Skip to content

Commit e726770

Browse files
authored
Merge pull request #37195 from bergerhoffer/typo-fixes
Fixing some typos
2 parents 4aaa5c1 + 128cba4 commit e726770

8 files changed

+19
-19
lines changed

modules/cluster-logging-collector-log-forward-es.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ You can use a secret that contains a username and password to authenticate a sec
8888

8989
For example, if you cannot use mutual TLS (mTLS) keys because a third party operates the Elasticsearch instance, you can use HTTP or HTTPS and set a secret that contains the username and password.
9090

91-
. Create a `Secret` YAML file similar to the following example. Use base64-encoded values for the the `username` and `password` fields. The secret type is opaque by default.
91+
. Create a `Secret` YAML file similar to the following example. Use base64-encoded values for the `username` and `password` fields. The secret type is opaque by default.
9292
+
9393
[source,yaml]
9494
----

modules/create-a-kubeletconfig-crd-to-edit-kubelet-parameters.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ The kubelet configuration is currently serialized as an Ignition configuration,
1111

1212
[NOTE]
1313
====
14-
As the fields in the `kubletConfig` object are passed directly to the kubelet from upstream Kubernetes, the kubelet validates those values directly. Invalid values in the `kubeletConfig` object might cause cluster nodes to become unavailable. For valid values, see the link:https://kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/[Kubernetes documentation].
14+
As the fields in the `kubeletConfig` object are passed directly to the kubelet from upstream Kubernetes, the kubelet validates those values directly. Invalid values in the `kubeletConfig` object might cause cluster nodes to become unavailable. For valid values, see the link:https://kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/[Kubernetes documentation].
1515
====
1616

1717
Consider the following guidance:

modules/manually-maintained-credentials-upgrade.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ It may take several minutes after adding the annotation for the upgradeable stat
5757

5858
. Verify that the CCO is upgradeable:
5959

60-
.. In the the *Administrator* perspective of the web console, navigate to *Administration* -> *Cluster Settings*.
60+
.. In the *Administrator* perspective of the web console, navigate to *Administration* -> *Cluster Settings*.
6161

6262
.. To view the CCO status details, click *cloud-credential* in the *Cluster Operators* list.
6363

modules/nw-ptp-configuring-linuxptp-services-as-boundary-clock.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ spec:
3333
ptp4lConf: | <6>
3434
[ens1f0] <7>
3535
masterOnly 0
36-
[ens1f3] <8>
36+
[ens1f3] <8>
3737
masterOnly 1
3838
[global]
3939
#
@@ -136,7 +136,7 @@ spec:
136136
manufacturerIdentity 00:00:00
137137
userDescription ;
138138
timeSource 0xA0
139-
phc2sysOpts: "-a -r" <9>
139+
phc2sysOpts: "-a -r" <9>
140140
recommend: <10>
141141
- profile: "profile1" <11>
142142
priority: 10 <12>
@@ -187,7 +187,7 @@ linuxptp-daemon-tdspf 1/1 Running 0 43m 10.1.196.25
187187
ptp-operator-657bbb64c8-2f8sj 1/1 Running 0 43m 10.129.0.61 control-plane-1.example.com
188188
----
189189

190-
.. Check that the profile is correct. Examine the logs of the `linuxptp` daemon that corresponds to the node you specified in the `PtpConfig` profile. Run the folllowing command:
190+
.. Check that the profile is correct. Examine the logs of the `linuxptp` daemon that corresponds to the node you specified in the `PtpConfig` profile. Run the following command:
191191
+
192192
[source,terminal]
193193
----
@@ -201,8 +201,8 @@ I1115 09:41:17.117596 4143292 daemon.go:107] in applyNodePTPProfile
201201
I1115 09:41:17.117604 4143292 daemon.go:109] updating NodePTPProfile to:
202202
I1115 09:41:17.117607 4143292 daemon.go:110] ------------------------------------
203203
I1115 09:41:17.117612 4143292 daemon.go:102] Profile Name: profile1
204-
I1115 09:41:17.117616 4143292 daemon.go:102] Interface:
205-
I1115 09:41:17.117620 4143292 daemon.go:102] Ptp4lOpts: -s -2
206-
I1115 09:41:17.117623 4143292 daemon.go:102] Phc2sysOpts: -a -r
204+
I1115 09:41:17.117616 4143292 daemon.go:102] Interface:
205+
I1115 09:41:17.117620 4143292 daemon.go:102] Ptp4lOpts: -s -2
206+
I1115 09:41:17.117623 4143292 daemon.go:102] Phc2sysOpts: -a -r
207207
I1115 09:41:17.117626 4143292 daemon.go:116] ------------------------------------
208-
----
208+
----

modules/nw-ptp-configuring-linuxptp-services-as-ordinary-clock.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ linuxptp-daemon-tdspf 1/1 Running 0 43m 10.1.196.25
8080
ptp-operator-657bbb64c8-2f8sj 1/1 Running 0 43m 10.129.0.61 control-plane-1.example.com
8181
----
8282

83-
.. Check that the profile is correct. Examine the logs of the `linuxptp` daemon that corresponds to the node you specified in the `PtpConfig` profile. Run the folllowing command:
83+
.. Check that the profile is correct. Examine the logs of the `linuxptp` daemon that corresponds to the node you specified in the `PtpConfig` profile. Run the following command:
8484
+
8585
[source,terminal]
8686
----
@@ -93,9 +93,9 @@ $ oc logs linuxptp-daemon-4xkbb -n openshift-ptp
9393
I1115 09:41:17.117596 4143292 daemon.go:107] in applyNodePTPProfile
9494
I1115 09:41:17.117604 4143292 daemon.go:109] updating NodePTPProfile to:
9595
I1115 09:41:17.117607 4143292 daemon.go:110] ------------------------------------
96-
I1115 09:41:17.117612 4143292 daemon.go:102] Profile Name: profile1
97-
I1115 09:41:17.117616 4143292 daemon.go:102] Interface: ens787f1
98-
I1115 09:41:17.117620 4143292 daemon.go:102] Ptp4lOpts: -s -2
99-
I1115 09:41:17.117623 4143292 daemon.go:102] Phc2sysOpts: -a -r
96+
I1115 09:41:17.117612 4143292 daemon.go:102] Profile Name: profile1
97+
I1115 09:41:17.117616 4143292 daemon.go:102] Interface: ens787f1
98+
I1115 09:41:17.117620 4143292 daemon.go:102] Ptp4lOpts: -s -2
99+
I1115 09:41:17.117623 4143292 daemon.go:102] Phc2sysOpts: -a -r
100100
I1115 09:41:17.117626 4143292 daemon.go:116] ------------------------------------
101-
----
101+
----

modules/ossm-supported-configurations.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ For additional information about {ProductName} lifecycle and supported configura
3131

3232
{ProductName} supports the following network configurations.
3333

34-
* Openshift-SDN
34+
* OpenShift-SDN
3535
* OVN-Kubernetes is supported as a technology preview in {product-title} version 4.7.
3636

3737
[id="ossm-supported-configurations-kiali_{context}"]

modules/serverless-sinkbinding-odc.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,4 +111,4 @@ You can verify that the sink binding, sink, and cron job have been created and a
111111
+
112112
image::verify-sinkbinding-odc.png[View the sink binding and service in the Topology view]
113113
. Observe that successful jobs are being registered by the cron job once the sink binding is added. This means that the sink binding is successfully reconfiguring the jobs created by the cron job.
114-
. Browse the logs of the the `event-display` service pod to see events produced by the heartbeats cron job.
114+
. Browse the logs of the `event-display` service pod to see events produced by the heartbeats cron job.

networking/metallb/metallb-configure-services.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ If the address pool that you specify for `<address_pool_name>` does not exist, M
7878
== Accept any IP address
7979

8080
By default, address pools are configured to permit automatic assignment.
81-
MetalLB assigns an an IP address from these address pools.
81+
MetalLB assigns an IP address from these address pools.
8282

8383
To accept any IP address from any pool that is configured for automatic assignment, no special annotation or configuration is required.
8484

0 commit comments

Comments
 (0)