-asciidoc | e482d43038309b21217a78a5c3001ff1bb838927 | link | true | /test validate-asciidoc |
Full PR test history. Your PR dashboard.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.