From fb199a44b3827ab81b02f009503cdce9318c5faf Mon Sep 17 00:00:00 2001 From: mmihaylovam <85890011+mmihaylovam@users.noreply.github.com> Date: Fri, 12 Apr 2024 11:57:27 +0300 Subject: [PATCH] internal links and hidden pages --- pages/doc/2023-52.x_release_notes.md | 2 +- pages/doc/csp_area_differences.md | 8 +++--- pages/doc/csp_getting_started.md | 4 +-- pages/doc/csp_invite-AoA-users_tutorial.md | 4 +-- pages/doc/csp_migration.md | 30 +++++++++++----------- pages/doc/csp_permissions_overview.md | 4 +-- pages/doc/csp_users_account_managing.md | 4 +-- pages/doc/csp_users_roles.md | 6 ++--- pages/doc/documentation_getting_started.md | 2 +- pages/doc/logging_overview.md | 2 +- pages/doc/purchase-additional-capacity.md | 2 +- pages/doc/query_language_reference.md | 2 +- pages/doc/start_trial.md | 2 +- pages/doc/tracing_integrations.md | 30 +++++++++++----------- pages/doc/upgrade-and-purchase.md | 2 +- pages/doc/wavefront_data_format.md | 2 +- pages/doc/wavefront_data_naming.md | 14 +++++----- pages/doc/wavefront_obsolescence_policy.md | 2 +- pages/doc/wavefront_release_notes.md | 2 +- 19 files changed, 62 insertions(+), 62 deletions(-) diff --git a/pages/doc/2023-52.x_release_notes.md b/pages/doc/2023-52.x_release_notes.md index f49eb707d..ed27730f4 100644 --- a/pages/doc/2023-52.x_release_notes.md +++ b/pages/doc/2023-52.x_release_notes.md @@ -40,7 +40,7 @@ Example: An annotated screenshot of the create traces security policy for origin ### Onboarded Subscriptions -**New Admin Permission and Service Role**: With this release, we introduce the **Admin** [permission](csp_permissions_overview.html#operations-for-applications-permissions) and [service role](csp_users_roles.html#operations-for-applications-service-roles-built-in). **Admin** users can manage the Tanzu Observability organization settings. +**New Admin Permission and Service Role**: With this release, we introduce the **Admin** [permission](csp_permissions_overview.html#tanzu-observability-permissions) and [service role](csp_users_roles.html#tanzu-observability-service-roles-built-in). **Admin** users can manage the Tanzu Observability organization settings. ### Original and Onboarded Subscriptions diff --git a/pages/doc/csp_area_differences.md b/pages/doc/csp_area_differences.md index 6b8ae6ccb..54ef04975 100644 --- a/pages/doc/csp_area_differences.md +++ b/pages/doc/csp_area_differences.md @@ -161,7 +161,7 @@ Last sentence: Тo temporarily enable service accounts for your service instance For original subscriptions, using the Tanzu Observability REST API requires an API token associated with a user account or a service account. To generate API tokens for your user account you need the **API Tokens** permission. To generate API tokens for service accounts and to manage the API tokens in your Tanzu Observability organization, you need the **Accounts** permission. -When your service is onboarded to VMware Cloud services and you want to access the Tanzu Observability REST API, you need a VMware Cloud services **access token**. In a few cases, when setting up a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens), authentication with a Tanzu Observability API token is also supported. However, using a VMware Cloud services **access token** is the recommended way as we will deprecate the service accounts in the future. To obtain an **access token**, you can: +When your service is onboarded to VMware Cloud services and you want to access the Tanzu Observability REST API, you need a VMware Cloud services **access token**. In a few cases, when setting up a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens), authentication with a Tanzu Observability API token is also supported. However, using a VMware Cloud services **access token** is the recommended way as we will deprecate the service accounts in the future. To obtain an **access token**, you can: * Generate a VMware Cloud services API token associated with your user account and exchange it for an access token. @@ -366,7 +366,7 @@ For details, see Manage API Tokens.

@@ -425,7 +425,7 @@ For details, see Manage API Tokens.

Where: In the Tanzu Observability user interface.

How: As a user with the Proxies permission, you must configure the proxy to authenticate to Tanzu Observability with a Tanzu Observability API token that have the Proxies permission. For details, see Install a Proxy from the UI.

-Note: The Wavefront proxy authenticates with a VMware Cloud services access token obtained from server to server OAuth app credentials or from a VMware Cloud services API token. Proxy authentication with a Tanzu Observability API token is still possible and supported only for a limited list of integrations. +Note: The Wavefront proxy authenticates with a VMware Cloud services access token obtained from server to server OAuth app credentials or from a VMware Cloud services API token. Proxy authentication with a Tanzu Observability API token is still possible and supported only for a limited list of integrations.

Who: