Skip to content

Commit 3deb793

Browse files
Merge pull request #1613 from sdarwin/docs3
General review/proofreading
2 parents f6575bc + 63d12c5 commit 3deb793

File tree

13 files changed

+34
-21
lines changed

13 files changed

+34
-21
lines changed

content/docs/configuration/acme/README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,13 @@ spec:
6060
server: https://acme-staging-v02.api.letsencrypt.org/directory
6161
privateKeySecretRef:
6262
# Secret resource that will be used to store the account's private key.
63+
# This is your identity with your ACME provider. Any secret name
64+
# may be chosen. It will be populated with data automatically,
65+
# so generally nothing further needs to be done with
66+
# the secret. If you lose this identity/secret, you will be able to
67+
# generate a new one and generate certificates for any/all domains
68+
# managed using your previous account, but you will be unable to revoke
69+
# any certificates generated using that previous account.
6370
name: example-issuer-account-key
6471
# Add a single challenge solver, HTTP01 using nginx
6572
solvers:

content/docs/configuration/acme/dns01/route53.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,7 @@ Here's how to set it up:
387387

388388
- `<service-account-name>` name of the `ServiceAccount` object.
389389
- `<service-account-namespace>` namespace of the `ServiceAccount` object.
390-
- `<cert-manager-service-account-name>` name of cert-managers `ServiceAccount` object, as created during cert-manager installation.
390+
- `<cert-manager-service-account-name>` name of cert-manager's `ServiceAccount` object, as created during cert-manager installation.
391391
- `<cert-manager-namespace>` namespace that cert-manager is deployed into.
392392

393393
4. **Create an Issuer or ClusterIssuer**

content/docs/installation/best-practice.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@ By default the cert-manager webhook Deployment has 1 replica, but in production
256256
If the cert-manager webhook is unavailable, all API operations on cert-manager custom resources will fail,
257257
and this will disrupt any software that creates, updates or deletes cert-manager custom resources (including cert-manager itself),
258258
and it may cause other disruptions to your cluster.
259-
So it is *especially* important to keep at multiple replicas of the cert-manager webhook running at all times.
259+
So it is *especially* important to keep multiple replicas of the cert-manager webhook running at all times.
260260

261261
> ℹ️ By contrast, if there is only a single replica of the cert-manager controller, there is less risk of disruption.
262262
> For example, if the Node hosting the single cert-manager controller manager Pod is drained,

content/docs/troubleshooting/acme.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Events:
6161

6262
## 2. Troubleshooting Orders
6363

64-
When we run a describe on the `CertificateRequest` resource we see that an `Order` that has
64+
When we run a describe on the `CertificateRequest` resource we see that an `Order` has
6565
been created:
6666

6767
```bash
@@ -207,7 +207,7 @@ If your challenge self-check fails with a 404 not found error. Make sure to chec
207207
* use `kubectl describe ingress` to check the status of the HTTP01 solver ingress. (unless you use `acme.cert-manager.io/http01-edit-in-place`, then check the same ingress as your domain)
208208

209209
### DNS01 troubleshooting
210-
If you see no error events about your DNS provider you can check the following
210+
If you see no error events about your DNS provider you can check the following.
211211
Check if you can see the `_acme_challenge.domain` TXT DNS record from the public internet, or in your DNS provider's interface.
212212
cert-manager will check if a DNS record has been propagated by querying the cluster's DNS solver. If you are able to see it from the public internet but not from inside the cluster you might want to change [the DNS server for self-check](../configuration/acme/dns01/README.md#setting-nameservers-for-dns01-self-check) as some cloud providers overwrite DNS internally.
213213

content/docs/trust/trust-manager/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ install trust-manager.
3131

3232
## Usage
3333

34-
trust-manager is intentionally simple, adding just one new Kubernetes `CustomResourceDefintion`: `Bundle`.
34+
trust-manager is intentionally simple, adding just one new Kubernetes `CustomResourceDefinition`: `Bundle`.
3535

3636
A `Bundle` represents a set of X.509 certificates that should be distributed across a cluster.
3737

content/docs/tutorials/acme/migrating-from-kube-lego.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: 'cert-manager tutorials: Migrating from kube-lego'
66
[kube-lego](https://github.com/jetstack/kube-lego) is an older Jetstack project
77
for obtaining TLS certificates from Let's Encrypt (or another ACME server).
88

9-
Since cert-managers release, kube-lego has been gradually deprecated in favor
9+
Since cert-manager's release, kube-lego has been gradually deprecated in favor
1010
of this project. There are a number of key differences between the two:
1111

1212
| Feature | kube-lego | cert-manager |
@@ -229,4 +229,4 @@ I1025 21:54:02.869269 1 sync.go:206] Certificate my-example-certificate sc
229229
```
230230
231231
Here we can see cert-manager has verified the existing TLS certificate and
232-
scheduled it to be renewed in 292 hours time.
232+
scheduled it to be renewed in 292 hours time.

content/docs/tutorials/acme/nginx-ingress.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ sample deployment and an associated service:
107107
```yaml file=./example/service.yaml
108108
```
109109
110-
You can create download and reference these files locally, or you can
110+
You can download and reference these files locally, or you can
111111
reference them from the GitHub source repository for this documentation.
112112
To install the example service from the tutorial files straight from GitHub, do
113113
the following:

content/docs/tutorials/certificate-defaults/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -531,7 +531,7 @@ To instead only need to specify the configuration important to them, for example
531531
```
532532
🔗 <a href="cert-test-minimal.yaml">`cert-test-minimal.yaml`</a>
533533
534-
With this policy we achieved our objective and have enabled users to submit minimal `Certifiate` resources.
534+
With this policy we achieved our objective and have enabled users to submit minimal `Certificate` resources.
535535
This completes our fifth [use case](#use-cases), with only a single field contained within the specification, the `dnsNames` entry.
536536
Every other specified field was automatically defaulted using Kyverno with `ClusterPolicy` which would typically be setup by a platform administrator.
537537

content/docs/tutorials/getting-started-with-cert-manager-on-google-kubernetes-engine-using-lets-encrypt-for-ingress-ssl/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -235,6 +235,7 @@ metadata:
235235
# This tells Google Cloud to create an External Load Balancer to realize this Ingress
236236
kubernetes.io/ingress.class: gce
237237
# This enables HTTP connections from Internet clients
238+
# Since "true" is the default, does not need to be set.
238239
kubernetes.io/ingress.allow-http: "true"
239240
# This tells Google Cloud to associate the External Load Balancer with the static IP which we created earlier
240241
kubernetes.io/ingress.global-static-ip-name: web-ip
@@ -277,7 +278,7 @@ At this point we have a Google load balancer which is forwarding HTTP traffic to
277278
> configured and for Internet clients to be routed to your web server.
278279
> Refer to the [Troubleshooting](#troubleshooting) section if it takes longer.
279280
>
280-
> 🔰 Read about how to [Use a static IP addresses for HTTP(S) load balancers via Ingress annotation](https://cloud.google.com/kubernetes-engine/docs/concepts/ingress-xlb#static_ip_addresses_for_https_load_balancers).
281+
> 🔰 Read about how to [Use static IP addresses for HTTP(S) load balancers via Ingress annotation](https://cloud.google.com/kubernetes-engine/docs/concepts/ingress-xlb#static_ip_addresses_for_https_load_balancers).
281282
>
282283
> 🔰 Read a [Summary of external Ingress annotations for GKE](https://cloud.google.com/kubernetes-engine/docs/how-to/load-balance-ingress#summary_of_external_ingress_annotations).
283284
>

content/docs/tutorials/getting-started-with-trust-manager/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ trusted `ca-certificates.crt` is present.
188188
lrwxrwxrwx 1 root root 26 Apr 14 15:12 ca-certificates.crt -> ..data/ca-certificates.crt
189189
```
190190

191-
Note that normally this container image the output would look something
191+
Note that normally the output would look something
192192
like the following, when there is no volume overriding this directory:
193193

194194
```
@@ -242,7 +242,7 @@ having to pass the additional `--cacert` flag:
242242

243243
Based on the example above, Kubernetes is able to mount over the top of the
244244
default CA certificate bundle. You can use this with applications assuming you
245-
know where the default locations they retrieve CA certificates from.
245+
know the default locations from where they retrieve CA certificates.
246246

247247
For example with `Go` your application is configurable with either
248248
`SSL_CERT_FILE` or `SSL_CERT_DIR` to point to the default CA certificate

0 commit comments

Comments
 (0)