Skip to content

Commit d08d263

Browse files
authored
Merge pull request #85773 from jhradilek/fix-policies-spelling
Fix occurrences of 'polices' used in place of 'policies'
2 parents fc7e7a2 + d8fd5ae commit d08d263

11 files changed

+14
-14
lines changed

_topic_maps/_topic_map.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3341,7 +3341,7 @@ Topics:
33413341
File: ztp-vdu-validating-cluster-tuning
33423342
- Name: Advanced managed cluster configuration with SiteConfig resources
33433343
File: ztp-advanced-install-ztp
3344-
- Name: Managing cluster polices with PolicyGenerator resources
3344+
- Name: Managing cluster policies with PolicyGenerator resources
33453345
Dir: policygenerator_for_ztp
33463346
Distros: openshift-origin,openshift-enterprise
33473347
Topics:
@@ -3351,7 +3351,7 @@ Topics:
33513351
File: ztp-advanced-policygenerator-config
33523352
- Name: Updating managed clusters in a disconnected environment with PolicyGenerator resources and TALM
33533353
File: ztp-talm-updating-managed-policies-pg
3354-
- Name: Managing cluster polices with PolicyGenTemplate resources
3354+
- Name: Managing cluster policies with PolicyGenTemplate resources
33553355
Dir: policygentemplate_for_ztp
33563356
Distros: openshift-origin,openshift-enterprise
33573357
Topics:

modules/logging-release-notes-5-8-0.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ In order to support multi-cluster log forwarding in additional namespaces other
2828

2929
* With this update, you can configure the log collector to look for HTTP connections and receive logs as an HTTP server, also known as a webhook. (link:https://issues.redhat.com/browse/LOG-4562[LOG-4562])
3030

31-
* With this update, you can configure audit polices to control which Kubernetes and OpenShift API server events are forwarded by the log collector. (link:https://issues.redhat.com/browse/LOG-3982[LOG-3982])
31+
* With this update, you can configure audit policies to control which Kubernetes and OpenShift API server events are forwarded by the log collector. (link:https://issues.redhat.com/browse/LOG-3982[LOG-3982])
3232

3333
[id="logging-release-notes-5-8-0-log-storage"]
3434
=== Log Storage

modules/nw-secondary-ext-gw-object.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Specifies the name of the `AdminPolicyBasedExternalRoute` object.
2222
|`spec.from`
2323
|`string`
2424
|
25-
Specifies a namespace selector that the routing polices apply to. Only `namespaceSelector` is supported for external traffic. For example:
25+
Specifies a namespace selector that the routing policies apply to. Only `namespaceSelector` is supported for external traffic. For example:
2626

2727
[source,yaml]
2828
----

modules/nw-sriov-topology-manager.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="nw-sriov-topology-manager_{context}"]
77
= Creating a non-uniform memory access (NUMA) aligned SR-IOV pod
88

9-
You can create a NUMA aligned SR-IOV pod by restricting SR-IOV and the CPU resources allocated from the same NUMA node with `restricted` or `single-numa-node` Topology Manager polices.
9+
You can create a NUMA aligned SR-IOV pod by restricting SR-IOV and the CPU resources allocated from the same NUMA node with `restricted` or `single-numa-node` Topology Manager policies.
1010

1111
.Prerequisites
1212

modules/rosa-aws-scp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="rosa-minimum-scp_{context}"]
77
= Minimum set of effective permissions for service control policies (SCP)
88

9-
Service control policies (SCP) are a type of organization policy that manages permissions within your organization. SCPs ensure that accounts within your organization stay within your defined access control guidelines. These polices are maintained in AWS Organizations and control the services that are available within the attached AWS accounts. SCP management is the responsibility of the customer.
9+
Service control policies (SCP) are a type of organization policy that manages permissions within your organization. SCPs ensure that accounts within your organization stay within your defined access control guidelines. These policies are maintained in AWS Organizations and control the services that are available within the attached AWS accounts. SCP management is the responsibility of the customer.
1010

1111
ifeval::["{context}" == "rosa-sts-about-iam-resources"]
1212
:aws-sts:
@@ -107,4 +107,4 @@ ViewUsage
107107
.Additional resources
108108

109109
* link:https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html[Service control policies]
110-
* link:https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html#scp-effects-on-permissions[SCP effects on permissions]
110+
* link:https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html#scp-effects-on-permissions[SCP effects on permissions]

modules/rosa-sts-account-wide-roles-and-policies.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The account-wide roles and policies are specific to an {product-title} minor rel
1212
[id="rosa-sts-account-wide-roles-and-policies-creation-methods_{context}"]
1313
== Methods of account-wide role creation
1414

15-
You can create account-wide roles by using the {product-title} (ROSA) CLI, `rosa`, or the {cluster-manager-url} guided installation. You can create the roles manually or by using an automatic process that uses predefined names for these roles and polices.
15+
You can create account-wide roles by using the {product-title} (ROSA) CLI, `rosa`, or the {cluster-manager-url} guided installation. You can create the roles manually or by using an automatic process that uses predefined names for these roles and policies.
1616

1717
[discrete]
1818
[id="rosa-sts-account-wide-roles-and-policies-creation-methods-manual_{context}"]
@@ -24,7 +24,7 @@ You can use the manual creation method if you have the necessary CLI access to c
2424
[id="rosa-sts-account-wide-roles-and-policies-creation-methods-auto_{context}"]
2525
=== Automatic ocm-role resource creation
2626

27-
If you created an `ocm-role` resource with administrative permissions, you can use the automatic creation method from {cluster-manager}. The ROSA CLI does not require that you have this admin `ocm-role` IAM resource to automatically create these roles and polices. Selecting this method creates the roles and policies that uses the default names.
27+
If you created an `ocm-role` resource with administrative permissions, you can use the automatic creation method from {cluster-manager}. The ROSA CLI does not require that you have this admin `ocm-role` IAM resource to automatically create these roles and policies. Selecting this method creates the roles and policies that uses the default names.
2828

2929
If you use the ROSA guided installation on {cluster-manager}, you must have created an `ocm-role` resource with administrative permissions in the first step of the guided cluster installation. Without this role, you cannot use the automatic Operator role and policy creation option, but you can still create the cluster and its roles and policies with the manual process.
3030

modules/ztp-preparing-the-ztp-git-repository.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ example/
7070
├── extra-manifests
7171
└── kustomization.yaml
7272
----
73-
<1> Using `PolicyGenTemplate` CRs to manage and deploy polices to manage clusters will be deprecated in a future {product-title} release.
73+
<1> Using `PolicyGenTemplate` CRs to manage and deploy policies to manage clusters will be deprecated in a future {product-title} release.
7474
Equivalent and improved functionality is available by using {rh-rhacm-first} and `PolicyGenerator` CRs.
7575

7676
. Commit the directory structure and the `kustomization.yaml` files and push to your Git repository.

modules/ztp-the-policygentemplate.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
The `{policy-gen-cr}` custom resource definition (CRD) tells the `PolicyGen` policy generator what custom resources (CRs) to include in the cluster configuration, how to combine the CRs into the generated policies, and what items in those CRs need to be updated with overlay content.
1010

11-
The following example shows a `{policy-gen-cr}` CR (`{policy-prefix}common-du-ranGen.yaml`) extracted from the `ztp-site-generate` reference container. The `{policy-prefix}common-du-ranGen.yaml` file defines two {rh-rhacm-first} policies. The polices manage a collection of configuration CRs, one for each unique value of `policyName` in the CR. `{policy-prefix}common-du-ranGen.yaml` creates a single placement binding and a placement rule to bind the policies to clusters based on the labels listed in the `{binding-field}` section.
11+
The following example shows a `{policy-gen-cr}` CR (`{policy-prefix}common-du-ranGen.yaml`) extracted from the `ztp-site-generate` reference container. The `{policy-prefix}common-du-ranGen.yaml` file defines two {rh-rhacm-first} policies. The policies manage a collection of configuration CRs, one for each unique value of `policyName` in the CR. `{policy-prefix}common-du-ranGen.yaml` creates a single placement binding and a placement rule to bind the policies to clusters based on the labels listed in the `{binding-field}` section.
1212

1313
.Example {policy-gen-cr} CR - {policy-prefix}common-ranGen.yaml
1414
ifeval::["{policy-gen-cr}" == "PolicyGenTemplate"]

modules/ztp-updating-gitops-ztp.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ You can update {ztp-first} for a fully operational hub cluster running an earlie
1010

1111
[NOTE]
1212
====
13-
Any changes to policy settings, including adding recommended content, results in updated polices that must be rolled out to the managed clusters and reconciled.
13+
Any changes to policy settings, including adding recommended content, results in updated policies that must be rolled out to the managed clusters and reconciled.
1414
====
1515

1616
At a high level, the strategy for updating the {ztp} infrastructure is as follows:

snippets/pgt-deprecation-notice.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
:_mod-docs-content-type: SNIPPET
22
[IMPORTANT]
33
====
4-
Using `PolicyGenTemplate` CRs to manage and deploy polices to managed clusters will be deprecated in an upcoming {product-title} release.
4+
Using `PolicyGenTemplate` CRs to manage and deploy policies to managed clusters will be deprecated in an upcoming {product-title} release.
55
Equivalent and improved functionality is available using {rh-rhacm-first} and `PolicyGenerator` CRs.
66

77
For more information about `PolicyGenerator` resources, see the {rh-rhacm} link:https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/{rh-rhacm-version}/html/governance/integrate-policy-generator#policy-generator[Policy Generator] documentation.

0 commit comments

Comments
 (0)