Skip to content

Commit 1e13ed7

Browse files
committed
Spelling Fixes
1 parent 88e4191 commit 1e13ed7

19 files changed

+39
-39
lines changed

articles/operator-nexus/concepts-network-fabric-read-write-commands.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ show interfaces description
6161
```
6262

6363
```Output
64-
|Interface |Status |Protocol |Decsription |
64+
|Interface |Status |Protocol |Description |
6565
|---------|---------|---------|---------|
6666
|Et1  | admin down | down   | **"AR-Mgmt2:Et1 to Not-Connected"** |
6767
|Et2  | admin down | down   | **"AR-Mgmt2:Et2 to Not-Connected"** |
@@ -167,7 +167,7 @@ show interfaces description
167167
```
168168

169169
```Output
170-
|Interface |Status |Protocol |Decsription |
170+
|Interface |Status |Protocol |Description |
171171
|---------|---------|---------|---------|
172172
|Et1  | admin down | down   | **RW-test1** |
173173
|Et2  | admin down | down   | "AR-Mgmt2:Et2 to Not-Connected" |
@@ -273,7 +273,7 @@ show interfaces description
273273
```
274274

275275
```Output
276-
|Interface |Status |Protocol |Decsription |
276+
|Interface |Status |Protocol |Description |
277277
|---------|---------|---------|---------|
278278
|Et1  | admin down | down   | **RW-test1** |
279279
|Et2  | admin down | down   | **RW-test2** |
@@ -377,7 +377,7 @@ show interfaces description
377377
```
378378

379379
```Output
380-
|Interface |Status |Protocol |Decsription |
380+
|Interface |Status |Protocol |Description |
381381
|---------|---------|---------|---------|
382382
|Et1  | admin down | down   | "AR-Mgmt2:Et1 to Not-Connected" |
383383
|Et2  | admin down | down   | "AR-Mgmt2:Et2 to Not-Connected" |
@@ -485,7 +485,7 @@ show interfaces description
485485
```
486486

487487
```Output
488-
|Interface |Status |Protocol |Decsription |
488+
|Interface |Status |Protocol |Description |
489489
|---------|---------|---------|---------|
490490
|Et1  | admin down | down   | **"AR-Mgmt2:Et1 to Not-Connected"** |
491491
|Et2  | admin down | down   | **"AR-Mgmt2:Et2 to Not-Connected"** |

articles/operator-nexus/how-to-credential-manager-key-vault.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ The Nexus Cluster _secret-archive-settings_ specify the Azure Key Vault URI wher
134134
These examples describe how to configure a managed identity for a Nexus Cluster and configure it as part of _secret-archive-settings_.
135135

136136
> [!NOTE]
137-
> Secret archive settings specify the Key Vault URI, not the Key Vault resource ID, and the managed identity specfied must be configured for the Nexus Cluster.
137+
> Secret archive settings specify the Key Vault URI, not the Key Vault resource ID, and the managed identity specified must be configured for the Nexus Cluster.
138138
139139
- Create Nexus Cluster with system-assigned identity to access Key Vault for rotated credentials.
140140
```azurecli-interactive

articles/operator-nexus/how-to-route-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -389,7 +389,7 @@ Route policy resource enables an operator to specify conditions and actions base
389389
| location | AzON Azure Region used during NFC Creation | eastus |True |
390390
| statements | List of one or more route Policy statements | |True |
391391
| sequenceNumber | Sequence in which route policy statements are processed. Statements are evaluated starting with the lowest sequence number and continue down the list until a match condition is met. Once a match is made, the action is applied and the rest of the list is ignored | 1 |True |
392-
| condition | Route policy condition properties. That contains a list of IP community ARM IDs or ipExtendedCommmunicty ARM IDs or ipPrefix ARM ID. One of the three(ipCommunityIds, ipCommunityIds, ipPrefixId) is required in a condition. If more than one is specified, the condition is matched if any one of the resources has a match. | 1234:5678 |True |
392+
| condition | Route policy condition properties. That contains a list of IP community ARM IDs or ipExtendedCommunity ARM IDs or ipPrefix ARM ID. One of the three(ipCommunityIds, ipCommunityIds, ipPrefixId) is required in a condition. If more than one is specified, the condition is matched if any one of the resources has a match. | 1234:5678 |True |
393393
| ipCommunityIds | List of IP community resource IDs | |False|
394394
| ipExtendedCommunityIds | List of IPExtendedCommunity resource IDs | |False|
395395
| ipPrefixId | Arm Resource ID of IpPrefix | |False|

articles/operator-nexus/howto-cluster-runtime-upgrade-with-pauserack-strategy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ This how-to guide explains the steps to execute a cluster runtime upgrade with P
5757
:::image type="content" source="media/runtime-upgrade-cluster-paused.png" alt-text="Screenshot showing Paused Runtime Upgrade.":::
5858
5959
> [!NOTE]
60-
> This message will be available in logs for programtic access, for more details follow [List of logs available for streaming in Azure Operator Nexus](list-logs-available.md)
60+
> This message will be available in logs for programmatic access, for more details follow [List of logs available for streaming in Azure Operator Nexus](list-logs-available.md)
6161
6262
5. To resume the runtime upgrade, execute the following `az networkcloud` cli command.
6363

articles/operator-nexus/howto-configure-isolation-domain.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,7 @@ Expected Output
387387

388388
Use the following command to change the administrative state of an L3 isolation domain to enabled or disabled:
389389

390-
##Note: At least one internal network should be available to change the adminstrative state of an L3 Isolation Domain.
390+
##Note: At least one internal network should be available to change the administrative state of an L3 Isolation Domain.
391391

392392
```azurecli
393393
az networkfabric l3domain update-admin-state --resource-group "ResourceGroupName" --resource-name "example-l3domain" --state Enable/Disable
@@ -475,7 +475,7 @@ The following parameters are optional for creating internal networks.
475475
|`ipv4ListenRangePrefixes`| BGP IPv4 listen range, maximum range allowed in /28| 10.1.0.0/26 | |
476476
|`ipv4NeighborAddress`| IPv4 neighbor address|10.0.0.11| |
477477
|`ipv6NeighborAddress`| IPv6 neighbor address|10:101:1::11| |
478-
|`isMonitoringEnabled`| TO enable or disbable monitoring on internal network|False| |
478+
|`isMonitoringEnabled`| TO enable or disable monitoring on internal network|False| |
479479

480480

481481
You need to create an internal network before you enable an L3 isolation domain. This command creates an internal network with BGP configuration and a specified peering address:
@@ -658,7 +658,7 @@ The commands for creating an external network by using Azure CLI include the fol
658658

659659
|Parameter|Description|Example|Required|
660660
|---|---|---|---|
661-
|peeringOption |Peering using either optionA or optionb. Possible values OptionA and OptionB |OptionB| True|
661+
|peeringOption |Peering using either optionA or optionB. Possible values OptionA and OptionB |OptionB| True|
662662
|optionBProperties | OptionB properties configuration. To specify use exportIPv4/IPv6RouteTargets or importIpv4/Ipv6RouteTargets|"exportIpv4/Ipv6RouteTargets": ["1234:1234"]}}||
663663
|optionAProperties | Configuration of OptionA properties. Please refer to OptionA example in section below |||
664664
|external|This is an optional Parameter to input MPLS Option 10 (B) connectivity to external networks via Provider Edge devices. Using this Option, a user can Input Import and Export Route Targets as shown in the example| ||

articles/operator-nexus/howto-configure-network-fabric-controller.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ az networkfabric controller update \
191191
> [!NOTE]
192192
> Run az networkfabric controller show to retrieve information about a network fabric controller.
193193
194-
## Update Network Fabrc Controller with multiple `ExpressRoute` circuits.
194+
## Update Network Fabric Controller with multiple `ExpressRoute` circuits.
195195

196196
```Azure CLI
197197
az networkfabric controller update \

articles/operator-nexus/howto-configure-network-fabric.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -369,7 +369,7 @@ The following table specifies parameters used to create Network-to-Network Inter
369369

370370
| Parameter | Description | Example | Required | Type|
371371
|-----------|-------------|---------|----------|-----------|
372-
|isMangementType| Configuration to make NNI to be used for management of Fabric. Default value is true. Possible values are True/False |True|True
372+
|isManagementType| Configuration to make NNI to be used for management of Fabric. Default value is true. Possible values are True/False |True|True
373373
|useOptionB| Configuration to enable optionB. Possible values are True/False |True|True
374374
||
375375
|*layer2Configuration*| Layer 2 configuration ||

articles/operator-nexus/howto-configure-network-packet-broker.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -88,15 +88,15 @@ NetworkTapRule resource provides ability for providing filtering and forwarding
8888
| match-configurations/action|Provide action details. Actions can be Drop, Count, Log,Goto,Redirect,Mirror| | |
8989
| dynamic-match-configurations|List of dynamic match configurations based Port, VLAN & IP | | |
9090
> [!NOTE]
91-
> Network Tap rules and Neighbor Groups must be created prior to refrencing them in Network Tap
91+
> Network Tap rules and Neighbor Groups must be created prior to referencing them in Network Tap
9292
### Create Network Tap Rule
9393
This command creates a Network Tap rule:
9494
```azurecli
9595
az networkfabric taprule create --resource-group "example-rg" --location "westus3"--resource-name "example-networktaprule"\
9696
--configuration-type "Inline" \
9797
--match-configurations "[{matchConfigurationName:config1,sequenceNumber:10,ipAddressType:IPv4,matchConditions:[{encapsulationType:None,portCondition:{portType:SourcePort,layer4Protocol:TCP,ports:[100],portGroupNames:['example-portGroup1']},protocolTypes:[TCP],vlanMatchCondition:{vlans:['10'],innerVlans:['11-20']},ipCondition:{type:SourceIP,prefixType:Prefix,ipPrefixValues:['10.10.10.10/20']}}],\
9898
actions:[{type:Drop,truncate:100,isTimestampEnabled:True,destinationId:'/subscriptions/xxxxx-xxxx-xxxx-xxxx-xxxxx/resourcegroups/example-rg/providers/Microsoft.ManagedNetworkFabric/neighborGroups/example-neighborGroup',matchConfigurationName:match1}]}]"\
99-
--dynamic-match-configurations"[{ipGroups:[{name:'example-ipGroup1',ipAddressType:IPv4,ipPrefixes:['10.10.10.10/30']}],vlanGroups:[{name:'exmaple-vlanGroup',vlans:['10']}],portGroups:[{name:'example-portGroup1',ports:['100-200']}]}]"
99+
--dynamic-match-configurations"[{ipGroups:[{name:'example-ipGroup1',ipAddressType:IPv4,ipPrefixes:['10.10.10.10/30']}],vlanGroups:[{name:'example-vlanGroup',vlans:['10']}],portGroups:[{name:'example-portGroup1',ports:['100-200']}]}]"
100100
```
101101
Expected output:
102102
```output
@@ -140,7 +140,7 @@ Expected output:
140140
"11-20"
141141
],
142142
"vlanGroupNames": [
143-
"exmaple-vlanGroup"
143+
"example-vlanGroup"
144144
]
145145
},
146146
"ipCondition": {
@@ -178,7 +178,7 @@ Expected output:
178178
],
179179
"vlanGroups": [
180180
{
181-
"name": "exmaple-vlanGroup",
181+
"name": "example-vlanGroup",
182182
"vlans": [
183183
"10",
184184
"100-200"
@@ -267,7 +267,7 @@ Expected output:
267267
"11-20"
268268
],
269269
"vlanGroupNames": [
270-
"exmaple-vlanGroup"
270+
"example-vlanGroup"
271271
]
272272
},
273273
"ipCondition": {
@@ -305,7 +305,7 @@ Expected output:
305305
],
306306
"vlanGroups": [
307307
{
308-
"name": "exmaple-vlanGroup",
308+
"name": "example-vlanGroup",
309309
"vlans": [
310310
"10",
311311
"100-200"
@@ -455,6 +455,6 @@ az networkfabric tap create --resource-group "example-rg" --location "westus3" \
455455
--resource-name "example-networktap" \
456456
--network-packet-broker-id "/subscriptions/xxxxx-xxxx-xxxx-xxxx-xxxxx/resourcegroups/example-rg/providers/Microsoft.ManagedNetworkFabric/networkPacketBrokers/example-networkPacketBroker" \
457457
--polling-type "Pull"\
458-
--destinations "[{name:'example-destinationName',destinationType:IsolationDomain,destinationId:'/subscriptions/xxxxx/resourcegroups/example-rg/providers/Microsoft.ManagedNetworkFabric/l3IsloationDomains/example-l3Domain/internalNetworks/example-internalNetwork',\
458+
--destinations "[{name:'example-destinationName',destinationType:IsolationDomain,destinationId:'/subscriptions/xxxxx/resourcegroups/example-rg/providers/Microsoft.ManagedNetworkFabric/l3IsolationDomains/example-l3Domain/internalNetworks/example-internalNetwork',\
459459
isolationDomainProperties:{encapsulation:None,neighborGroupIds:['/subscriptions/xxxxx-xxxx-xxxx-xxxx-xxxxx/resourcegroups/example-rg/providers/Microsoft.ManagedNetworkFabric/neighborGroups/example-neighborGroup']},\
460460
```

articles/operator-nexus/howto-create-access-control-list-for-network-to-network-interconnects.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The table below provides guidance on the usage of parameters when creating ACLs:
6060
| matchConditions | Conditions required to be matched | |
6161
| ttlValues | TTL [Time To Live] | 0-255 |
6262
| dscpMarking | DSCP Markings that need to be matched | 0-63 |
63-
| fargments | Specify the IP fragment packets | Range: 1-8191<br> Example: [1, 5, 1250-1300, 8000-8191] |
63+
| fragments | Specify the IP fragment packets | Range: 1-8191<br> Example: [1, 5, 1250-1300, 8000-8191] |
6464
| portCondition | Port condition that needs to be matched | |
6565
| portType | Port type that needs to be matched | Example: SourcePort |
6666
| ports | Port number that needs to be matched | Range: 0-65535<br> Example: [1, 10, 500, 1025-1050, 64000-65535] |

articles/operator-nexus/howto-disable-cgroupsv2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Before proceeding with this how-to guide, it's recommended that you:
6565
> If you perform this step on a Kubernetes cluster that already has workloads
6666
> running on it, any workloads that are running on Kubernetes cluster nodes
6767
> will be terminated because the `Daemonset` reboots the host machine.
68-
> Therefore it is highly recommmended that you apply this `Daemonset` on a new
68+
> Therefore it is highly recommended that you apply this `Daemonset` on a new
6969
> Nexus Kubernetes cluster before workloads are scheduled on it.
7070
7171
Copy the following `Daemonset` definition to a file on a computer where you can

0 commit comments

Comments
 (0)