From 06f6efea7efb67e4ea832268bf84eb05addce958 Mon Sep 17 00:00:00 2001 From: Shruti Deshpande Date: Mon, 11 Aug 2025 16:15:23 +0530 Subject: [PATCH] Dita vale fixes for OADP ROSA Signed-off-by: Shruti Deshpande --- .../oadp-rosa/oadp-rosa-backing-up-applications.adoc | 1 + modules/cleanup-a-backup-oadp-rosa-sts.adoc | 1 + modules/installing-oadp-rosa-sts.adoc | 5 ++--- modules/performing-a-backup-oadp-rosa-sts.adoc | 5 +++-- modules/preparing-aws-credentials-for-oadp.adoc | 1 + modules/updating-role-arn-oadp-rosa-sts.adoc | 5 +---- 6 files changed, 9 insertions(+), 9 deletions(-) diff --git a/backup_and_restore/application_backup_and_restore/oadp-rosa/oadp-rosa-backing-up-applications.adoc b/backup_and_restore/application_backup_and_restore/oadp-rosa/oadp-rosa-backing-up-applications.adoc index 16d46bc603f1..96511879314d 100644 --- a/backup_and_restore/application_backup_and_restore/oadp-rosa/oadp-rosa-backing-up-applications.adoc +++ b/backup_and_restore/application_backup_and_restore/oadp-rosa/oadp-rosa-backing-up-applications.adoc @@ -11,6 +11,7 @@ include::_attributes/common-attributes.adoc[] toc::[] +[role="_abstract"] You can use {oadp-first} with {product-rosa} (ROSA) clusters to back up and restore application data. ifndef::openshift-rosa,openshift-rosa-hcp[] diff --git a/modules/cleanup-a-backup-oadp-rosa-sts.adoc b/modules/cleanup-a-backup-oadp-rosa-sts.adoc index ad7300423603..828396795cde 100644 --- a/modules/cleanup-a-backup-oadp-rosa-sts.adoc +++ b/modules/cleanup-a-backup-oadp-rosa-sts.adoc @@ -6,6 +6,7 @@ [id="cleanup-a-backup-oadp-rosa-sts_{context}"] = Cleaning up a cluster after a backup with OADP and ROSA STS +[role="_abstract"] If you need to uninstall the {oadp-first} Operator together with the backups and the S3 bucket from this example, follow these instructions. .Procedure diff --git a/modules/installing-oadp-rosa-sts.adoc b/modules/installing-oadp-rosa-sts.adoc index f8926d64aef8..4454271c7791 100644 --- a/modules/installing-oadp-rosa-sts.adoc +++ b/modules/installing-oadp-rosa-sts.adoc @@ -6,6 +6,7 @@ [id="installing-oadp-rosa-sts_{context}"] = Installing the OADP Operator and providing the IAM role +[role="_abstract"] AWS Security Token Service (AWS STS) is a global web service that provides short-term credentials for IAM or federated users. {product-title} (ROSA) with {sts-short} is the recommended credential mode for ROSA clusters. This document describes how to install {oadp-first} on ROSA with {aws-short} {sts-short}. @@ -67,9 +68,7 @@ $ oc -n openshift-adp create secret generic cloud-credentials \ + [NOTE] ==== -In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM) -and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above -secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_. +In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM) and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_. The preceding secret is created automatically by CCO. ==== diff --git a/modules/performing-a-backup-oadp-rosa-sts.adoc b/modules/performing-a-backup-oadp-rosa-sts.adoc index 7ecfb9c1de7d..493e210e36fe 100644 --- a/modules/performing-a-backup-oadp-rosa-sts.adoc +++ b/modules/performing-a-backup-oadp-rosa-sts.adoc @@ -6,7 +6,8 @@ [id="performing-a-backup-oadp-rosa-sts_{context}"] = Performing a backup with OADP and ROSA STS -The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup with {oadp-first} with {product-rosa} (ROSA) STS. +[role="_abstract"] +The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup by using {oadp-first} with {product-rosa} (ROSA) STS. Either Data Protection Application (DPA) configuration will work. @@ -161,6 +162,6 @@ Hello OpenShift! [NOTE] ==== -For troubleshooting tips, see the OADP team’s link:https://access.redhat.com/articles/5456281[troubleshooting documentation]. +For troubleshooting tips, see the link:https://access.redhat.com/articles/5456281[troubleshooting documentation]. ==== diff --git a/modules/preparing-aws-credentials-for-oadp.adoc b/modules/preparing-aws-credentials-for-oadp.adoc index f89a9d492022..cab454eace0d 100644 --- a/modules/preparing-aws-credentials-for-oadp.adoc +++ b/modules/preparing-aws-credentials-for-oadp.adoc @@ -7,6 +7,7 @@ [id="preparing-aws-credentials-for-oadp_{context}"] = Preparing AWS credentials for OADP +[role="_abstract"] An {aws-full} account must be prepared and configured to accept an {oadp-first} installation. .Procedure diff --git a/modules/updating-role-arn-oadp-rosa-sts.adoc b/modules/updating-role-arn-oadp-rosa-sts.adoc index 2928b9697bf0..fd67ba1ab42a 100644 --- a/modules/updating-role-arn-oadp-rosa-sts.adoc +++ b/modules/updating-role-arn-oadp-rosa-sts.adoc @@ -6,6 +6,7 @@ [id="updating-role-arn-oadp-rosa-sts_{context}"] = Updating the IAM role ARN in the {oadp-short} Operator subscription +[role="_abstract"] While installing the {oadp-short} Operator on a ROSA Security Token Service (STS) cluster, if you provide an incorrect IAM role Amazon Resource Name (ARN), the `openshift-adp-controller` pod gives an error. The credential requests that are generated contain the wrong IAM role ARN. To update the credential requests object with the correct IAM role ARN, you can edit the {oadp-short} Operator subscription and patch the IAM role ARN with the correct value. By editing the {oadp-short} Operator subscription, you do not have to uninstall and reinstall {oadp-short} to update the IAM role ARN. .Prerequisites @@ -157,7 +158,3 @@ $ oc get {oadp-bsl-api} -n openshift-adp NAME PHASE LAST VALIDATED AGE DEFAULT ts-dpa-1 Available 3s 6s true ---- - - - -