Skip to content

Commit 392da2c

Browse files
authored
Merge pull request #87976 from bergerhoffer/418-typo-check
Fixing some typos
2 parents c196986 + 5d2bd7a commit 392da2c

8 files changed

+13
-13
lines changed

modules/nodes-pods-vertical-autoscaler-custom-resource.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
The Vertical Pod Autoscaler Operator (VPA) can update not only built-in resources such as deployments or stateful sets, but also custom resources that manage pods.
1010

11-
In order to use the VPA with a custom resource, when you create the the `CustomResourceDefinition` (CRD) object, you must configure the `labelSelectorPath` field in the `/scale` subresource. The `/scale` subresource creates a `Scale` object. The `labelSelectorPath` field defines the JSON path inside the custom resource that corresponds to `Status.Selector` in the `Scale` object and in the custom resource. The following is an example of a `CustomResourceDefinition` and a `CustomResource` that fulfills these requirements, along with a `VerticalPodAutoscaler` definition that targets the custom resource. The following example shows the `/scale` subresource contract.
11+
In order to use the VPA with a custom resource, when you create the `CustomResourceDefinition` (CRD) object, you must configure the `labelSelectorPath` field in the `/scale` subresource. The `/scale` subresource creates a `Scale` object. The `labelSelectorPath` field defines the JSON path inside the custom resource that corresponds to `Status.Selector` in the `Scale` object and in the custom resource. The following is an example of a `CustomResourceDefinition` and a `CustomResource` that fulfills these requirements, along with a `VerticalPodAutoscaler` definition that targets the custom resource. The following example shows the `/scale` subresource contract.
1212

1313
[NOTE]
1414
====
@@ -61,7 +61,7 @@ spec:
6161
----
6262
<1> Specifies the JSON path that corresponds to `status.selector` field of the custom resource object.
6363

64-
.Example custom CR
64+
.Example custom CR
6565
[source,yaml]
6666
----
6767
apiVersion: testing.openshift.io/v1

modules/nodes-sigstore-configure-cluster-policy.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,8 +113,8 @@ spec:
113113
<6> For a Fulcio certificate policy, the following parameters are required:
114114
* `fulcioCAData`: Specifies a base64-encoded Fulcio certificate in the PEM format. The maximum length is 8192 characters.
115115
* `fulcioSubject`: Specifies the OIDC issuer and the email of the Fulcio authentication configuration.
116-
<7> Specifies a base64-encoded Rekor public key in the PEM format. This parameter is required when when the `policyType` is `FulcioCAWithRekor`. The maximum length is 8192 characters.
117-
<8> Optional: Specifies one of the following processes to verify the identity in the signature and the actual image identity.
116+
<7> Specifies a base64-encoded Rekor public key in the PEM format. This parameter is required when the `policyType` is `FulcioCAWithRekor`. The maximum length is 8192 characters.
117+
<8> Optional: Specifies one of the following processes to verify the identity in the signature and the actual image identity.
118118
* `MatchRepoDigestOrExact`.
119119
* `MatchRepository`.
120120
* `ExactRepository`. The `exactRepository` parameter must be specified.

modules/nodes-sigstore-configure-image-policy.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ spec:
131131
<7> For a Fulcio certificate policy, the following parameters are required:
132132
* `fulcioCAData`: Specifies a base64-encoded Fulcio certificate in the PEM format. The maximum length is 8192 characters.
133133
* `fulcioSubject`: Specifies the OIDC issuer and the email of the Fulcio authentication configuration.
134-
<8> Specifies a base64-encoded Rekor public key in the PEM format. This parameter is required when when the `policyType` is `FulcioCAWithRekor`. The maximum length is 8192 characters.
134+
<8> Specifies a base64-encoded Rekor public key in the PEM format. This parameter is required when the `policyType` is `FulcioCAWithRekor`. The maximum length is 8192 characters.
135135
<9> Optional: Specifies one of the following processes to verify the identity in the signature and the actual image identity:
136136
* `MatchRepoDigestOrExact`.
137137
* `MatchRepository`.
@@ -257,5 +257,5 @@ msg="Found a Sigstore attachment manifest with 1 layers" file="docker/docker_ima
257257
msg="Fetching Sigstore attachment 1/1: sha256:8276724a208087e73ae5d9d6e8f872f67808c08b0acdfdc73019278807197c45" file="docker/docker_image_src.go:644"
258258
# ...
259259
----
260-
<1> The `IsRunningImageAllowed` line confirms that image is allowed by the configured sigstore verification policy.
260+
<1> The `IsRunningImageAllowed` line confirms that image is allowed by the configured sigstore verification policy.
261261
<2> The `Using transport \"docker\" specific policy section \"example.io/crio/signed\"" file="signature/policy_eval.go:150` line confirms that the image policy has been applied.

modules/ossm-rn-new-features-1x.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ There are manual steps that must be completed to address CVE-2021-29492 and CVE-
164164
[id="manual-updates-cve-2021-29492_{context}"]
165165
=== Manual updates required by CVE-2021-29492 and CVE-2021-31920
166166

167-
Istio contains a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (``%2F` or ``%5C`) could potentially bypass an Istio authorization policy when path-based authorization rules are used.
167+
Istio contains a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (`%2F` or `%5C`) could potentially bypass an Istio authorization policy when path-based authorization rules are used.
168168

169169
For example, assume an Istio cluster administrator defines an authorization DENY policy to reject the request at path `/admin`. A request sent to the URL path `//admin` will NOT be rejected by the authorization policy.
170170

modules/telco-observability-key-performance-metrics.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The following tables show some queries that you can explore in the metrics query
3636
[NOTE]
3737
====
3838
The URL for the console is https://<OpenShift Console FQDN>/monitoring/query-browser.
39-
You can get the Openshift Console FQDN by running the following command:
39+
You can get the OpenShift Console FQDN by running the following command:
4040
[source,terminal]
4141
----
4242
$ oc get routes -n openshift-console console -o jsonpath='{.status.ingress[0].host}'

modules/ztp-deleting-node-using-siteconfig.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ If you are working with secrets, deleting a secret too early can cause an issue
101101
Delete the secret only after the node cleanup, when the current ArgoCD synchronization is complete.
102102
====
103103

104-
.Next Steps
104+
.Next steps
105105

106106
To reprovision a node, delete the changes previously added to the `SiteConfig`, push the changes to the Git repository, and wait for the synchronization to complete.
107107
This regenerates the `BareMetalHost` CR of the worker node and triggers the re-install of the node.

observability/logging/logging-6.0/log6x-meta-contributing.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ include::_attributes/common-attributes.adoc[]
99
Do not include this file in the topic map. This is a guide meant for contributors, and is not intended to be published.
1010
====
1111

12-
Logging consists of the Red Hat Openshift Logging Operator (also known as the Cluster Logging Operator), and an accompanying log store Operator. Either the Loki Operator (current/future), or Elasticsearch (deprecated). Either vector (current/future) or fluentd (deprecated) handles log collection and aggregation. Operators use custom resources (CR) to manage applications and their components. High-level configuration and settings are provided by the user within a CR. The Operator translates high-level directives into low-level actions, based on best practices embedded within the Operator’s logic. A custom resource definition (CRD) defines a CR and lists all the configurations available to users of the Operator. Installing an Operator creates the CRDs, which are then used to generate CRs.
12+
Logging consists of the Red Hat OpenShift Logging Operator (also known as the Cluster Logging Operator), and an accompanying log store Operator. Either the Loki Operator (current/future), or Elasticsearch (deprecated). Either vector (current/future) or fluentd (deprecated) handles log collection and aggregation. Operators use custom resources (CR) to manage applications and their components. High-level configuration and settings are provided by the user within a CR. The Operator translates high-level directives into low-level actions, based on best practices embedded within the Operator’s logic. A custom resource definition (CRD) defines a CR and lists all the configurations available to users of the Operator. Installing an Operator creates the CRDs, which are then used to generate CRs.
1313

1414
== Operator CRs:
15-
* `Red Hat Openshift Logging Operator`
15+
* `Red Hat OpenShift Logging Operator`
1616
** (Deprecated) `ClusterLogging` (CL) - Deploys the collector and forwarder which currently are both implemented by a daemonset running on each node.
1717
** `ClusterLogForwarder` (CLF) - Generates collector configuration to forward logs per user configuration.
1818
* `Loki Operator`:

scalability_and_performance/index.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ To contact Red Hat support, see xref:../support/getting-support.adoc#getting-sup
1313

1414
[NOTE]
1515
====
16-
Some performance and scalability Operators have release cycles that are independent from {product-title} release cycles. For more information, see link:access.redhat.com/support/policy/updates/openshift_operators[Openshift Operators].
16+
Some performance and scalability Operators have release cycles that are independent from {product-title} release cycles. For more information, see link:access.redhat.com/support/policy/updates/openshift_operators[OpenShift Operators].
1717
====
1818

1919
[discrete]
@@ -58,4 +58,4 @@ xref:../scalability_and_performance/enabling-workload-partitioning.adoc#enabling
5858

5959
xref:../scalability_and_performance/node-observability-operator.adoc#using-node-observability-operator[Using the Node Observability Operator]
6060

61-
// endif::[]
61+
// endif::[]

0 commit comments

Comments
 (0)