Skip to content

Commit 1ad5790

Browse files
committed
Fixing some typos
1 parent 38e6cfd commit 1ad5790

File tree

6 files changed

+9
-9
lines changed

6 files changed

+9
-9
lines changed

modules/nodes-pods-vertical-autoscaler-custom-resource.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
The Vertical Pod Autoscaler Operator (VPA) can update not only built-in resources such as deployments or stateful sets, but also custom resources that manage pods.
1010

11-
In order to use the VPA with a custom resource, when you create the the `CustomResourceDefinition` (CRD) object, you must configure the `labelSelectorPath` field in the `/scale` subresource. The `/scale` subresource creates a `Scale` object. The `labelSelectorPath` field defines the JSON path inside the custom resource that corresponds to `Status.Selector` in the `Scale` object and in the custom resource. The following is an example of a `CustomResourceDefinition` and a `CustomResource` that fulfills these requirements, along with a `VerticalPodAutoscaler` definition that targets the custom resource. The following example shows the `/scale` subresource contract.
11+
In order to use the VPA with a custom resource, when you create the `CustomResourceDefinition` (CRD) object, you must configure the `labelSelectorPath` field in the `/scale` subresource. The `/scale` subresource creates a `Scale` object. The `labelSelectorPath` field defines the JSON path inside the custom resource that corresponds to `Status.Selector` in the `Scale` object and in the custom resource. The following is an example of a `CustomResourceDefinition` and a `CustomResource` that fulfills these requirements, along with a `VerticalPodAutoscaler` definition that targets the custom resource. The following example shows the `/scale` subresource contract.
1212

1313
[NOTE]
1414
====
@@ -61,7 +61,7 @@ spec:
6161
----
6262
<1> Specifies the JSON path that corresponds to `status.selector` field of the custom resource object.
6363

64-
.Example custom CR
64+
.Example custom CR
6565
[source,yaml]
6666
----
6767
apiVersion: testing.openshift.io/v1

modules/ossm-rn-new-features-1x.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ There are manual steps that must be completed to address CVE-2021-29492 and CVE-
164164
[id="manual-updates-cve-2021-29492_{context}"]
165165
=== Manual updates required by CVE-2021-29492 and CVE-2021-31920
166166

167-
Istio contains a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (``%2F` or ``%5C`) could potentially bypass an Istio authorization policy when path-based authorization rules are used.
167+
Istio contains a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (`%2F` or `%5C`) could potentially bypass an Istio authorization policy when path-based authorization rules are used.
168168

169169
For example, assume an Istio cluster administrator defines an authorization DENY policy to reject the request at path `/admin`. A request sent to the URL path `//admin` will NOT be rejected by the authorization policy.
170170

modules/telco-observability-key-performance-metrics.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The following tables show some queries that you can explore in the metrics query
3636
[NOTE]
3737
====
3838
The URL for the console is https://<OpenShift Console FQDN>/monitoring/query-browser.
39-
You can get the Openshift Console FQDN by running the following command:
39+
You can get the OpenShift Console FQDN by running the following command:
4040
[source,terminal]
4141
----
4242
$ oc get routes -n openshift-console console -o jsonpath='{.status.ingress[0].host}'

modules/ztp-deleting-node-using-siteconfig.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ If you are working with secrets, deleting a secret too early can cause an issue
101101
Delete the secret only after the node cleanup, when the current ArgoCD synchronization is complete.
102102
====
103103

104-
.Next Steps
104+
.Next steps
105105

106106
To reprovision a node, delete the changes previously added to the `SiteConfig`, push the changes to the Git repository, and wait for the synchronization to complete.
107107
This regenerates the `BareMetalHost` CR of the worker node and triggers the re-install of the node.

observability/logging/logging-6.0/log6x-meta-contributing.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ include::_attributes/common-attributes.adoc[]
99
Do not include this file in the topic map. This is a guide meant for contributors, and is not intended to be published.
1010
====
1111

12-
Logging consists of the Red Hat Openshift Logging Operator (also known as the Cluster Logging Operator), and an accompanying log store Operator. Either the Loki Operator (current/future), or Elasticsearch (deprecated). Either vector (current/future) or fluentd (deprecated) handles log collection and aggregation. Operators use custom resources (CR) to manage applications and their components. High-level configuration and settings are provided by the user within a CR. The Operator translates high-level directives into low-level actions, based on best practices embedded within the Operator’s logic. A custom resource definition (CRD) defines a CR and lists all the configurations available to users of the Operator. Installing an Operator creates the CRDs, which are then used to generate CRs.
12+
Logging consists of the Red Hat OpenShift Logging Operator (also known as the Cluster Logging Operator), and an accompanying log store Operator. Either the Loki Operator (current/future), or Elasticsearch (deprecated). Either vector (current/future) or fluentd (deprecated) handles log collection and aggregation. Operators use custom resources (CR) to manage applications and their components. High-level configuration and settings are provided by the user within a CR. The Operator translates high-level directives into low-level actions, based on best practices embedded within the Operator’s logic. A custom resource definition (CRD) defines a CR and lists all the configurations available to users of the Operator. Installing an Operator creates the CRDs, which are then used to generate CRs.
1313

1414
== Operator CRs:
15-
* `Red Hat Openshift Logging Operator`
15+
* `Red Hat OpenShift Logging Operator`
1616
** (Deprecated) `ClusterLogging` (CL) - Deploys the collector and forwarder which currently are both implemented by a daemonset running on each node.
1717
** `ClusterLogForwarder` (CLF) - Generates collector configuration to forward logs per user configuration.
1818
* `Loki Operator`:

scalability_and_performance/index.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ To contact Red Hat support, see xref:../support/getting-support.adoc#getting-sup
1313

1414
[NOTE]
1515
====
16-
Some performance and scalability Operators have release cycles that are independent from {product-title} release cycles. For more information, see link:access.redhat.com/support/policy/updates/openshift_operators[Openshift Operators].
16+
Some performance and scalability Operators have release cycles that are independent from {product-title} release cycles. For more information, see link:access.redhat.com/support/policy/updates/openshift_operators[OpenShift Operators].
1717
====
1818

1919
[discrete]
@@ -59,4 +59,4 @@ xref:../scalability_and_performance/enabling-workload-partitioning.adoc#enabling
5959

6060
xref:../scalability_and_performance/node-observability-operator.adoc#using-node-observability-operator[Using the Node Observability Operator]
6161

62-
// endif::[]
62+
// endif::[]

0 commit comments

Comments
 (0)