Skip to content

Commit 8c713d9

Browse files
authored
Merge pull request #101912 from jeana-redhat/fix-snippet-render
fix snippet render issue (no OSDOCS issue)
2 parents 797a840 + 740e7ba commit 8c713d9

File tree

2 files changed

+7
-5
lines changed

2 files changed

+7
-5
lines changed

modules/cco-ccoctl-configuring.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
// Module included in the following assemblies:
22
//
3-
//Postinstall and update content
3+
//Postinstall and update content
44
// * post_installation_configuration/changing-cloud-credentials-configuration.adoc
55
// * updating/preparing_for_updates/preparing-manual-creds-update.adoc
66
//

modules/rotating-bound-service-keys.adoc

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,18 +18,18 @@ ifdef::rotate-aws[= Rotating {aws-short} OIDC bound service account signer keys]
1818
ifdef::rotate-gcp[= Rotating {gcp-short} OIDC bound service account signer keys]
1919
ifdef::rotate-azure[= Rotating {azure-short} OIDC bound service account signer keys]
2020

21-
If the Cloud Credential Operator (CCO) for your {product-title} cluster
21+
If the Cloud Credential Operator (CCO) for your {product-title} cluster
2222
ifdef::rotate-aws[on {aws-first}]
2323
ifdef::rotate-gcp[on {gcp-first}]
2424
ifdef::rotate-azure[on {azure-first}]
25-
is configured to operate in manual mode with
25+
is configured to operate in manual mode with
2626
ifdef::rotate-aws[{sts-short},]
2727
ifdef::rotate-gcp[{gcp-wid-short},]
2828
ifdef::rotate-azure[{entra-first},]
2929
you can rotate the bound service account signer key.
3030

3131
To rotate the key, you delete the existing key on your cluster, which causes the Kubernetes API server to create a new key.
32-
To reduce authentication failures during this process, you must immediately add the new public key to the existing issuer file.
32+
To reduce authentication failures during this process, you must immediately add the new public key to the existing issuer file.
3333
After the cluster is using the new key for authentication, you can remove any remaining keys.
3434

3535
//Modified version of the disclaimer from enabling Azure WID on an existing cluster, since there are similar concerns:
@@ -52,8 +52,10 @@ To mitigate this impact, you can temporarily halt these services and then redepl
5252
.Prerequisites
5353

5454
* You have access to the {oc-first} as a user with the `cluster-admin` role.
55+
5556
//Permissions requirements (per platform, for install and key rotation)
5657
include::snippets/ccoctl-provider-permissions-requirements.adoc[]
58+
5759
* You have configured the `ccoctl` utility.
5860
* Your cluster is in a stable state.
5961
You can confirm that the cluster is stable by running the following command:
@@ -312,7 +314,7 @@ $ az storage blob upload \
312314
----
313315
endif::rotate-azure[]
314316

315-
. Wait for the Kubernetes API server to update and use the new key.
317+
. Wait for the Kubernetes API server to update and use the new key.
316318
You can monitor the update progress by running the following command:
317319
+
318320
[source,terminal]

0 commit comments

Comments
 (0)