Skip to content

Commit 288cefe

Browse files
authored
Merge pull request #99927 from bergerhoffer/typo-check
Fixing some typos
2 parents 33d7b0c + 91fb1bb commit 288cefe

14 files changed

+45
-45
lines changed

hosted_control_planes/hosted-control-planes-release-notes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ As a result, the `HostedCluster` resource can be deployed successfully, even in
9090

9191
* Previously, the process to validate the container image architecture did not pass through the image metadata provider. As a consequence, image overrides did not take effect, and disconnected deployments failed. In this release, the methods for the image metadata provider are modified to allow multi-architecture validations, and are propagated through all components for image validation. As a result, the issue is resolved. (link:https://issues.redhat.com/browse/OCPBUGS-44655[OCPBUGS-44655])
9292

93-
* Previously, the `--goaway-chance` flag for the the Kubernetes API Server was not configurable. The default value for the flag was `0`. With this release, you can change the value for the `--goaway-chance` flag by adding an annotation to the `HostedCluster` custom resource. (link:https://issues.redhat.com/browse/OCPBUGS-54863[OCPBUGS-54863])
93+
* Previously, the `--goaway-chance` flag for the Kubernetes API Server was not configurable. The default value for the flag was `0`. With this release, you can change the value for the `--goaway-chance` flag by adding an annotation to the `HostedCluster` custom resource. (link:https://issues.redhat.com/browse/OCPBUGS-54863[OCPBUGS-54863])
9494

9595
* Previously, on instances of Red{nbsp}Hat OpenShift on {ibm-cloud-title} that are based on {hcp}, in non-OVN clusters, the Cluster Network Operator could not patch service monitors and Prometheus rules in the `monitoring.coreos.com` API group. As a consequence, the Cluster Network Operator logs showed permissions errors and "could not apply" messages. With this release, permissions for service monitors and Prometheus rules are added in the Cluster Network Operator for non-OVN clusters. As a result, the Cluster Network Operator logs no longer show permissions errors. (link:https://issues.redhat.com/browse/OCPBUGS-54178[OCPBUGS-54178])
9696

modules/coo-troubleshooting-ui-plugin-using.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Other signal types require optional components to be installed:
2727
====
2828
.Procedure
2929
30-
. In the the web console, go to *Observe* -> *Alerting* and then select an alert. If the alert has correlated items, a **Troubleshooting Panel** link will appear above the chart on the alert detail page.
30+
. In the web console, go to *Observe* -> *Alerting* and then select an alert. If the alert has correlated items, a **Troubleshooting Panel** link will appear above the chart on the alert detail page.
3131
+
3232
image::coo-troubleshooting-panel-link.png[Troubleshooting Panel link]
3333
+
@@ -82,4 +82,4 @@ Setting a large value in a large cluster might cause the query to fail, if the n
8282

8383
**** `netflow:network` representing any network observability network event.
8484

85-
**** `log:__LOG_TYPE__` representing stored logs, where `__LOG_TYPE__` must be one of `application`, `infrastructure` or `audit`.
85+
**** `log:__LOG_TYPE__` representing stored logs, where `__LOG_TYPE__` must be one of `application`, `infrastructure` or `audit`.

modules/dr-restoring-cluster-state.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@
66

77
// Contributors: The documentation for this section changed drastically for 4.18+.
88

9-
// Contributors: Some changes for the `etcd` restore procedure are only valid for 4.14+.
10-
// In the 4.14+ documentation, OVN-K requires different steps because there is no centralized OVN
11-
// control plane to be converted. For more information, see PR #64939.
9+
// Contributors: Some changes for the `etcd` restore procedure are only valid for 4.14+.
10+
// In the 4.14+ documentation, OVN-K requires different steps because there is no centralized OVN
11+
// control plane to be converted. For more information, see PR #64939.
1212
// Do not cherry pick from "main" to "enterprise-4.12" or "enterprise-4.13" because the cherry pick
13-
// procedure is different for these versions. Instead, open a separate PR for 4.13 and
14-
// cherry pick to 4.12 or make the updates directly in 4.12.
13+
// procedure is different for these versions. Instead, open a separate PR for 4.13 and
14+
// cherry pick to 4.12 or make the updates directly in 4.12.
1515

1616
:_mod-docs-content-type: PROCEDURE
1717
[id="dr-scenario-2-restoring-cluster-state_{context}"]
@@ -77,7 +77,7 @@ $ sudo -E /usr/local/bin/cluster-restore.sh /home/core/<etcd-backup-directory>
7777

7878
. Exit the SSH session.
7979

80-
. Once the API responds, turn off the etcd Operator quorum guard by runnning the following command:
80+
. Once the API responds, turn off the etcd Operator quorum guard by running the following command:
8181
+
8282
[source,terminal]
8383
----

modules/machine-config-pin-preload-images.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@
66
[id="machine-config-pin-preload-images_{context}"]
77
= Pinning images
88

9-
You can pin images to your nodes by using a `PinnedImageSet` custom resource (CR). The pinned image set defines the list of images to pre-load and the machine config pool to which the images should be pinned.
9+
You can pin images to your nodes by using a `PinnedImageSet` custom resource (CR). The pinned image set defines the list of images to pre-load and the machine config pool to which the images should be pinned.
1010

11-
The images are stored in the the `/etc/crio/crio.conf.d/50-pinned-images` file on the nodes.
11+
The images are stored in the `/etc/crio/crio.conf.d/50-pinned-images` file on the nodes.
1212

1313
[NOTE]
1414
====

modules/microshift-verify-container-signatures-sigstore.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ $ sudo curl -sL https://access.redhat.com/security/data/63405576.txt -o /etc/con
6060
}
6161
----
6262

63-
. Configure Red Hat remote registries to use sigstore attachments when pulling images to the local storage, by editing the `/etc/containers/registries.d/registry.redhat.io.yaml`` file to contain the following configuration:
63+
. Configure Red Hat remote registries to use sigstore attachments when pulling images to the local storage, by editing the `/etc/containers/registries.d/registry.redhat.io.yaml` file to contain the following configuration:
6464
+
6565
[source,terminal]
6666
----

modules/monitoring-reviewing-monitoring-dashboards-developer.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ include::snippets/unified-perspective-web-console.adoc[]
1818
1919
.Procedure
2020

21-
. In the the *Developer* perspective of the {product-title} web console, click *Observe* and go to the *Dashboards* tab.
21+
. In the *Developer* perspective of the {product-title} web console, click *Observe* and go to the *Dashboards* tab.
2222

2323
. Select a project from the *Project:* drop-down list.
2424

modules/network-observability-filtering-ebpf-rule.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ spec:
5252
----
5353
<1> To enable eBPF flow filtering, set `spec.agent.ebpf.flowFilter.enable` to `true`.
5454
<2> To define the action for the flow filter rule, set the required `action` parameter. Valid values are `Accept` or `Reject`.
55-
<3> To define the IP address and CIDR mask for the flow filter rule, set the required `cidr` parameter. This parameter supports both IPv4 and IPv6 address formats. To match any IP address, use `0.0.0.0/0` for IPv4 or ``::/0` for IPv6.
55+
<3> To define the IP address and CIDR mask for the flow filter rule, set the required `cidr` parameter. This parameter supports both IPv4 and IPv6 address formats. To match any IP address, use `0.0.0.0/0` for IPv4 or `::/0` for IPv6.
5656
<4> To define the sampling rate for matched flows and override the global sampling setting `spec.agent.ebpf.sampling`, set the `sampling` parameter.
5757
<5> To filter flows by Peer IP CIDR, set the `peerCIDR` parameter.
5858

@@ -86,4 +86,4 @@ spec:
8686
<2> To report packet drops for each network flow, add the `PacketDrop` value to the `spec.agent.ebpf.features` list.
8787
<3> To enable eBPF flow filtering, set `spec.agent.ebpf.flowFilter.enable` to `true`.
8888
<4> To define the action for the flow filter rule, set the required `action` parameter. Valid values are `Accept` or `Reject`.
89-
<5> To filter flows containing drops, set `pktDrops` to `true`.
89+
<5> To filter flows containing drops, set `pktDrops` to `true`.

modules/persistent-storage-csi-azure-file-static-provisioning-procedure.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,28 +54,28 @@ spec:
5454
- uid=0
5555
- gid=0
5656
- cache=strict <6>
57-
- nosharesock <7>
58-
- actimeo=30 <8>
57+
- nosharesock <7>
58+
- actimeo=30 <8>
5959
- nobrl <9>
6060
csi:
6161
driver: file.csi.azure.com
6262
volumeHandle: "{resource-group-name}#{account-name}#{file-share-name}" <10>
6363
volumeAttributes:
64-
shareName: EXISTING_FILE_SHARE_NAME <11>
64+
shareName: EXISTING_FILE_SHARE_NAME <11>
6565
nodeStageSecretRef:
6666
name: azure-secret <12>
6767
namespace: <my-namespace> <13>
6868
----
6969
<1> Volume size.
70-
<2> Access mode. Defines the read-write and mount permissions. For more information, under _Additional Resources_, see _Access modes_.
70+
<2> Access mode. Defines the read-write and mount permissions. For more information, under _Additional resources_, see _Access modes_.
7171
<3> Reclaim policy. Tells the cluster what to do with the volume after it is released. Accepted values are `Retain`, `Recycle`, or `Delete`.
7272
<4> Storage class name. This name is used by the PVC to bind to this specific PV. For static provisioning, a `StorageClass` object does not need to exist, but the name in the PV and PVC must match.
7373
<5> Modify this permission if you want to enhance the security.
7474
<6> Cache mode. Accepted values are `none`, `strict`, and `loose`. The default is `strict`.
7575
<7> Use to reduce the probability of a reconnect race.
76-
<8> The time (in seconds) that the CIFS client caches attributes of a file or directory before it requests attribute information from a server.
76+
<8> The time (in seconds) that the CIFS client caches attributes of a file or directory before it requests attribute information from a server.
7777
<9> Disables sending byte range lock requests to the server, and for applications which have challenges with POSIX locks.
78-
<10> Ensure that `volumeHandle` is unique across the cluster. The `resource-group-name` is the Azure resource group where the storage account resides.
78+
<10> Ensure that `volumeHandle` is unique across the cluster. The `resource-group-name` is the Azure resource group where the storage account resides.
7979
<11> File share name. Use only the file share name; do not use full path.
8080
<12> Provide the name of the secret created in step 1 of this procedure. In this example, it is _azure-secret_.
8181
<13> The namespace that the secret was created in. This must be the namespace where the PV is consumed.
@@ -103,7 +103,7 @@ spec:
103103
<2> Namespace for the PVC.
104104
<3> The name of the PV that you created in the previous step.
105105
<4> Storage class name. This name is used by the PVC to bind to this specific PV. For static provisioning, a `StorageClass` object does not need to exist, but the name in the PV and PVC must match.
106-
<5> Access mode. Defines the requested read-write access for the PVC. Claims use the same conventions as volumes when requesting storage with specific access modes. For more information, under _Additional Resources_, see _Access modes_.
106+
<5> Access mode. Defines the requested read-write access for the PVC. Claims use the same conventions as volumes when requesting storage with specific access modes. For more information, under _Additional resources_, see _Access modes_.
107107
<6> PVC size.
108108

109109
. Ensure that the PVC is created and in `Bound` status after a while by running the following command:

modules/persistent-storage-csi-drivers-supported.adoc

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ endif::openshift-rosa,openshift-rosa-hcp[]
2525

2626
The following table describes the CSI drivers that are
2727
ifndef::openshift-dedicated[]
28-
installed with {product-title},
28+
installed with {product-title},
2929
endif::openshift-dedicated[]
3030
supported by {product-title}, and which CSI features they support, such as volume snapshots and resize.
3131

@@ -35,7 +35,7 @@ ifndef::openshift-rosa,openshift-rosa-hcp[]
3535
If your CSI driver is not listed in the following table, you must follow the installation instructions provided by your CSI storage vendor to use their supported CSI features.
3636
====
3737

38-
For a list of third-party-certified CSI drivers, see the _Red Hat ecosystem portal_ under _Additional Resources_.
38+
For a list of third-party-certified CSI drivers, see the _Red Hat ecosystem portal_ under _Additional resources_.
3939

4040
endif::openshift-rosa,openshift-rosa-hcp[]
4141
ifdef::openshift-rosa,openshift-rosa-hcp,openshift-aro[]
@@ -46,32 +46,32 @@ endif::openshift-rosa,openshift-rosa-hcp,openshift-aro[]
4646
[cols=",^v,^v,^v,^v,^v,^v width="100%",options="header"]
4747
|===
4848
|CSI driver |CSI volume snapshots |CSI volume group snapshots ^[1]^ |CSI cloning |CSI resize |Inline ephemeral volumes
49-
|AWS EBS | ✅ | | | ✅|
50-
|AWS EFS | | | | |
49+
|AWS EBS | ✅ | | | ✅|
50+
|AWS EFS | | | | |
5151
ifndef::openshift-rosa,openshift-rosa-hcp[]
5252
|Google Compute Platform (GCP) persistent disk (PD)| ✅| |✅^[2]^ | ✅|
53-
|GCP Filestore | ✅ | | | ✅|
53+
|GCP Filestore | ✅ | | | ✅|
5454
endif::openshift-rosa,openshift-rosa-hcp[]
5555
ifndef::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
56-
|{ibm-power-server-name} Block | | | | ✅ |
57-
|{ibm-cloud-name} Block | ✅^[3]^ | | | ✅^[3]^|
56+
|{ibm-power-server-name} Block | | | | ✅ |
57+
|{ibm-cloud-name} Block | ✅^[3]^ | | | ✅^[3]^|
5858
endif::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
59-
|LVM Storage | ✅ | | ✅ | ✅ |
59+
|LVM Storage | ✅ | | ✅ | ✅ |
6060
ifndef::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
61-
|Microsoft Azure Disk | ✅ | | ✅ | ✅|
62-
|Microsoft Azure Stack Hub | ✅ | | ✅ | ✅|
61+
|Microsoft Azure Disk | ✅ | | ✅ | ✅|
62+
|Microsoft Azure Stack Hub | ✅ | | ✅ | ✅|
6363
|Microsoft Azure File | ✅^[4]^ | | ✅^[4]^ | ✅| ✅
64-
|OpenStack Cinder | ✅ | | ✅ | ✅|
65-
|OpenShift Data Foundation | ✅ | ✅ | ✅ | ✅|
66-
|OpenStack Manila | ✅ | | | ✅ |
64+
|OpenStack Cinder | ✅ | | ✅ | ✅|
65+
|OpenShift Data Foundation | ✅ | ✅ | ✅ | ✅|
66+
|OpenStack Manila | ✅ | | | ✅ |
6767
|Shared Resource | | | | | ✅
68-
|CIFS/SMB | | | ✅ | |
69-
|VMware vSphere | ✅^[5]^ | | | ✅^[6]^|
68+
|CIFS/SMB | | | ✅ | |
69+
|VMware vSphere | ✅^[5]^ | | | ✅^[6]^|
7070
endif::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
7171
|===
7272
ifndef::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
7373
--
74-
1.
74+
1.
7575

7676
:FeatureName: CSI volume group snapshots
7777
include::snippets/technology-preview.adoc[leveloffset=+1]
@@ -93,7 +93,7 @@ include::snippets/technology-preview.adoc[leveloffset=+1]
9393
:FeatureName: Azure File CSI cloning and snapshot
9494
include::snippets/technology-preview.adoc[leveloffset=+1]
9595

96-
5.
96+
5.
9797

9898
* Requires vSphere version 7.0 Update 3 or later for both vCenter Server and ESXi.
9999

@@ -103,4 +103,4 @@ include::snippets/technology-preview.adoc[leveloffset=+1]
103103

104104
* Online expansion is supported from vSphere version 7.0 Update 2 and later.
105105
--
106-
endif::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
106+
endif::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]

modules/rosa-sdpolicy-platform.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,4 +163,4 @@ Red{nbsp}Hat workloads typically refer to Red{nbsp}Hat-provided Operators made a
163163

164164
[id="rosa-sdpolicy-kubernetes-operator_{context}"]
165165
== Kubernetes Operator support
166-
All Operators listed in the OperatorHub marketplace should be available for installation. These Operators are considered customer workloads, and are not monitored nor managed by by Red{nbsp}Hat SRE. Operators authored by Red{nbsp}Hat are supported by Red{nbsp}Hat.
166+
All Operators listed in the OperatorHub marketplace should be available for installation. These Operators are considered customer workloads, and are not monitored nor managed by Red{nbsp}Hat SRE. Operators authored by Red{nbsp}Hat are supported by Red{nbsp}Hat.

0 commit comments

Comments
 (0)