From 5576f8ea7899b176ffa207fbf3de858c8cedb610 Mon Sep 17 00:00:00 2001 From: Ashleigh Brennan Date: Tue, 27 Jun 2023 09:33:42 -0500 Subject: [PATCH] RHDEVDOCS-5361: Minor formatting fixes for console docs --- cicd/pipelines/understanding-openshift-pipelines.adoc | 2 +- modules/getting-started-web-console-granting-permissions.adoc | 2 +- modules/helm-filtering-helm-charts-by-certification-level.adoc | 2 +- modules/troubleshooting-dynamic-plugin.adoc | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/cicd/pipelines/understanding-openshift-pipelines.adoc b/cicd/pipelines/understanding-openshift-pipelines.adoc index b6853196b2..7aa1be6a3f 100644 --- a/cicd/pipelines/understanding-openshift-pipelines.adoc +++ b/cicd/pipelines/understanding-openshift-pipelines.adoc @@ -17,7 +17,7 @@ toc::[] * {pipelines-title} are designed for decentralized teams that work on microservice-based architecture. * {pipelines-title} use standard CI/CD pipeline definitions that are easy to extend and integrate with the existing Kubernetes tools, enabling you to scale on-demand. * You can use {pipelines-title} to build images with Kubernetes tools such as Source-to-Image (S2I), Buildah, Buildpacks, and Kaniko that are portable across any Kubernetes platform. -* You can use the {product-title} Developer console to create Tekton resources, view logs of pipeline runs, and manage pipelines in your {product-title} namespaces. +* You can use the {product-title} web console *Developer* perspective to create Tekton resources, view logs of pipeline runs, and manage pipelines in your {product-title} namespaces. [id="op-detailed-concepts"] == {pipelines-shortname} Concepts diff --git a/modules/getting-started-web-console-granting-permissions.adoc b/modules/getting-started-web-console-granting-permissions.adoc index 6217336484..d9734cb23d 100644 --- a/modules/getting-started-web-console-granting-permissions.adoc +++ b/modules/getting-started-web-console-granting-permissions.adoc @@ -18,7 +18,7 @@ The following procedure creates a `RoleBinding` object for the default `ServiceA .Procedure -. From the *Administrator perspective*, navigate to *User Management* and then click *RoleBindings*. +. Navigate to *User Management* and then click *RoleBindings*. . Click *Create binding*. . Select `Namespace role binding (RoleBinding)`. . In the *Name* field, enter `sa-user-account`. diff --git a/modules/helm-filtering-helm-charts-by-certification-level.adoc b/modules/helm-filtering-helm-charts-by-certification-level.adoc index 84960cbc1a..b7f030d649 100644 --- a/modules/helm-filtering-helm-charts-by-certification-level.adoc +++ b/modules/helm-filtering-helm-charts-by-certification-level.adoc @@ -6,7 +6,7 @@ You can filter Helm charts based on their certification level in the *Developer .Procedure -. In the *Developer perspective*, navigate to the *+Add* view and select a project. +. In the *Developer* perspective, navigate to the *+Add* view and select a project. . From the *Developer Catalog* tile, select the *Helm Chart* option to see all the Helm charts in the *Developer Catalog*. diff --git a/modules/troubleshooting-dynamic-plugin.adoc b/modules/troubleshooting-dynamic-plugin.adoc index fe145f45ce..286ae65f03 100644 --- a/modules/troubleshooting-dynamic-plugin.adoc +++ b/modules/troubleshooting-dynamic-plugin.adoc @@ -15,7 +15,7 @@ Refer to this list of troubleshooting tips if you run into issues loading your p $ oc get console.operator.openshift.io cluster -o jsonpath='{.spec.plugins}' ---- -** Verify the enabled plugins on the status card of the *Overview* page in the *Administrator perspective*. You will need to refresh your browser if the plugin was recently enabled. +** Verify the enabled plugins on the status card of the *Overview* page in the *Administrator* perspective. You must refresh your browser if the plugin was recently enabled. * Verify your plugin service is healthy by: ** Verifying your plugin pod status is running and your containers are ready.