Skip to content

Commit 4429863

Browse files
committed
Fix typos in Fleet docs
Remove fixes in data-streams-scenario3
1 parent ec5a351 commit 4429863

25 files changed

+51
-51
lines changed

manage-data/ingest/ingest-reference-architectures/ls-multi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Use when
1919
: Data collected by {{agent}} needs to be routed to different {{es}} clusters or non-{{es}} destinations depending on the content
2020

2121
Example
22-
: Let’s take an example of a Windows workstation, for which we are collecting different types of logs using the System and Windows integrations. These logs need to be sent to different {{es}} clusters and to S3 for backup and a mechanism to send it to other destinations such as different SIEM solutions. In addition, the {{es}} destination is derived based on the type of datastream and an organization identifier.
22+
: Let’s take an example of a Windows workstation, for which we are collecting different types of logs using the System and Windows integrations. These logs need to be sent to different {{es}} clusters and to S3 for backup and a mechanism to send it to other destinations such as different SIEM solutions. In addition, the {{es}} destination is derived based on the type of data stream and an organization identifier.
2323

2424
In such use cases, agents send the data to {{ls}} as a routing mechanism to different destinations. The System and Windows integrations must be installed on all {{es}} clusters to which the data is routed.
2525

reference/fleet/add-cloud-metadata-processor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The metadata that is added to events varies by hosting provider. For examples, r
5353
| --- | --- | --- | --- |
5454
| `timeout` | No | `3s` | Maximum amount of time to wait for a successful response when detecting the hosting provider. If a timeout occurs, no instance metadata is added to the events. This makes it possible to enable this processor for all your deployments (in the cloud or on-premise). |
5555
| `providers` | No | | List of provider names to use. If `providers` is not configured, all providers that do not access a remote endpoint are enabled by default. The list of providers may alternatively be configured with the environment variable `BEATS_ADD_CLOUD_METADATA_PROVIDERS`, by setting it to a comma-separated list of provider names.<br><br>The list of supported provider names includes:<br><br>* `alibaba` or `ecs` for the Alibaba Cloud provider (disabled by default).<br>* `azure` for Azure Virtual Machine (enabled by default).<br>* `digitalocean` for Digital Ocean (enabled by default).<br>* `aws` or `ec2` for Amazon Web Services (enabled by default).<br>* `gcp` for Google Compute Engine (enabled by default).<br>* `openstack` or `nova` for Openstack Nova (enabled by default).<br>* `openstack-ssl` or `nova-ssl` for Openstack Nova when SSL metadata APIs are enabled (enabled by default).<br>* `tencent` or `qcloud` for Tencent Cloud (disabled by default).<br>* `huawei` for Huawei Cloud (enabled by default).<br> |
56-
| `overwrite` | No | `false` | Whether to overwrite existing cloud fields. If `true`, the processoroverwrites existing `cloud.*` fields. |
56+
| `overwrite` | No | `false` | Whether to overwrite existing cloud fields. If `true`, the processor overwrites existing `cloud.*` fields. |
5757

5858
The `add_cloud_metadata` processor supports SSL options to configure the http client used to query cloud metadata.
5959

reference/fleet/add-fleet-server-on-prem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can install only a single {{agent}} per host, which means you cannot run {{f
5555

5656
Before deploying, you need to:
5757

58-
* Obtain or generate a Cerfiticate Authority (CA) certificate.
58+
* Obtain or generate a Certificate Authority (CA) certificate.
5959
* Ensure components have access to the ports needed for communication.
6060

6161

reference/fleet/add_cloudfoundry_metadata-processor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,5 +64,5 @@ For efficient annotation, application metadata retrieved by the Cloud Foundry cl
6464
| `client_secret` | Yes | | Client Secret to authenticate with Cloud Foundry. |
6565
| `cache_duration` | No | `120s` | Maximum amount of time to cache an application’s metadata. |
6666
| `cache_retry_delay` | No | `20s` | Time to wait before trying to obtain an application’s metadata again in case of error. |
67-
| `ssl` | No | | SSL configuration to use when connecting to Cloud Foundry. For a list ofavailable settings, refer to [SSL/TLS](/reference/fleet/elastic-agent-ssl-configuration.md), specificallythe settings under [Table 7, Common configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#common-ssl-options) and [Table 8, Client configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#client-ssl-options). |
67+
| `ssl` | No | | SSL configuration to use when connecting to Cloud Foundry. For a list of available settings, refer to [SSL/TLS](/reference/fleet/elastic-agent-ssl-configuration.md), specifically the settings under [Table 7, Common configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#common-ssl-options) and [Table 8, Client configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#client-ssl-options). |
6868

reference/fleet/add_docker_metadata-processor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ If the Docker daemon is restarted, the mounted socket will become invalid, and m
7272
| Name | Required | Default | Description |
7373
| --- | --- | --- | --- |
7474
| `host` | No | `unix:///var/run/docker.sock` | Docker socket (UNIX or TCP socket). |
75-
| `ssl` | No | | SSL configuration to use when connecting to the Docker socket. For a list ofavailable settings, refer to [SSL/TLS](/reference/fleet/elastic-agent-ssl-configuration.md), specificallythe settings under [Table 7, Common configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#common-ssl-options) and [Table 8, Client configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#client-ssl-options). |
75+
| `ssl` | No | | SSL configuration to use when connecting to the Docker socket. For a list of available settings, refer to [SSL/TLS](/reference/fleet/elastic-agent-ssl-configuration.md), specifically the settings under [Table 7, Common configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#common-ssl-options) and [Table 8, Client configuration options](/reference/fleet/elastic-agent-ssl-configuration.md#client-ssl-options). |
7676
| `match_fields` | No | | List of fields to match a container ID. At least one of the fields most hold a container ID to get the event enriched. |
7777
| `match_pids` | No | `["process.pid", "process.parent.pid"]` | List of fields that contain process IDs. If the process is running in Docker, the event will be enriched. |
7878
| `match_source` | No | `true` | Whether to match the container ID from a log path present in the `log.file.path` field. |

reference/fleet/agent-command-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -464,7 +464,7 @@ elastic-agent inspect components [--show-config]
464464
: Use to display the configuration in all units.
465465

466466
`--show-spec`
467-
: Use to get input/output runtime spectification for a component.
467+
: Use to get input/output runtime specification for a component.
468468

469469

470470
`--help`

reference/fleet/certificates-rotation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ products:
88

99
# Rotate SSL/TLS CA certificates [certificates-rotation]
1010

11-
In some scenarioes you may want to rotate your configured certificate authorities (CAs), for instance if your chosen CAs are due to expire. Refer to the following steps to rotate certificates between connected components:
11+
In some scenarios you may want to rotate your configured certificate authorities (CAs), for instance if your chosen CAs are due to expire. Refer to the following steps to rotate certificates between connected components:
1212

1313
* [Rotating a {{fleet-server}} CA](#certificates-rotation-agent-fs)
1414
* [Rotating an {{es}} CA for connections from {{fleet-server}}](#certificates-rotation-fs-es)

reference/fleet/community_id-processor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,5 +53,5 @@ If the necessary fields are not present in the event, the processor silently con
5353
| --- | --- | --- | --- |
5454
| `fields` | No | | Field names that the processor reads from:<br><br>`source_ip`<br>: Field containing the source IP address.<br><br>`source_port`<br>: Field containing the source port.<br><br>`destination_ip`<br>: Field containing the destination IP address.<br><br>`destination_port`<br>: Field containing the destination port.<br><br>`iana_number`<br>: Field containing the IANA number. The following protocol numbers are currently supported: 1 ICMP, 2 IGMP, 6 TCP, 17 UDP, 47 GRE, 58 ICMP IPv6, 88 EIGRP, 89 OSPF, 103 PIM, and 132 SCTP.<br><br>`transport`<br>: Field containing the transport protocol. Used only when the `iana_number` field is not present.<br><br>`icmp_type`<br>: Field containing the ICMP type.<br><br>`icmp_code`<br>: Field containing the ICMP code.<br> |
5555
| `target` | No | | Field that the computed hash is written to. |
56-
| `seed` | No | | Seed for the community ID hash. Must be between 0 and 65535 (inclusive). Theseed can prevent hash collisions between network domains, such as a staging andproduction network that use the same addressing scheme. This setting results ina 16-bit unsigned integer that gets incorporated into all generated hashes. |
56+
| `seed` | No | | Seed for the community ID hash. Must be between 0 and 65535 (inclusive). The seed can prevent hash collisions between network domains, such as a staging and production network that use the same addressing scheme. This setting results ina 16-bit unsigned integer that gets incorporated into all generated hashes. |
5757

reference/fleet/data-streams-ilm-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ These tutorials explain how to apply a custom {{ilm-init}} policy to an integrat
1515

1616
For certain features you’ll need to use a slightly different procedure to manage the index lifecycle:
1717

18-
* APM: For verions 8.15 and later, refer to [Index lifecycle management](/solutions/observability/apm/index-lifecycle-management.md).
18+
* APM: For versions 8.15 and later, refer to [Index lifecycle management](/solutions/observability/apm/index-lifecycle-management.md).
1919
* Synthetic monitoring: Refer to [Manage data retention](/solutions/observability/synthetics/manage-data-retention.md).
2020
* Universal Profiling: Refer to [Universal Profiling index life cycle management](/solutions/observability/infra-and-hosts/universal-profiling-index-life-cycle-management.md).
2121

reference/fleet/data-streams-scenario3.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,4 +153,4 @@ To update the cloned index template:
153153
7. Move the `ecs@mappings` component template right below the `@package` component template.
154154
8. Save the index template.
155155

156-
Roll over the data stream to apply the changes.
156+
Roll over the data stream to apply the changes.

0 commit comments

Comments
 (0)