Skip to content

Commit 6115f05

Browse files
mikalstillosfrickler
authored andcommitted
Fix docs rendering errors.
I was reading https://docs.openstack.org's version of the kolla-ansible advanced configuration guide and noticed some RST rendering errors. This patch corrects those errors so that the page renders correctly. Change-Id: I330678d8971d286e67f115eace1cb606d30433b6
1 parent 9014429 commit 6115f05

19 files changed

+124
-122
lines changed

doc/source/admin/advanced-configuration.rst

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,19 +8,21 @@ Endpoint Network Configuration
88
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99

1010
When an OpenStack cloud is deployed, the REST API of each service is presented
11-
as a series of endpoints. These endpoints are the admin URL, the internal
12-
URL, and the external URL.
11+
as a series of endpoints. These endpoints are the internal URL, and the
12+
external URL.
1313

1414
Kolla offers two options for assigning these endpoints to network addresses:
15-
- Combined - Where all three endpoints share the same IP address
16-
- Separate - Where the external URL is assigned to an IP address that is
17-
different than the IP address shared by the internal and admin URLs
15+
16+
* Combined - Where both endpoints share the same IP address
17+
* Separate - Where the external URL is assigned to an IP address that is
18+
different than the IP address used by the internal URL
1819

1920
The configuration parameters related to these options are:
20-
- kolla_internal_vip_address
21-
- network_interface
22-
- kolla_external_vip_address
23-
- kolla_external_vip_interface
21+
22+
* kolla_internal_vip_address
23+
* network_interface
24+
* kolla_external_vip_address
25+
* kolla_external_vip_interface
2426

2527
For the combined option, set the two variables below, while allowing the
2628
other two to accept their default values. In this configuration all REST
@@ -50,8 +52,8 @@ a name, like ``www.example.net``, instead of an address like
5052
``10.10.10.254``. If you prefer to use names to address the endpoints
5153
in your kolla deployment use the variables:
5254

53-
- kolla_internal_fqdn
54-
- kolla_external_fqdn
55+
* kolla_internal_fqdn
56+
* kolla_external_fqdn
5557

5658
.. code-block:: yaml
5759

doc/source/admin/tls.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -80,10 +80,10 @@ TLS Configuration for internal/external VIP
8080
The configuration variables that control TLS for the internal and/or external
8181
VIP are:
8282

83-
- ``kolla_enable_tls_external``
84-
- ``kolla_enable_tls_internal``
85-
- ``kolla_internal_fqdn_cert``
86-
- ``kolla_external_fqdn_cert``
83+
* ``kolla_enable_tls_external``
84+
* ``kolla_enable_tls_internal``
85+
* ``kolla_internal_fqdn_cert``
86+
* ``kolla_external_fqdn_cert``
8787

8888
.. note::
8989

@@ -224,11 +224,11 @@ Glance, Heat, Placement, Horizon, Barbican, and Cinder.
224224
The configuration variables that control back-end TLS for service endpoints
225225
are:
226226

227-
- ``kolla_enable_tls_backend``
228-
- ``kolla_tls_backend_cert``
229-
- ``kolla_tls_backend_key``
230-
- ``haproxy_backend_cacert``
231-
- ``haproxy_backend_cacert_dir``
227+
* ``kolla_enable_tls_backend``
228+
* ``kolla_tls_backend_cert``
229+
* ``kolla_tls_backend_key``
230+
* ``haproxy_backend_cacert``
231+
* ``haproxy_backend_cacert_dir``
232232

233233
The default state for back-end TLS is disabled. To enable TLS for the back-end
234234
communication:

doc/source/contributor/adding-a-new-service.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,16 +76,16 @@ which Kolla uses throughout and which should be followed.
7676

7777
Other than the above, most service roles abide by the following pattern:
7878

79-
- ``Register``: Involves registering the service with Keystone, creating
79+
* ``Register``: Involves registering the service with Keystone, creating
8080
endpoints, roles, users, etc.
8181

82-
- ``Config``: Distributes the config files to the nodes to be pulled into
82+
* ``Config``: Distributes the config files to the nodes to be pulled into
8383
the container on startup.
8484

85-
- ``Bootstrap``: Creating the database (but not tables), database user for
85+
* ``Bootstrap``: Creating the database (but not tables), database user for
8686
the service, permissions, etc.
8787

88-
- ``Bootstrap Service``: Starts a one shot container on the host to create
88+
* ``Bootstrap Service``: Starts a one shot container on the host to create
8989
the database tables, and other initial run time config.
9090

9191
Ansible handlers are used to create or restart containers when necessary.

doc/source/contributor/release-notes.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,17 @@ Introduction
99

1010
Kolla Ansible (just like Kolla) uses the following release notes sections:
1111

12-
- ``features`` --- for new features or functionality; these should ideally
12+
* ``features`` --- for new features or functionality; these should ideally
1313
refer to the blueprint being implemented;
14-
- ``fixes`` --- for fixes closing bugs; these must refer to the bug being
14+
* ``fixes`` --- for fixes closing bugs; these must refer to the bug being
1515
closed;
16-
- ``upgrade`` --- for notes relevant when upgrading from previous version;
16+
* ``upgrade`` --- for notes relevant when upgrading from previous version;
1717
these should ideally be added only between major versions; required when
1818
the proposed change affects behaviour in a non-backwards compatible way or
1919
generally changes something impactful;
20-
- ``deprecations`` --- to track deprecated features; relevant changes may
20+
* ``deprecations`` --- to track deprecated features; relevant changes may
2121
consist of only the commit message and the release note;
22-
- ``prelude`` --- filled in by the PTL before each release or RC.
22+
* ``prelude`` --- filled in by the PTL before each release or RC.
2323

2424
Other release note types may be applied per common sense.
2525
Each change should include a release note unless being a ``TrivialFix``

doc/source/contributor/setup-identity-provider.rst

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -45,14 +45,14 @@ if you want to use any other realm name, you must to change 'new_realm' in the
4545
URIs used in the guide and replace the 'new_realm' with the realm name that you
4646
are using.
4747

48-
- Access the admin console on http://localhost:8080/auth/ in the Administration Console option.
49-
- Authenticate using the credentials defined in the creation step.
50-
- Create a new realm in the http://localhost:8080/auth/admin/master/console/#/create/realm page.
51-
- After creating a realm, you will need to create a client to be used by Keystone; to do it, just access http://localhost:8080/auth/admin/master/console/#/create/client/new_realm.
52-
- To create a client, you will need to set the client_id (just choose anyone),
48+
* Access the admin console on http://localhost:8080/auth/ in the Administration Console option.
49+
* Authenticate using the credentials defined in the creation step.
50+
* Create a new realm in the http://localhost:8080/auth/admin/master/console/#/create/realm page.
51+
* After creating a realm, you will need to create a client to be used by Keystone; to do it, just access http://localhost:8080/auth/admin/master/console/#/create/client/new_realm.
52+
* To create a client, you will need to set the client_id (just choose anyone),
5353
the protocol (must be openid-connect) and the Root Url (you can leave it
5454
blank)
55-
- After creating the client, you will need to update some client's attributes
55+
* After creating the client, you will need to update some client's attributes
5656
like:
5757

5858
- Enable the Implicit flow (this one allows you to use the OpenStack CLI with
@@ -72,12 +72,12 @@ are using.
7272
openstack-default-project user attribute
7373
==================================== ==============
7474

75-
- After creating the client, you will need to create a user in that realm to
75+
* After creating the client, you will need to create a user in that realm to
7676
log in OpenStack via identity federation
77-
- To create a user, access http://localhost:8080/auth/admin/master/console/#/create/user/new_realm and fill the form with the user's data
78-
- After creating the user, you can access the tab "Credentials" to set the
77+
* To create a user, access http://localhost:8080/auth/admin/master/console/#/create/user/new_realm and fill the form with the user's data
78+
* After creating the user, you can access the tab "Credentials" to set the
7979
user's password
80-
- Then, in the tab "Attributes", you must set the authorization attributes to
80+
* Then, in the tab "Attributes", you must set the authorization attributes to
8181
be used by Keystone, these attributes are defined in the :ref:`attribute
8282
mapping <attribute_mapping>` in Keystone
8383

@@ -90,10 +90,10 @@ Configuring Kolla Ansible to use the Identity Provider
9090
This section is about how one can get the data needed in
9191
:ref:`Setup OIDC via Kolla Ansible <setup-oidc-kolla-ansible>`.
9292

93-
- name: The realm name, in this case it will be "new_realm"
94-
- identifier: http://localhost:8080/auth/realms/new_realm/ (again, the "new_realm" is the name of the realm)
95-
- certificate_file: This one can be downloaded from http://localhost:8080/auth/admin/master/console/#/realms/new_realm/keys
96-
- metadata_folder:
93+
* name: The realm name, in this case it will be "new_realm"
94+
* identifier: http://localhost:8080/auth/realms/new_realm/ (again, the "new_realm" is the name of the realm)
95+
* certificate_file: This one can be downloaded from http://localhost:8080/auth/admin/master/console/#/realms/new_realm/keys
96+
* metadata_folder:
9797

9898
- localhost%3A8080%2Fauth%2Frealms%2Fnew_realm.client:
9999

doc/source/reference/compute/libvirt-guide.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -157,8 +157,8 @@ information:
157157
Kolla Ansible will search for these files for each compute node in the
158158
following locations and order on the host where Kolla Ansible is executed:
159159

160-
- ``/etc/kolla/config/nova/nova-libvirt/<hostname>/``
161-
- ``/etc/kolla/config/nova/nova-libvirt/``
160+
* ``/etc/kolla/config/nova/nova-libvirt/<hostname>/``
161+
* ``/etc/kolla/config/nova/nova-libvirt/``
162162

163163
In most cases you will want to have a unique set of server and client
164164
certificates and keys per hypervisor and with a common CA certificate. In this

doc/source/reference/compute/vmware-guide.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@ your NSX-T environment.
8282
It also hosts the API server that processes API calls.
8383
The NSX Manager interface provides two modes for configuring resources:
8484

85-
- Policy mode
86-
- Manager mode
85+
* Policy mode
86+
* Manager mode
8787

8888
In Kolla you will have the choice between both with neutron plugin
8989
vmware_nsxv3 for Manager mode and vmware_nsxp for Policy Mode.

doc/source/reference/logging-and-monitoring/central-logging-guide.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ retention policy is applied to all indices which match the
4444
and then eventually deletes them. It can be customised via the following
4545
variables:
4646

47-
- ``opensearch_apply_log_retention_policy``
48-
- ``opensearch_soft_retention_period_days``
49-
- ``opensearch_hard_retention_period_days``
47+
* ``opensearch_apply_log_retention_policy``
48+
* ``opensearch_soft_retention_period_days``
49+
* ``opensearch_hard_retention_period_days``
5050

5151
By default the soft and hard retention periods are 30 and 60 days
5252
respectively. If you are upgrading from ElasticSearch, and have previously

doc/source/reference/logging-and-monitoring/prometheus-guide.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ configure `ipmi_exporter <https://github.com/soundcloud/ipmi_exporter>`_, using
132132
the default value for ``node_custom_config``, you could create the following
133133
files:
134134

135-
- ``/etc/kolla/config/prometheus/prometheus.yml.d/ipmi-exporter.yml``:
135+
* ``/etc/kolla/config/prometheus/prometheus.yml.d/ipmi-exporter.yml``:
136136

137137
.. code-block:: jinja
138138
@@ -171,7 +171,7 @@ files:
171171
where ``ipmi_exporter_listen_address`` is a variable containing the IP address of
172172
the node where the exporter is running.
173173

174-
- ``/etc/kolla/config/prometheus/extras/file_sd/ipmi-exporter-targets.yml``:
174+
* ``/etc/kolla/config/prometheus/extras/file_sd/ipmi-exporter-targets.yml``:
175175

176176
.. code-block:: yaml
177177

doc/source/reference/networking/designate-guide.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ Overview
99

1010
Designate provides DNSaaS services for OpenStack:
1111

12-
- REST API for domain/record management
13-
- Multi-tenant
14-
- Integrated with Keystone for authentication
15-
- Framework in place to integrate with Nova and Neutron
12+
* REST API for domain/record management
13+
* Multi-tenant
14+
* Integrated with Keystone for authentication
15+
* Framework in place to integrate with Nova and Neutron
1616
notifications (for auto-generated records)
17-
- Support for Bind9 and Infoblox out of the box
17+
* Support for Bind9 and Infoblox out of the box
1818

1919
Configuration on Kolla deployment
2020
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

0 commit comments

Comments
 (0)