Skip to content

Commit 37cd7d2

Browse files
authored
Merge pull request #71964 from bergerhoffer/main-typos
Fixing some typos in main
2 parents 2a0d149 + 866bcb7 commit 37cd7d2

13 files changed

+18
-20
lines changed

backup_and_restore/application_backup_and_restore/oadp-rosa/oadp-rosa-backing-up-applications.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ You can subscribe to the service directly from your {aws-short} account.
1616

1717
After you create your clusters, you can operate your clusters with the {product-title} web console or through link:https://docs.openshift.com/dedicated/ocm/ocm-overview.html[{cluster-manager-first}]. You can also use ROSA with OpenShift APIs and command-line interface (CLI) tools.
1818

19-
For additional information about ROSA installation, see link:https://www.redhat.com/en/products/interactive-walkthrough/install-rosa[Installing Red Hat Openshift Service on AWS (ROSA) interactive walkthrough].
19+
For additional information about ROSA installation, see link:https://www.redhat.com/en/products/interactive-walkthrough/install-rosa[Installing Red Hat OpenShift Service on AWS (ROSA) interactive walkthrough].
2020

2121
Before installing {oadp-first}, you must set up role and policy credentials for OADP so that it can use the {aws-full} API.
2222

@@ -39,4 +39,3 @@ include::modules/installing-oadp-rosa-sts.adoc[leveloffset=+1]
3939
4040
include::modules/performing-a-backup-oadp-rosa-sts.adoc[leveloffset=+2]
4141
include::modules/cleanup-a-backup-oadp-rosa-sts.adoc[leveloffset=+2]
42-

cloud_experts_tutorials/cloud-experts-getting-started/cloud-experts-getting-started-setup.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ toc::[]
99
//rosaworkshop.io content metadata
1010
//Brought into ROSA product docs 2023-11-13
1111

12-
There are currently two supported credential methods when creating a {product-title} (ROSA) cluster. One method uses an IAM user with the `AdministratorAccess` policy. The second and *recommended* method uses Amazon Web Services (AWS) Security Token Service (STS).
12+
There are currently two supported credential methods when creating a {product-title} (ROSA) cluster. One method uses an IAM user with the `AdministratorAccess` policy. The second and *recommended* method uses Amazon Web Services (AWS) Security Token Service (STS).
1313
//To be added when the ROSA with STS Explained tutorial is published:
1414
//For more information, see the xref../cloud_experts_tutorials/cloud_experts_rosa_with_sts_explained.adoc#id[ROSA with STS Explained] tutorial. This workshop uses the STS method.
1515

@@ -69,7 +69,7 @@ There are a few ways to install the OpenShift CLI (`oc`):
6969
* *Option 1: Using the ROSA CLI:*
7070
.. Run `rosa download oc`.
7171
.. Once downloaded, unzip the file and move the executables into a directory in your `PATH`.
72-
* *Option 2: Using the Openshift documentation:*
72+
* *Option 2: Using the OpenShift documentation:*
7373
.. Follow the directions on the xref:../../cli_reference/openshift_cli/getting-started-cli.adoc#installing-openshift-cli[documentation page]
7474
* *Option 3: Using your OpenShift cluster:*
7575
.. If you already have an OpenShift cluster, you can access the CLI tools page by clicking the *Question mark*, then *Command Line Tools*.
@@ -106,7 +106,7 @@ Verify that the configuration is correct by following these steps:
106106
. Run the following command to query the AWS API:
107107
+
108108
[source,terminal]
109-
----
109+
----
110110
aws sts get-caller-identity
111111
----
112112
. You should see a table or JSON file. Verify that the account information is correct.
@@ -188,7 +188,7 @@ OCM Organization External ID: 0000000
188188
. Check the information for accuracy before proceeding.
189189
190190
== Verifying quota
191-
Verify that your AWS account has ample quota in the region in which you will be deploying your cluster.
191+
Verify that your AWS account has ample quota in the region in which you will be deploying your cluster.
192192
193193
* Run the following command:
194194
+
@@ -229,4 +229,4 @@ You have now successfully set up you account and environment. You are ready to d
229229
230230
//*[ROSA]: Red Hat OpenShift Service on AWS
231231
//*[STS]: AWS Security Token Service
232-
//*[OCM]: OpenShift Cluster Manager
232+
//*[OCM]: OpenShift Cluster Manager

modules/log-collector-resources-scheduling.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
Administrators can modify the resources or scheduling of the collector by creating a `ClusterLogging` custom resource (CR) that is in the same namespace and has the same name as the `ClusterLogForwarder` CR that it supports.
1010

11-
The applicable stanzas for the `ClusterLogging` CR when using multiple log forwarders in a deployment are `managmentState` and `collection`. All other stanzas are ignored.
11+
The applicable stanzas for the `ClusterLogging` CR when using multiple log forwarders in a deployment are `managementState` and `collection`. All other stanzas are ignored.
1212

1313
.Prerequisites
1414

modules/microshift-nw-topology.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
= Network topology
88
OVN-Kubernetes provides an overlay-based networking implementation. This overlay includes an OVS-based implementation of Service and NetworkPolicy. The overlay network uses the Geneve (Generic Network Virtualization Encapsulation) tunnel protocol. The pod maximum transmission unit (MTU) for the Geneve tunnel is set to the default route MTU if it is not configured.
99

10-
To configure the MTU, you must must set an equal-to or less-than value than the MTU of the physical interface on the host. A less-than value for the MTU makes room for the required information that is added to the tunnel header before it is transmitted.
10+
To configure the MTU, you must set an equal-to or less-than value than the MTU of the physical interface on the host. A less-than value for the MTU makes room for the required information that is added to the tunnel header before it is transmitted.
1111

1212
OVS runs as a systemd service on the {microshift-short} node. The OVS RPM package is installed as a dependency to the `microshift-networking` RPM package. OVS is started immediately when the `microshift-networking` RPM is installed.
1313

modules/nw-secondary-ext-gw-about.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="nw-secondary-ext-gw-about_{context}"]
77
= How {product-title} determines the external gateway IP address
88

9-
You configure a secondary external gateway with the `AdminPolicyBasedExternalRoute` custom resource (CR) from the the `k8s.ovn.org` API group. The CR supports static and dynamic approaches to specifying an external gateway's IP address.
9+
You configure a secondary external gateway with the `AdminPolicyBasedExternalRoute` custom resource (CR) from the `k8s.ovn.org` API group. The CR supports static and dynamic approaches to specifying an external gateway's IP address.
1010

1111
Each namespace that a `AdminPolicyBasedExternalRoute` CR targets cannot be selected by any other `AdminPolicyBasedExternalRoute` CR. A namespace cannot have concurrent secondary external gateways.
1212

modules/nw-secondary-ext-gw-configure.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ ns1 pod1 1/1 Running 1 (37m ago) 41m 10.130.0.8 node1
8787

8888
. Confirm that the IP address from the previous step is available as an external gateway.
8989

90-
.. To find the the OVN-Kubernetes control plane pod that manages the next hop for the pod, enter the following command:
90+
.. To find the OVN-Kubernetes control plane pod that manages the next hop for the pod, enter the following command:
9191
+
9292
[source,terminal]
9393
----

modules/oadp-installing-oadp-rosa-sts.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ $ oc -n openshift-adp create secret generic cloud-credentials \
6161
====
6262
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized STS workflow through the Operator Lifecycle Manager (OLM)
6363
and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above
64-
secret, you only need to supply the role ARN during link:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.13/html/operators/user-tasks#olm-installing-from-operatorhub-using-web-console_olm-installing-operators-in-namespace[the installation of OLM-managed operators via the the {product-title} web console].
64+
secret, you only need to supply the role ARN during link:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.13/html/operators/user-tasks#olm-installing-from-operatorhub-using-web-console_olm-installing-operators-in-namespace[the installation of OLM-managed operators via the {product-title} web console].
6565
The above secret is created automatically via CCO.
6666
====
6767

@@ -162,4 +162,4 @@ restic:
162162
[NOTE]
163163
====
164164
If you want to use two different clusters for backing up and restoring, the two clusters must have identical AWS S3 storage names in both the cloudstorage CR and the OADP `DataProtectionApplication` configuration.
165-
====
165+
====

modules/olmv1-adding-a-catalog.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ spec:
3939
----
4040
<1> Specify the catalog's image in the `spec.source.image` field.
4141
<2> If your catalog is hosted on a secure registry, such as `registry.redhat.io`, you must create a pull secret scoped to the `openshift-catalog` namespace.
42-
<3> Specify the interval for polling the remote registry for newer image digests. The default value is `24h`. Valid units include seconds (`s`), minutes (`m`), and and hours (`h`). To disable polling, set a zero value, such as `0s`.
42+
<3> Specify the interval for polling the remote registry for newer image digests. The default value is `24h`. Valid units include seconds (`s`), minutes (`m`), and hours (`h`). To disable polling, set a zero value, such as `0s`.
4343

4444
. Add the catalog to your cluster by running the following command:
4545
+

modules/otel-configuring-otelcol-metrics.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ You can enable metrics and alerts of OpenTelemetry Collector instances.
1414
1515
.Procedure
1616

17-
* To enable metrics of a OpenTelemetry Collector instance, set the `spec.observability.metrics.enableMetrics` field to `true`:
17+
* To enable metrics of an OpenTelemetry Collector instance, set the `spec.observability.metrics.enableMetrics` field to `true`:
1818
+
1919
[source,yaml]
2020
----

modules/rosa-hcp-aws-privatelink-security-groups.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,11 +56,11 @@ $ export SG_ID=$(aws ec2 create-security-group --description "Granting API acces
5656
$ aws ec2 authorize-security-group-ingress --group-id $SG_ID --ip-permissions FromPort=443,ToPort=443,IpProtocol=tcp,IpRanges=[{CidrIp=0.0.0.0/0}]
5757
----
5858

59-
. Add the the new security group to the VPCE by running the following command:
59+
. Add the new security group to the VPCE by running the following command:
6060
+
6161
[source,terminal]
6262
----
6363
$ aws ec2 modify-vpc-endpoint --vpc-endpoint-id $VPCE_ID --add-security-group-ids $SG_ID
6464
----
6565

66-
You now can access the API with your {hcp-title} private cluster.
66+
You now can access the API with your {hcp-title} private cluster.

0 commit comments

Comments
 (0)