Skip to content

Commit 619c0ac

Browse files
committed
Asciidoc conversion of hardening guide changes
Corrections Asciidoc conversion of new and revised content for hardening guide v4. https://issues.redhat.com/browse/AAP-48749
1 parent b8a1954 commit 619c0ac

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

downstream/modules/aap-hardening/proc-fapolicyd-permissive-mode.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ To configure permissive mode for fapolicyd, use the following procedure:
88

99
.Procedure
1010
. Edit the file `/etc/fapolicyd/fapolicyd.conf`, and set "permissive = 1".
11-
. Restart the `fapolicy` service by running `systemctl restart fapolicyd.service`
11+
. Restart the `fapolicy` service by running `systemctl restart fapolicyd.service`.
1212

1313
In environments where this configuration might not meet a required compliance profile or local policy, discuss waiving the relevant security control with your security auditor.

downstream/modules/aap-hardening/ref-install-containerized-deployment.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ hub_pg_password: <secure_password>
1616
eda_admin_password: <secure_password>
1717
eda_pg_password: <secure_password>
1818
----
19-
To use the new Ansible vault with the {Installer}, ensure the file, for example, `vault.yml`, contains all required sensitive variables and run it with the command
19+
To use the new Ansible vault with the {Installer}, ensure the file, for example, `vault.yml`, contains all required sensitive variables and run it with the following command:
2020

2121
`ansible-playbook ansible.containerized_installer.install -e @vault.yml –ask-become-pass`.
2222

downstream/modules/aap-hardening/ref-install-rpm-deployment.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ automationhub_pg_password: <secure_password>
1616
automationedacontroller_admin_password: <secure_password>
1717
automationedacontroller_pg_password: <secure_password>
1818
----
19-
To use the new Ansible vault with the {Installer}, ensure the file, for example, `vault.yml`, contains all required sensitive variables and run it with the command
19+
To use the new Ansible vault with the {Installer}, ensure the file, for example, `vault.yml`, contains all required sensitive variables and run it with the following command:
2020

2121
`./setup.sh -e @vault.yml –ask-vault-pass`
2222

downstream/modules/aap-hardening/ref-sensitive-variables-install-inventory.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77

88
[role="_abstract"]
99

10-
The installation inventory file for {PlatformNameShort}contains a number of sensitive variables, such as default administrative and database passwords.
10+
The installation inventory file for {PlatformNameShort} contains a number of sensitive variables, such as default administrative and database passwords.
1111
By default, these are stored in plain text.
1212
To enhance security and comply with organizational policies, encrypt these variables using an Ansible vault file.
1313

0 commit comments

Comments
 (0)