Skip to content

Commit f63ffb1

Browse files
authored
Merge pull request #80136 from aldiazRH/OSDOCS-11199
[OSDOCS-11199] changing instances of Clusters to Cluster List with new OCM UI change
2 parents 73a87ac + ec5eda9 commit f63ffb1

22 files changed

+27
-27
lines changed

modules/access-service.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ cluster, you can access the service by using the OpenShift web console.
1919

2020
.Procedure
2121

22-
. Navigate to the *Clusters* page in {cluster-manager-url}.
22+
. Navigate to the *Cluster List* page in {cluster-manager-url}.
2323

2424
. Select the cluster with an installed service you want to access.
2525

modules/add-user.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Administrator roles are managed using a `dedicated-admins` group on the cluster.
1111

1212
.Procedure
1313

14-
. Navigate to the *Clusters* page and select the cluster you want to add users to.
14+
. Navigate to the *Cluster List* page and select the cluster you want to add users to.
1515

1616
. Click the *Access control* tab.
1717

modules/adding-service-existing.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To add a service to a cluster, you must be the cluster owner.
3030

3131
.Procedure
3232

33-
. Navigate to the *Clusters* page in {cluster-manager-url}.
33+
. Navigate to the *Cluster List* page in {cluster-manager-url}.
3434

3535
. Select the cluster you want to add a service to.
3636

modules/config-github-idp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Configuring GitHub authentication allows users to log in to {product-title} with
2323
2424
.Procedure
2525

26-
. From {cluster-manager-url}, navigate to the *Clusters* page and select the cluster that you need to configure identity providers for.
26+
. From {cluster-manager-url}, navigate to the *Cluster List* page and select the cluster that you need to configure identity providers for.
2727

2828
. Click the *Access control* tab.
2929

@@ -67,4 +67,4 @@ https://oauth-openshift.apps.openshift-cluster.example.com/oauth2callback/github
6767

6868
.Verification
6969

70-
* The configured identity provider is now visible on the *Access control* tab of the *Clusters* page.
70+
* The configured identity provider is now visible on the *Access control* tab of the *Cluster List* page.

modules/config-gitlab-idp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Configure a GitLab identity provider to use link:https://gitlab.com/[GitLab.com]
1717
1818
.Procedure
1919

20-
. From {cluster-manager-url}, navigate to the *Clusters* page and select the cluster that you need to configure identity providers for.
20+
. From {cluster-manager-url}, navigate to the *Cluster List* page and select the cluster that you need to configure identity providers for.
2121

2222
. Click the *Access control* tab.
2323

@@ -57,4 +57,4 @@ https://oauth-openshift.apps.openshift-cluster.example.com/oauth2callback/gitlab
5757

5858
.Verification
5959

60-
* The configured identity provider is now visible on the *Access control* tab of the *Clusters* page.
60+
* The configured identity provider is now visible on the *Access control* tab of the *Cluster List* page.

modules/config-google-idp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ You can limit authentication to members of a specific hosted domain with the
2020

2121
.Procedure
2222

23-
. From {cluster-manager-url}, navigate to the *Clusters* page and select the cluster that you need to configure identity providers for.
23+
. From {cluster-manager-url}, navigate to the *Cluster List* page and select the cluster that you need to configure identity providers for.
2424

2525
. Click the *Access control* tab.
2626

@@ -58,4 +58,4 @@ https://oauth-openshift.apps.openshift-cluster.example.com/oauth2callback/google
5858

5959
.Verification
6060

61-
* The configured identity provider is now visible on the *Access control* tab of the *Clusters* page.
61+
* The configured identity provider is now visible on the *Access control* tab of the *Cluster List* page.

modules/config-htpasswd-idp.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The htpasswd identity provider option is included only to enable the creation of
2727

2828
.Procedure
2929

30-
. From {cluster-manager-url}, navigate to the *Clusters* page and select your cluster.
30+
. From {cluster-manager-url}, navigate to the *Cluster List* page and select your cluster.
3131

3232
. Select *Access control* -> *Identity providers*.
3333

modules/config-ldap-idp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ If the LDAP directory requires authentication to search, specify a `bindDN` and
5555
5656
.Procedure
5757

58-
. From {cluster-manager-url}, navigate to the *Clusters* page and select the cluster that you need to configure identity providers for.
58+
. From {cluster-manager-url}, navigate to the *Cluster List* page and select the cluster that you need to configure identity providers for.
5959

6060
. Click the *Access control* tab.
6161

@@ -94,4 +94,4 @@ If you are using an insecure LDAP connection (ldap:// or port 389), then you mus
9494

9595
.Verification
9696

97-
* The configured identity provider is now visible on the *Access control* tab of the *Clusters* page.
97+
* The configured identity provider is now visible on the *Access control* tab of the *Cluster List* page.

modules/config-openid-idp.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ for more information.
5757
5858
.Procedure
5959

60-
. From {cluster-manager-url}, navigate to the *Clusters* page and select the cluster that you need to configure identity providers for.
60+
. From {cluster-manager-url}, navigate to the *Cluster List* page and select the cluster that you need to configure identity providers for.
6161

6262
. Click the *Access control* tab.
6363

@@ -105,4 +105,4 @@ https://oauth-openshift.apps.openshift-cluster.example.com/oauth2callback/openid
105105

106106
.Verification
107107

108-
* The configured identity provider is now visible on the *Access control* tab of the *Clusters* page.
108+
* The configured identity provider is now visible on the *Access control* tab of the *Cluster List* page.

modules/deleting-machine-pools-ocm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ifndef::openshift-rosa[]
2828
endif::openshift-rosa[]
2929

3030
.Procedure
31-
. From {cluster-manager-url}, navigate to the *Clusters* page and select the cluster that contains the machine pool that you want to delete.
31+
. From {cluster-manager-url}, navigate to the *Cluster List* page and select the cluster that contains the machine pool that you want to delete.
3232

3333
. On the selected cluster, select the *Machine pools* tab.
3434

0 commit comments

Comments
 (0)