Skip to content

Commit cd7d0c1

Browse files
authored
Merge pull request #48617 from bergerhoffer/4.11typocheck
Typo fixes
2 parents 906cc9d + 78803ce commit cd7d0c1

27 files changed

+66
-70
lines changed

authentication/using-service-accounts-in-applications.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,8 @@ include::modules/service-accounts-default.adoc[leveloffset=+1]
1616

1717
* For information about requesting bound service account tokens, see xref:../authentication/bound-service-account-tokens.html#bound-sa-tokens-configuring_bound-service-account-tokens[Configuring bound service account tokens using volume projection]
1818
19-
* For information about creating a service account token secret, see see xref:../nodes/pods/nodes-pods-secrets.html#nodes-pods-secrets-creating-sa_nodes-pods-secrets[Creating a service account token secret].
19+
* For information about creating a service account token secret, see xref:../nodes/pods/nodes-pods-secrets.html#nodes-pods-secrets-creating-sa_nodes-pods-secrets[Creating a service account token secret].
2020
2121
include::modules/service-accounts-creating.adoc[leveloffset=+1]
2222

2323
// include::modules/service-accounts-using-credentials-inside-a-container.adoc[leveloffset=+1]
24-

cicd/pipelines/creating-applications-with-cicd-pipelines.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ include::modules/op-enabling-monitoring-of-event-listeners-for-triggers-for-user
7676
[id="pipeline-addtl-resources"]
7777
== Additional resources
7878

79-
* To include pipelines as code along with with the application source code in the same repository, see xref:../../cicd/pipelines/using-pipelines-as-code.adoc#using-pipelines-as-code[Using Pipelines as code].
79+
* To include pipelines as code along with the application source code in the same repository, see xref:../../cicd/pipelines/using-pipelines-as-code.adoc#using-pipelines-as-code[Using Pipelines as code].
8080
* For more details on pipelines in the *Developer* perspective, see the xref:../../cicd/pipelines/working-with-pipelines-using-the-developer-perspective.adoc#working-with-pipelines-using-the-developer-perspective[working with pipelines in the *Developer* perspective] section.
8181
* To learn more about Security Context Constraints (SCCs), see the xref:../../authentication/managing-security-context-constraints.adoc#managing-pod-security-policies[Managing Security Context Constraints] section.
8282
* For more examples of reusable tasks, see the link:https://github.com/openshift/pipelines-catalog[OpenShift Catalog] repository. Additionally, you can also see the Tekton Catalog in the Tekton project.

logging/troubleshooting/cluster-logging-troubleshooting-for-critical-alerts.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ oc -n openshift-logging get pods -l component=elasticsearch
4040

4141
. If some of the Elasticsearch nodes have not joined the cluster, perform the following steps.
4242

43-
.. Confirm that Elasticsearch has an elected master node.
43+
.. Confirm that Elasticsearch has an elected control plane node.
4444
+
4545
[source,terminal]
4646
----
4747
oc exec -n openshift-logging -c elasticsearch <elasticsearch_pod_name> -- es_util --query=_cat/master?v
4848
----
4949

50-
.. Review the pod logs of the elected master node for issues.
50+
.. Review the pod logs of the elected control plane node for issues.
5151
+
5252
[source,terminal]
5353
----

modules/cnf-topology-aware-lifecycle-manager-troubleshooting.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ For more information about related topics, see the following documentation:
2222

2323
You can determine the cause of the problem by reviewing the following questions:
2424

25-
* Is the configuration that you are applying supported?
26-
** Are the {rh-rhacm} and the {product-title} versions compatible?
25+
* Is the configuration that you are applying supported?
26+
** Are the {rh-rhacm} and the {product-title} versions compatible?
2727
** Are the {cgu-operator} and {rh-rhacm} versions compatible?
2828
* Which of the following components is causing the problem?
2929
** <<talo-troubleshooting-managed-policies_{context}>>
@@ -33,15 +33,15 @@ You can determine the cause of the problem by reviewing the following questions:
3333

3434
To ensure that the `ClusterGroupUpgrade` configuration is functional, you can do the following:
3535

36-
. Create the `ClusterGroupUpgrade` CR with the `spec.enable` field set to `false`.
36+
. Create the `ClusterGroupUpgrade` CR with the `spec.enable` field set to `false`.
3737

38-
. Wait for the status to be updated and go through the troubleshooting questions.
38+
. Wait for the status to be updated and go through the troubleshooting questions.
3939

4040
. If everything looks as expected, set the `spec.enable` field to `true` in the `ClusterGroupUpgrade` CR.
4141

4242
[WARNING]
4343
====
44-
After you set the `spec.enable` field to `true` in the `ClusterUpgradeGroup` CR , the update procedure starts and you cannot edit the CR's `spec` fields anymore.
44+
After you set the `spec.enable` field to `true` in the `ClusterUpgradeGroup` CR, the update procedure starts and you cannot edit the CR's `spec` fields anymore.
4545
====
4646

4747
[id="talo-troubleshooting-modify-cgu_{context}"]
@@ -51,7 +51,7 @@ Issue:: You cannot edit the `ClusterUpgradeGroup` CR after enabling the update.
5151

5252
Resolution:: Restart the procedure by performing the following steps:
5353
+
54-
. Remove the old `ClusterGroupUpgrade` CR by running the following command:
54+
. Remove the old `ClusterGroupUpgrade` CR by running the following command:
5555
+
5656
[source,terminal]
5757
----
@@ -117,7 +117,7 @@ default policy4-common-sriov-sub-policy inform
117117
[discrete]
118118
== Checking policy compliance state
119119

120-
Issue:: You want to check the compliance state of policies.
120+
Issue:: You want to check the compliance state of policies.
121121

122122
Resolution:: Run the following command:
123123
+

modules/dr-restoring-cluster-state.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ If the status is `Pending`, or the output lists more than one running etcd pod,
292292
For bare metal installations on installer-provisioned infrastructure, control plane machines are not recreated. For more information, see "Replacing a bare-metal control plane node".
293293
====
294294
+
295-
If you are running installer-provisioned infrastructure, or you used the Machine API to create your machines, follow these steps. Otherwise, you must create the new master node using the same method that was used to originally create it.
295+
If you are running installer-provisioned infrastructure, or you used the Machine API to create your machines, follow these steps. Otherwise, you must create the new control plane node using the same method that was used to originally create it.
296296
+
297297
[WARNING]
298298
====

modules/installation-configuration-parameters.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1284,7 +1284,7 @@ Additional {rh-virtualization} configuration parameters for machine pools are de
12841284
|Number
12851285

12861286
|`<machine-pool>.platform.ovirt.vmType`
1287-
|Optional. The VM workload type, such as `high-performance`, `server`, or `desktop`. By default, master nodes use `high-performance`, and worker nodes use `server`. For details, see link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Virtual_Machine_General_settings_explained[Explanation of Settings in the New Virtual Machine and Edit Virtual Machine Windows] and link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Configuring_High_Performance_Virtual_Machines_Templates_and_Pools[Configuring High Performance Virtual Machines, Templates, and Pools] in the _Virtual Machine Management Guide_.
1287+
|Optional. The VM workload type, such as `high-performance`, `server`, or `desktop`. By default, control plane nodes use `high-performance`, and worker nodes use `server`. For details, see link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Virtual_Machine_General_settings_explained[Explanation of Settings in the New Virtual Machine and Edit Virtual Machine Windows] and link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Configuring_High_Performance_Virtual_Machines_Templates_and_Pools[Configuring High Performance Virtual Machines, Templates, and Pools] in the _Virtual Machine Management Guide_.
12881288
[NOTE]
12891289
====
12901290
`high_performance` improves performance on the VM, but there are limitations. For example, you cannot access the VM with a graphical console. For more information, see link:https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/virtual_machine_management_guide/index#Configuring_High_Performance_Virtual_Machines_Templates_and_Pools[Configuring High Performance Virtual Machines, Templates, and Pools] in the _Virtual Machine Management Guide_.

modules/installation-nutanix-installer-infra-reqs.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You must use AHV IP Address Management (IPAM) for the network and ensure that it
4444

4545
[NOTE]
4646
====
47-
It is recommended that each {product-title} node in the cluster have access to a Network Time Protocol (NTP) server that is discoverable via DHCP. Installation is possible without an NTP server. However, an NTP server prevents errors typically assoicated with asynchronous server clocks.
47+
It is recommended that each {product-title} node in the cluster have access to a Network Time Protocol (NTP) server that is discoverable via DHCP. Installation is possible without an NTP server. However, an NTP server prevents errors typically associated with asynchronous server clocks.
4848
====
4949

5050
[id="installation-nutanix-installer-infra-reqs-_{context}"]

modules/ldap-failover-configure-openshift.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
= Configuring {product-title} to use SSSD as the basic remote authentication server
77

88
Modify the default configuration of your cluster to use the new identity
9-
provider that you created. Complete the following steps on the first master host
9+
provider that you created. Complete the following steps on the first control plane host
1010
listed in the Ansible host inventory file.
1111

1212
.Procedure

modules/mirror-registry-release-notes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77

88
The _mirror registry for Red Hat OpenShift_ is a small and streamlined container registry that you can use as a target for mirroring the required container images of {product-title} for disconnected installations.
99

10-
These release notes track the development of the _mirror registry for Red Hat Openshift_ in {product-title}.
10+
These release notes track the development of the _mirror registry for Red Hat OpenShift_ in {product-title}.
1111

1212
For an overview of the _mirror registry for Red Hat OpenShift_, see xref:../../installing/disconnected_install/installing-mirroring-creating-registry.html#mirror-registry-flags_installing-mirroring-creating-registry[Creating a mirror registry with mirror registry for Red Hat OpenShift].
1313

modules/monitoring-supported-remote-write-authentication-settings.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You cannot use this method simultaneously with authorization, OAuth 2.0, or basi
2222

2323
|authorization|`authorization`|Authorization sets the `Authorization` header on every remote write request using the configured token.
2424

25-
|OAuth 2.0|`oauth2`|An OAuth 2.0 configuration uses the client credentials grant type.
25+
|OAuth 2.0|`oauth2`|An OAuth 2.0 configuration uses the client credentials grant type.
2626
Prometheus fetches an access token from `tokenUrl` with the specified client ID and client secret to access the remote write endpoint.
2727
You cannot use this method simultaneously with authorization, AWS Signature Version 4, or basic authentication.
2828

@@ -50,12 +50,12 @@ data:
5050
----
5151
<1> The URL of the remote write endpoint.
5252
<2> The required configuration details for the authentication method for the endpoint.
53-
Currently supported authentication methods are Amazon Web Services (AWS) Signature Version 4, authorization, basic authentication, OAuth 2.0, and TLS client.
53+
Currently supported authentication methods are Amazon Web Services (AWS) Signature Version 4, authorization, basic authentication, OAuth 2.0, and TLS client.
5454

5555
[NOTE]
5656
====
5757
If you configure remote write for the Prometheus instance that monitors user-defined projects, edit the `user-workload-monitoring-config` config map in the `openshift-user-workload-monitoring` namespace.
58-
Note that the Prometheus config map component is called `prometheus` in the `user-workload-monitoring-config` `ConfigMap` object and not `prometheusK8s`, as it is in the `cluster-monitoring-config` `ConfigMap` object.
58+
Note that the Prometheus config map component is called `prometheus` in the `user-workload-monitoring-config` `ConfigMap` object and not `prometheusK8s`, as it is in the `cluster-monitoring-config` `ConfigMap` object.
5959
====
6060

6161
== Example remote write authentication settings
@@ -111,13 +111,13 @@ data:
111111
<1> The AWS region.
112112
<2> The name of the `Secret` object containing the AWS API access credentials.
113113
<3> The key that contains the AWS API access key in the specified `Secret` object.
114-
<4> The key that contains teh AWS API secret key in the specified `Secret` object.
114+
<4> The key that contains the AWS API secret key in the specified `Secret` object.
115115
<5> The name of the AWS profile that is being used to authenticate.
116116
<6> The unique identifier for the Amazon Resource Name (ARN) assigned to your role.
117117

118118
.Sample YAML for basic authentication
119119

120-
The following shows sample basic authentication settings for a `Secret` object named `rw-basic-auth` in the `openshift-monitoring` namespace:
120+
The following shows sample basic authentication settings for a `Secret` object named `rw-basic-auth` in the `openshift-monitoring` namespace:
121121

122122
[source,yaml]
123123
----
@@ -135,7 +135,7 @@ type: Opaque
135135
<2> The password.
136136

137137
The following sample shows a `basicAuth` remote write configuration that uses a `Secret` object named `rw-basic-auth` in the `openshift-monitoring` namespace.
138-
It assumes that you have already set up authentication credentials for the endpoint.
138+
It assumes that you have already set up authentication credentials for the endpoint.
139139

140140
[source,yaml]
141141
----
@@ -277,7 +277,7 @@ data:
277277
client.key: <client_key> <3>
278278
type: tls
279279
----
280-
<1> The CA certificate in the Prometheus container with which to validate the server certificate.
280+
<1> The CA certificate in the Prometheus container with which to validate the server certificate.
281281
<2> The client certificate for authentication with the server.
282282
<3> The client key.
283283

@@ -311,4 +311,4 @@ data:
311311
<1> The name of the corresponding `Secret` object that contains the TLS authentication credentials. Note that `ca` and `cert` can alternatively refer to a `ConfigMap` object, though `keySecret` must refer to a `Secret` object.
312312
<2> The key in the specified `Secret` object that contains the CA certificate for the endpoint.
313313
<3> The key in the specified `Secret` object that contains the client certificate for the endpoint.
314-
<4> The key in the specified `Secret` object that contains the client key secret.
314+
<4> The key in the specified `Secret` object that contains the client key secret.

0 commit comments

Comments
 (0)