From 4a8150ffe2bef6ed76f8042662192faa123f65ec Mon Sep 17 00:00:00 2001 From: AedinC Date: Tue, 21 Jan 2025 13:04:50 +0000 Subject: [PATCH] OSDOCS-13059:Sanity check on links after OSDOCS-12950. --- _topic_maps/_topic_map_osd.yml | 2 +- architecture/osd-architecture-models-gcp.adoc | 2 +- networking/configuring-cluster-wide-proxy.adoc | 2 +- ...-a-gcp-cluster.adoc => creating-a-gcp-cluster-sa.adoc} | 4 ++-- osd_getting_started/osd-getting-started.adoc | 8 +++----- 5 files changed, 8 insertions(+), 10 deletions(-) rename osd_gcp_clusters/{creating-a-gcp-cluster.adoc => creating-a-gcp-cluster-sa.adoc} (97%) diff --git a/_topic_maps/_topic_map_osd.yml b/_topic_maps/_topic_map_osd.yml index de018900ea6e..430662b2a999 100644 --- a/_topic_maps/_topic_map_osd.yml +++ b/_topic_maps/_topic_map_osd.yml @@ -126,7 +126,7 @@ Topics: - Name: Creating a cluster on GCP with Workload Identity Federation authentication File: creating-a-gcp-cluster-with-workload-identity-federation - Name: Creating a cluster on GCP with Service Account authentication - File: creating-a-gcp-cluster + File: creating-a-gcp-cluster-sa - Name: Creating a cluster on GCP with a Red Hat cloud account File: creating-a-gcp-cluster-redhat-account diff --git a/architecture/osd-architecture-models-gcp.adoc b/architecture/osd-architecture-models-gcp.adoc index d21ad7253f04..54565a1d07f8 100644 --- a/architecture/osd-architecture-models-gcp.adoc +++ b/architecture/osd-architecture-models-gcp.adoc @@ -23,4 +23,4 @@ include::modules/osd-public-architecture-model-gcp.adoc[leveloffset=+1] * xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a cluster on GCP with Workload Identity Federation authentication] -* xref:../osd_gcp_clusters/creating-a-gcp-cluster.adoc#osd-creating-a-cluster-on-gcp[Creating a cluster on GCP with Service Account authentication] +* xref:../osd_gcp_clusters/creating-a-gcp-cluster-sa.adoc#osd-creating-a-cluster-on-gcp-sa[Creating a cluster on GCP with Service Account authentication] diff --git a/networking/configuring-cluster-wide-proxy.adoc b/networking/configuring-cluster-wide-proxy.adoc index 224ccb4b910f..2d3eb0224281 100644 --- a/networking/configuring-cluster-wide-proxy.adoc +++ b/networking/configuring-cluster-wide-proxy.adoc @@ -66,7 +66,7 @@ ifdef::openshift-rosa[] endif::openshift-rosa[] ifdef::openshift-dedicated[] * xref:../osd_aws_clusters/creating-an-aws-cluster.adoc#osd-create-aws-cluster-ccs_osd-creating-a-cluster-on-aws[Creating a cluster on AWS] -* xref:../osd_gcp_clusters/creating-a-gcp-cluster.adoc#osd-create-gcp-cluster-ccs_osd-creating-a-cluster-on-gcp[Creating a cluster on GCP] +* xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a cluster on GCP with Workload Identity Federation authentication] endif::openshift-dedicated[] [id="configuring-a-proxy-after-installation_{context}"] diff --git a/osd_gcp_clusters/creating-a-gcp-cluster.adoc b/osd_gcp_clusters/creating-a-gcp-cluster-sa.adoc similarity index 97% rename from osd_gcp_clusters/creating-a-gcp-cluster.adoc rename to osd_gcp_clusters/creating-a-gcp-cluster-sa.adoc index 7f5ee2aa30eb..40021129c602 100644 --- a/osd_gcp_clusters/creating-a-gcp-cluster.adoc +++ b/osd_gcp_clusters/creating-a-gcp-cluster-sa.adoc @@ -1,8 +1,8 @@ :_mod-docs-content-type: ASSEMBLY -[id="osd-creating-a-cluster-on-gcp"] +[id="osd-creating-a-cluster-on-gcp-sa"] = Creating a cluster on GCP with Service Account authentication include::_attributes/attributes-openshift-dedicated.adoc[] -:context: osd-creating-a-cluster-on-gcp +:context: osd-creating-a-cluster-on-gcp-sa toc::[] diff --git a/osd_getting_started/osd-getting-started.adoc b/osd_getting_started/osd-getting-started.adoc index 342b2bbcfb50..54d9da312132 100644 --- a/osd_getting_started/osd-getting-started.adoc +++ b/osd_getting_started/osd-getting-started.adoc @@ -31,7 +31,7 @@ You can install {product-title} in your own {GCP} account by using the CCS model * Red Hat also recommends creating an {product-title} cluster deployed on {GCP} in Private cluster mode with Private Service Connect (PSC) to manage and monitor a cluster to avoid all public ingress network traffic. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-psc-enabled-private-cluster.adoc#creating-a-gcp-psc-enabled-private-cluster[Private Service Connect overview]. -* For installing and interacting with the {product-title} cluster deployed on the {GCP} using the Service Account authentication type, see xref:../osd_gcp_clusters/creating-a-gcp-cluster.adoc#osd-create-gcp-cluster-ccs_osd-creating-a-cluster-on-gcp[Creating a cluster on GCP with Service Account authentication]. +* For installing and interacting with the {product-title} cluster deployed on the {GCP} using the Service Account authentication type, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-sa.adoc#osd-create-gcp-cluster-ccs_osd-creating-a-cluster-on-gcp-sa[Creating a cluster on GCP with Service Account authentication]. ** Red Hat recommends using GCP Workload Identity Federation (WIF) as the authentication type for installing and interacting with the {product-title} cluster deployed on {GCP} because it provides enhanced security. For more information, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a cluster on GCP with Workload Identity Federation authentication]. // Update link with new title when new SA auth guide goes live. @@ -48,7 +48,7 @@ You can install {product-title} in your own {AWS} account by using the CCS model Complete the steps in one of the following sections to deploy {product-title} in a cloud account that is owned by Red Hat: -* xref:../osd_gcp_clusters/creating-a-gcp-cluster.adoc#osd-create-aws-cluster-ccs_osd-creating-a-cluster-on-gcp[Creating a cluster on GCP with a Red Hat cloud account]: You can install {product-title} in an GCP account that is owned by Red Hat. +* xref:../osd_gcp_clusters/creating-a-gcp-cluster-redhat-account.adoc#creating-a-gcp-cluster-rh-account[Creating a cluster on GCP with a Red Hat cloud account]: You can install {product-title} in an GCP account that is owned by Red Hat. * xref:../osd_aws_clusters/creating-an-aws-cluster.adoc#osd-create-aws-cluster-red-hat-account_osd-creating-a-cluster-on-aws[Creating a cluster on AWS]: You can install {product-title} in an AWS account that is owned by Red Hat. // Update link when OSDOCS-12950 goes live. @@ -94,9 +94,7 @@ include::modules/deleting-cluster.adoc[leveloffset=+1] * For more information about deploying {product-title} clusters on AWS, see xref:../osd_aws_clusters/creating-an-aws-cluster.adoc#osd-create-aws-cluster-ccs_osd-creating-a-cluster-on-aws[Creating a cluster on AWS]. -* For more information about deploying {product-title} clusters on GCP, see xref:../osd_gcp_clusters/creating-a-gcp-cluster.adoc#osd-creating-a-cluster-on-gcp[Creating a cluster on GCP with Service Account authentication] and xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a cluster on GCP with Workload Identity Federation authentication]. +* For more information about deploying {product-title} clusters on GCP, see xref:../osd_gcp_clusters/creating-a-gcp-cluster-sa.adoc#osd-creating-a-cluster-on-gcp-sa[Creating a cluster on GCP with Service Account authentication] and xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a cluster on GCP with Workload Identity Federation authentication]. * For documentation on upgrading your cluster, see xref:../upgrading/osd-upgrades.adoc#osd-upgrades[{product-title} cluster upgrades]. - -xref:../osd_gcp_clusters/creating-a-gcp-cluster-with-workload-identity-federation.adoc#osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a cluster on GCP with Workload Identity Federation authentication] \ No newline at end of file