Skip to content

Commit ac28280

Browse files
committed
Fixing a few typos
1 parent 9b7265e commit ac28280

File tree

6 files changed

+26
-27
lines changed

6 files changed

+26
-27
lines changed

cloud_experts_tutorials/cloud-experts-entra-id-idp.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ toc::[]
1616
// - Paul Czarkowski
1717
// ---
1818

19-
This tutorial demonstrates how to configure Microsoft Entra ID (formerly Azure Active Directory) as the cluster identity provider in {product-title} (ROSA). This tutorial walks through the creation of an Microsoft Entra ID (Entra ID) application and configure Red Hat OpenShift Service on AWS (ROSA) to authenticate using Azure AD.
19+
This tutorial demonstrates how to configure Microsoft Entra ID (formerly Azure Active Directory) as the cluster identity provider in {product-title} (ROSA). This tutorial walks through the creation of an Microsoft Entra ID (Entra ID) application and configure Red Hat OpenShift Service on AWS (ROSA) to authenticate using Azure AD.
2020

2121
This tutorial walks through the following steps:
2222

@@ -37,7 +37,7 @@ Create a set of security groups and assign users by following link:https://learn
3737
+
3838
First, construct the cluster's OAuth callback URL and make note of it. To do so, run the following command, making sure to replace the variable specified:
3939
+
40-
The "AAD" directory at the end of the the OAuth callback URL should match the OAuth identity provider name you'll setup later.
40+
The "AAD" directory at the end of the OAuth callback URL should match the OAuth identity provider name you'll setup later.
4141
+
4242
[source,terminal]
4343
----
@@ -85,7 +85,7 @@ image:azure-portal_add-optional-claims-graph-permissions-prompt.png[Azure Portal
8585
[id="rosa-mobb-entra-id-configure-group-claims"]
8686
== Configure group claims (optional)
8787

88-
In addition to individual user authentication, OpenShift provides group claim functionality. This functionality allows an OpenID Connect identity provider, like Entra ID, to offer a user’s group membership for use within OpenShift. To enable group claims, we will configure Entra ID to provide a groups claim.
88+
In addition to individual user authentication, OpenShift provides group claim functionality. This functionality allows an OpenID Connect identity provider, like Entra ID, to offer a user’s group membership for use within OpenShift. To enable group claims, we will configure Entra ID to provide a groups claim.
8989

9090
Next, select the "Add groups claim" button.
9191

@@ -129,8 +129,8 @@ $ rosa create idp \
129129
--cluster ${CLUSTER_NAME} \
130130
--type openid \
131131
--name ${IDP_NAME} \
132-
--client-id ${APP_ID} \
133-
--client-secret ${CLIENT_SECRET} \
132+
--client-id ${APP_ID} \
133+
--client-secret ${CLIENT_SECRET} \
134134
--issuer-url https://login.microsoftonline.com/${TENANT_ID}/v2.0 \
135135
--email-claims email \
136136
--name-claims name \
@@ -147,8 +147,8 @@ $ rosa create idp \
147147
--cluster ${CLUSTER_NAME} \
148148
--type openid \
149149
--name ${IDP_NAME} \
150-
--client-id ${APP_ID} \
151-
--client-secret ${CLIENT_SECRET} \
150+
--client-id ${APP_ID} \
151+
--client-secret ${CLIENT_SECRET} \
152152
--issuer-url https://login.microsoftonline.com/${TENANT_ID}/v2.0 \
153153
--email-claims email \
154154
--name-claims name \
@@ -159,7 +159,7 @@ $ rosa create idp \
159159
[id="rosa-mobb-azure-oidc-grant-permissions"]
160160
== Grant additional permissions to individual users
161161

162-
Once the cluster authentication Operator reconciles your changes (generally within a few minutes), you will be able to log in to the cluster using Entra ID.
162+
Once the cluster authentication Operator reconciles your changes (generally within a few minutes), you will be able to log in to the cluster using Entra ID.
163163

164164
Once you log in, you will notice that you have very limited permissions. This is because, by default, OpenShift only grants you the ability to create new projects (namespaces) in the cluster. Other projects (namespaces) are restricted from view.
165165

@@ -194,4 +194,4 @@ $ oc create clusterrolebinding cluster-admin-group \
194194

195195
Now, any user in the specified group will automatically be granted `cluster-admin` access.
196196

197-
For more information on how to use RBAC to define and apply permissions in OpenShift, see link:https://docs.openshift.com/container-platform/latest/authentication/using-rbac.html[the OpenShift documentation].
197+
For more information on how to use RBAC to define and apply permissions in OpenShift, see link:https://docs.openshift.com/container-platform/latest/authentication/using-rbac.html[the OpenShift documentation].

modules/installing-gcp-user-defined-labels-and-tags.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@
88
:FeatureName: Support for user-defined labels and tags for GCP
99
include::snippets/technology-preview.adoc[]
1010

11-
Google Cloud Platform (GCP) provides labels and tags that help to identify and organize the resources created for a specific {product-title} cluster, making them easier to manage.
11+
Google Cloud Platform (GCP) provides labels and tags that help to identify and organize the resources created for a specific {product-title} cluster, making them easier to manage.
1212

13-
You can define labels and tags for each GCP resource only during {product-title} cluster installation.
13+
You can define labels and tags for each GCP resource only during {product-title} cluster installation.
1414

1515
[IMPORTANT]
1616
====
@@ -19,7 +19,7 @@ User-defined labels and tags are not supported for {product-title} clusters upgr
1919

2020
.User-defined labels
2121

22-
User-defined labels and {product-title} specific labels are applied only to resources created by {product-title} installation program and its core components such as:
22+
User-defined labels and {product-title} specific labels are applied only to resources created by {product-title} installation program and its core components such as:
2323

2424
* GCP filestore CSI Driver Operator
2525
* GCP PD CSI Driver Operator
@@ -46,7 +46,7 @@ User-defined labels and {product-title} labels are available on the following GC
4646

4747
User-defined tags are attached to resources created by the {product-title} Image Registry Operator and not on the resources created by any other Operators or the Kubernetes in-tree components.
4848

49-
User-defined tags are available on on the following GCP resources:
49+
User-defined tags are available on the following GCP resources:
5050
* Storage bucket
5151

5252
.Limitations to the user-defined tags
@@ -57,7 +57,7 @@ User-defined tags are available on on the following GCP resources:
5757
** Filestore instance resources created by the GCP filestore CSI driver Operator
5858
** Compute disk and compute image resources created by the GCP PD CSI driver Operator
5959
* Tags are not supported for buckets located in the following regions:
60-
** `us-east2`
60+
** `us-east2`
6161
** `us-east3`
6262
* Image Registry Operator does not throw any error but skips processing tags when the buckets are created in the tags unsupported region.
6363
* Tags must not be restricted to particular service accounts, because Operators create and use service accounts with minimal roles.

modules/microshift-preparing-to-make-app-rpms.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="microshift-preparing-to-make-app-rpms_{context}"]
77
= Preparing to make application RPMs
88

9-
To build your own RPMs, choose a tool of your choice, such as the the `rpmbuild` tool, and initialize the RPM build tree in your home directory. The following is an example procedure. As long as your RPMs are accessible to Image Builder, you can use the method you prefer to build the application RPMs.
9+
To build your own RPMs, choose a tool of your choice, such as the `rpmbuild` tool, and initialize the RPM build tree in your home directory. The following is an example procedure. As long as your RPMs are accessible to Image Builder, you can use the method you prefer to build the application RPMs.
1010

1111
.Prerequisites
1212

@@ -43,4 +43,3 @@ $ ls ~/rpmbuild/
4343
----
4444
BUILD RPMS SOURCES SPECS SRPMS
4545
----
46-

modules/mirror-registry-ssl-cert-replace.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,19 @@
44

55
:_content-type: PROCEDURE
66
[id="mirror-registry-ssl-cert-replace_{context}"]
7-
= Replacing mirror registry for Red Hat OpenShift SSL/TLS certificates
7+
= Replacing mirror registry for Red Hat OpenShift SSL/TLS certificates
88

9-
In some cases, you might want to update your SSL/TLS certificates for the the _mirror registry for Red Hat OpenShift_. This is useful in the following scenarios:
9+
In some cases, you might want to update your SSL/TLS certificates for the _mirror registry for Red Hat OpenShift_. This is useful in the following scenarios:
1010

1111
* If you are replacing the current _mirror registry for Red Hat OpenShift_ certificate.
12-
* If you are using the same certificate as the previous _mirror registry for Red Hat OpenShift_ installation.
13-
* If you are periodically updating the _mirror registry for Red Hat OpenShift_ certificate.
12+
* If you are using the same certificate as the previous _mirror registry for Red Hat OpenShift_ installation.
13+
* If you are periodically updating the _mirror registry for Red Hat OpenShift_ certificate.
1414
1515
Use the following procedure to replace _mirror registry for Red Hat OpenShift_ SSL/TLS certificates.
1616

17-
.Prerequisites
17+
.Prerequisites
1818

19-
* You have downloaded the `./mirror-registry` binary from the link:https://console.redhat.com/openshift/downloads#tool-mirror-registry[OpenShift console *Downloads*] page.
19+
* You have downloaded the `./mirror-registry` binary from the link:https://console.redhat.com/openshift/downloads#tool-mirror-registry[OpenShift console *Downloads*] page.
2020
2121
.Procedure
2222

@@ -29,7 +29,7 @@ $ ./mirror-registry install \
2929
--quayRoot <example_directory_name>
3030
----
3131
+
32-
This installs the _mirror registry for Red Hat OpenShift_ to the `$HOME/quay-install` directory.
32+
This installs the _mirror registry for Red Hat OpenShift_ to the `$HOME/quay-install` directory.
3333

3434
. Prepare a new certificate authority (CA) bundle and generate new `ssl.key` and `ssl.crt` key files. For more information, see link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/deploy_red_hat_quay_for_proof-of-concept_non-production_purposes/index#introduction-using-ssl[Using SSL/TLS].
3535

@@ -58,5 +58,5 @@ $ cp ~/ssl.key $QUAY/quay-config
5858
+
5959
[source,terminal]
6060
----
61-
$ systemctl restart quay-app
61+
$ systemctl restart quay-app
6262
----

modules/ovn-kubernetes-architecture-con.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,6 @@ The OVN northbound database contains the current desired state of the network, p
2222
The `ovn-northd` (`northd` container) connects to the OVN northbound database and the OVN southbound database.
2323
It translates the logical network configuration in terms of conventional network concepts, taken from the OVN northbound database, into logical data path flows in the OVN southbound database.
2424

25-
The OVN southbound database has physical and logical representations of the network and binding tables that link them together. It contains the chassis information of the node and other constructs like remote transit switch ports that are required to to connect to the other nodes in the cluster. The OVN southbound database also contains all the logic flows. The logic flows are shared with the `ovn-controller` process that runs on each node and the `ovn-controller` turns those into `OpenFlow` rules to program `Open vSwitch`(OVS).
25+
The OVN southbound database has physical and logical representations of the network and binding tables that link them together. It contains the chassis information of the node and other constructs like remote transit switch ports that are required to connect to the other nodes in the cluster. The OVN southbound database also contains all the logic flows. The logic flows are shared with the `ovn-controller` process that runs on each node and the `ovn-controller` turns those into `OpenFlow` rules to program `Open vSwitch`(OVS).
2626

27-
The Kubernetes control plane nodes each contain an `ovnkube-control-plane` pod which does the central IP address management (IPAM) allocation for each node in the cluster. At any given time a single `ovnkube-control-plane` pod is the leader.
27+
The Kubernetes control plane nodes each contain an `ovnkube-control-plane` pod which does the central IP address management (IPAM) allocation for each node in the cluster. At any given time a single `ovnkube-control-plane` pod is the leader.

windows_containers/creating_windows_machinesets/creating-windows-machineset-aws.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ You can create a Windows `MachineSet` object to serve a specific purpose in your
1414
* You installed the Windows Machine Config Operator (WMCO) using Operator Lifecycle Manager (OLM).
1515
* You are using a supported Windows Server as the operating system image.
1616
+
17-
Use one of the the following `aws` commands, as appropriate for your Windows Server release, to query valid AMI images:
17+
Use one of the following `aws` commands, as appropriate for your Windows Server release, to query valid AMI images:
1818
+
1919
.Example Windows Server 2022 command
2020
+

0 commit comments

Comments
 (0)