Skip to content

Commit c12787e

Browse files
committed
Sweep to update 'command line tool/interface' to 'command-line tool/interface'
1 parent 2780e28 commit c12787e

File tree

136 files changed

+157
-157
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

136 files changed

+157
-157
lines changed

_unused_topics/pod-using-a-different-service-account.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ You can run a pod with a service account other than the default:
99

1010
.Prerequisites
1111

12-
* Install the `oc` command line interface.
12+
* Install the `oc` command-line interface.
1313
* Configure a service account.
1414
* Create a DeploymentConfig.
1515

applications/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
Using {product-title}, you can create, edit, delete, and manage applications using the web console or command line interface (CLI).
9+
Using {product-title}, you can create, edit, delete, and manage applications using the web console or command-line interface (CLI).
1010

1111
[id="working-on-a-project"]
1212
== Working on a project

backup_and_restore/application_backup_and_restore/aws-sts/oadp-aws-sts.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ You configure {aws-short} for Velero, create a default `Secret`, and then instal
1414

1515
To install the OADP Operator in a restricted network environment, you must first disable the default OperatorHub sources and mirror the Operator catalog. See xref:../../../disconnected/using-olm.adoc#olm-restricted-networks[Using Operator Lifecycle Manager in disconnected environments] for details.
1616

17-
You can install {oadp-short} on an AWS {sts-first} (AWS STS) cluster manually. Amazon {aws-short} provides {aws-short} STS as a web service that enables you to request temporary, limited-privilege credentials for users. You use STS to provide trusted users with temporary access to resources via API calls, your {aws-short} console, or the {aws-short} command line interface (CLI).
17+
You can install {oadp-short} on an AWS {sts-first} (AWS STS) cluster manually. Amazon {aws-short} provides {aws-short} STS as a web service that enables you to request temporary, limited-privilege credentials for users. You use STS to provide trusted users with temporary access to resources via API calls, your {aws-short} console, or the {aws-short} command-line interface (CLI).
1818

1919
Before installing {oadp-first}, you must set up role and policy credentials for {oadp-short} so that it can use the {aws-full} API.
2020

cicd/jenkins/images-other-jenkins-agent.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The Base image for Jenkins agents does the following:
1212

1313
* Pulls in both the required tools, headless Java, the Jenkins JNLP client, and the useful ones, including `git`, `tar`, `zip`, and `nss`, among others.
1414
* Establishes the JNLP agent as the entry point.
15-
* Includes the `oc` client tool for invoking command line operations from within Jenkins jobs.
15+
* Includes the `oc` client tool for invoking command-line operations from within Jenkins jobs.
1616
* Provides Dockerfiles for both Red Hat Enterprise Linux (RHEL) and `localdev` images.
1717
1818
[IMPORTANT]

cli_reference/rosa_cli/rosa-cli-permission-examples.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ include::_attributes/attributes-openshift-dedicated.adoc[]
55
:context: rosa-cli-permission-examples
66
toc::[]
77

8-
You can create roles with permissions that adhere to the principal of least privilege, in which the users assigned the roles have no other permissions assigned to them outside the scope of the specific action they need to perform. These policies contain only the minimum required permissions needed to perform specific actions by using the {product-title} (ROSA) command line interface (CLI).
8+
You can create roles with permissions that adhere to the principal of least privilege, in which the users assigned the roles have no other permissions assigned to them outside the scope of the specific action they need to perform. These policies contain only the minimum required permissions needed to perform specific actions by using the {product-title} (ROSA) command-line interface (CLI).
99

1010
[IMPORTANT]
1111
====

cloud_experts_tutorials/cloud-experts-deploying-application/cloud-experts-deploying-application-integrating-aws.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ image:cloud-experts-deployment-integrating-ack-install.png[]
7878

7979
. Run one of the following scripts to create the AWS IAM role for the ACK controller and assign the S3 policy:
8080
** Automatically download the link:https://www.rosaworkshop.io/ostoy/resources/setup-s3-ack-controller.sh[setup-s3-ack-controller.sh] script, which automates the process for you.
81-
** Run the following script in your command line interface (CLI):
81+
** Run the following script in your command-line interface (CLI):
8282
+
8383
[source,terminal]
8484
----

cloud_experts_tutorials/cloud-experts-deploying-application/cloud-experts-deploying-application-logging.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ image:cloud-experts-deploying-application-logging-ostoy-stdout.png[]
111111
image:cloud-experts-deploying-application-logging-ostoy-stderr.png[]
112112

113113
== Viewing the application logs by using the `oc` command
114-
. Enter the following command in the command line interface (CLI) to retrieve the name of your frontend pod:
114+
. Enter the following command in the command-line interface (CLI) to retrieve the name of your frontend pod:
115115
+
116116
[source,terminal]
117117
----

cloud_experts_tutorials/cloud-experts-deploying-application/cloud-experts-deploying-application-s2i-deployments.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ image::ostoy-cli-login.png[CLI Login]
2525
+
2626
.. Copy the command under "Log in with this token".
2727
+
28-
.. Log in to the command line interface (CLI) by running the copied command in your terminal. You should see something similar to the following:
28+
.. Log in to the command-line interface (CLI) by running the copied command in your terminal. You should see something similar to the following:
2929
+
3030
[source,terminal]
3131
----

cloud_experts_tutorials/cloud-experts-getting-started/cloud-experts-getting-started-accessing.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ toc::[]
99
//rosaworkshop.io content metadata
1010
//Brought into ROSA product docs 2023-11-30
1111

12-
You can connect to your cluster using the command line interface (CLI) or the {hybrid-console} user interface (UI).
12+
You can connect to your cluster using the command-line interface (CLI) or the {hybrid-console} user interface (UI).
1313

1414
== Accessing your cluster using the CLI
1515

cloud_experts_tutorials/cloud-experts-getting-started/cloud-experts-getting-started-admin-rights.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ toc::[]
99
//rosaworkshop.io content metadata
1010
//Brought into ROSA product docs 2023-11-30
1111

12-
Administration (admin) privileges are not automatically granted to users that you add to your cluster. If you want to grant admin-level privileges to certain users, you will need to manually grant them to each user. You can grant admin privileges from either the ROSA command line interface (CLI) or the Red{nbsp}Hat OpenShift Cluster Manager web user interface (UI).
12+
Administration (admin) privileges are not automatically granted to users that you add to your cluster. If you want to grant admin-level privileges to certain users, you will need to manually grant them to each user. You can grant admin privileges from either the ROSA command-line interface (CLI) or the Red{nbsp}Hat OpenShift Cluster Manager web user interface (UI).
1313

1414
Red{nbsp}Hat offers two types of admin privileges:
1515

0 commit comments

Comments
 (0)