diff --git a/docs/administration/_index.md b/docs/administration/_index.md index cb2bd06b7..621731538 100644 --- a/docs/administration/_index.md +++ b/docs/administration/_index.md @@ -14,7 +14,7 @@ The operations that are performed by the Harbor system administrator are the fol - Set up replication of images between Harbor and another Harbor instance or a 3rd party replication target. For information, see [Configuring Replication](configuring-replication). - Set up vulnerability scanners to check the images in the registry for CVE vulnerabilities. For information, see [Vulnerability Scanning](vulnerability-scanning). - Perform garbage collection, to remove unnecessary data from Harbor. For information, see [Garbage Collection](garbage-collection). -- Manage audit logs by configuring an audit log retention window and setting a syslog endpoint to forward audit logs.For information, see [Log Rotation](log-rotation). +- Manage audit logs by configuring an audit log retention window and setting a syslog endpoint to forward audit logs. For information, see [Log Rotation](log-rotation). - Upgrade Harbor when a new version becomes available. For information, see [Upgrading Harbor](upgrade). - Set up P2P preheat provider instances to preheat the specified images into the P2P network. For information, see [P2P preheat](p2p-preheat). - Details of defining a user-defined OCI artifact so that Harbor can manage it. For information, see [user-defined OCI artifact](user-defined-OCI-artifact). diff --git a/docs/administration/configuring-replication/create-replication-endpoints.md b/docs/administration/configuring-replication/create-replication-endpoints.md index 9363ccd39..ddee92930 100644 --- a/docs/administration/configuring-replication/create-replication-endpoints.md +++ b/docs/administration/configuring-replication/create-replication-endpoints.md @@ -56,7 +56,7 @@ You can also use an endpoint in a proxy cache project. Read more about how to [C ## Access ID and Secret Configuration -- AWS ECR adapters should use access keys, not a username and password.The access key should have sufficient permissions, such as storagepermission. +- AWS ECR adapters should use access keys, not a username and password. The access key should have sufficient permissions, such as storage permission. - Google GCR adapters should use the entire JSON key generated in the service account. The namespace should start with the project ID. - Quay Registry - Supported scope