Skip to content

Commit 66110b9

Browse files
authored
Fix typos (#1756)
* childs -> children * toogle -> toggle * controll -> controller * overwride -> overwrite * requsites -> requisites * Isntances -> Instances * intergration -> integration * fix newlines * sme -> some
1 parent 89574bd commit 66110b9

File tree

29 files changed

+87
-88
lines changed

29 files changed

+87
-88
lines changed

.codespell.exclude

-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,2 @@
11
iam
22
aks
3-
childs

content/kubeone/v1.0/prerequisites/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Make sure that you have:
2626

2727
[getting-kubeone]: {{< ref "../getting_kubeone" >}}
2828
[kubeone-terraform-configs]: {{< ref "../concepts#example-terraform-configs" >}}
29-
[kubeone-terraform-integration]: {{< ref "../concepts#kubeone-terraform-intergration" >}}
29+
[kubeone-terraform-integration]: {{< ref "../concepts#kubeone-terraform-integration" >}}
3030
[install-terraform]: https://learn.hashicorp.com/terraform/getting-started/install.html
3131
[compatibility]: {{< ref "../compatibility_info#supported-terraform-versions" >}}
3232
[config-credentials]: {{< ref "./credentials" >}}

content/kubeone/v1.2/prerequisites/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Make sure that you have:
2626

2727
[getting-kubeone]: {{< ref "../getting_kubeone" >}}
2828
[kubeone-terraform-configs]: {{< ref "../concepts#example-terraform-configs" >}}
29-
[kubeone-terraform-integration]: {{< ref "../concepts#kubeone-terraform-intergration" >}}
29+
[kubeone-terraform-integration]: {{< ref "../concepts#kubeone-terraform-integration" >}}
3030
[install-terraform]: https://learn.hashicorp.com/terraform/getting-started/install.html
3131
[compatibility]: {{< ref "../compatibility_info#supported-terraform-versions" >}}
3232
[config-credentials]: {{< ref "./credentials" >}}

content/kubermatic/main/cheat-sheets/etcd/legacy-restore/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ weight = 20
88
{{% notice warning %}}
99
This page documents a **manual** restore procedure in case the legacy backup controllers were used to create
1010
the backup object in question. KKP v2.24 has removed the legacy backup controllers. The current implementation
11-
supports [automated restores]({{< ref "../../../tutorials-howtos/etcd-backups/" >}}), so this procedure should
11+
supports [automated restores]({{< ref "../../../tutorials-howtos/etcd-backups/" >}}), so this procedure should
1212
**not** be used. Use the restore functionality in KKP directly instead.
1313
{{% /notice %}}
1414

content/kubermatic/main/installation/upgrading/upgrade-from-2.24-to-2.25/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ For KKP 2.25 several charts for user cluster MLA (`loki-distributed` and `cortex
3434

3535
The default values shipped with KKP have been updated accordingly:
3636

37-
- [`values.yaml` for `loki-distributed`](https://github.com/kubermatic/kubermatic/blob/v2.25.0/charts/mla/loki-distributed/values.yaml)
37+
- [`values.yaml` for `loki-distributed`](https://github.com/kubermatic/kubermatic/blob/v2.25.0/charts/mla/loki-distributed/values.yaml)
3838
- [`values.yaml` for `cortex`](https://github.com/kubermatic/kubermatic/blob/v2.25.0/charts/mla/cortex/values.yaml)
3939

4040
If the `values.yaml` shipped by default in KKP have been copied / modified to be used for passing configuration, the modifications need to be migrated to the new structure before upgrading the user cluster MLA stack. Full upstream values are linked from each default values shipped by KKP.

content/kubermatic/main/tutorials-howtos/administration/admin-panel/custom-links/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ After enabling demo information checkbox `Demo system` information will be shown
4949

5050
## What's New
5151

52-
After enabling What's new checkbox, `What's New` option will be shown in the KKP UI help panel. It links to release
52+
After enabling What's new checkbox, `What's New` option will be shown in the KKP UI help panel. It links to release
5353
notes in the docs which displays new features and breaking or action required changes in the current release.
5454

5555
![Help Panel](@/images/ui/help-panel.png?classes=shadow,border "Help Panel")

content/kubermatic/main/tutorials-howtos/applications/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,4 @@ weight = 5
77
This section provides guides on applications in KKP. For a more details on Applications refer to our [Applications Primer]({{< ref "../../architecture/concept/kkp-concepts/applications/" >}}).
88

99
{{% children depth=5 %}}
10-
{{% /children %}}
10+
{{% /children %}}

content/kubermatic/main/tutorials-howtos/applications/default-enforced-applications/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -110,4 +110,4 @@ If `defaultVersion` is specified in the `ApplicationDefinition`, it will be used
110110

111111
### Configuring default and enforced applications
112112

113-
Applications can be be marked as default and enforced from the admin panel in KKP UI as well as from the APIs directly. For more details refer to the [Applications]({{< ref "../../administration/admin-panel/applications/" >}}) section.
113+
Applications can be be marked as default and enforced from the admin panel in KKP UI as well as from the APIs directly. For more details refer to the [Applications]({{< ref "../../administration/admin-panel/applications/" >}}) section.

content/kubermatic/main/tutorials-howtos/kkp-configuration/custom-certificates/_index.en.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Re-deploy the `iap` Helm chart to perform the changes and update the `Certificat
7878

7979
### External
8080

81-
If issuing certificates inside the cluster is not possible, static certificates can also be provided from
81+
If issuing certificates inside the cluster is not possible, static certificates can also be provided from
8282
`Secret` resources. The cluster admin is responsible for renewing and updating them as needed. A TLS secret
8383
can be created via `kubectl` when certificate and private key are available:
8484

@@ -181,7 +181,7 @@ spec:
181181
# master cluster and on all seeds, user clusters.
182182
caBundle:
183183
kind: ConfigMap
184-
# name of the ConfigMap; e.g. 'ca-bundle-customized' if you created your CA bundle ConfigMap.
184+
# name of the ConfigMap; e.g. 'ca-bundle-customized' if you created your CA bundle ConfigMap.
185185
# must be in the same namespace as KKP.
186186
name: ca-bundle
187187
```

content/kubermatic/main/tutorials-howtos/monitoring-logging-alerting/master-seed/installation/_index.en.md

+26-26
Original file line numberDiff line numberDiff line change
@@ -126,32 +126,32 @@ With this file prepared, we can now install all required charts:
126126
Output will be similar to this:
127127
```bash
128128
INFO[0000] 🚀 Initializing installer… edition="Community Edition" version=X.Y
129-
INFO[0000] 🚦 Validating the provided configuration…
130-
INFO[0000] ✅ Provided configuration is valid.
131-
INFO[0000] 🚦 Validating existing installation…
132-
INFO[0000] ✅ Existing installation is valid.
133-
INFO[0000] 🛫 Deploying KKP Seed MLA Stack…
134-
INFO[0000] 📦 Deploying Node Exporter ...
135-
INFO[0006] ✅ Success.
136-
INFO[0006] 📦 Deploying Kube State Metrics…
137-
INFO[0022] ✅ Success.
138-
INFO[0022] 📦 Deploying Grafana…
139-
INFO[0055] ✅ Success.
140-
INFO[0055] 📦 Deploying Blackbox Exporter…
141-
INFO[0064] ✅ Success.
142-
INFO[0064] 📦 Deploying Alert Manager…
143-
INFO[0074] ✅ Success.
144-
INFO[0074] 📦 Deploying Prometheus…
145-
INFO[0075] ✅ Success.
146-
INFO[0075] 📦 Deploying Helm Exporter…
147-
INFO[0076] ✅ Success.
148-
INFO[0076] 📦 Deploying Karma…
149-
INFO[0078] ✅ Success.
150-
INFO[0078] 📦 Deploying Loki…
151-
INFO[0164] ✅ Success.
152-
INFO[0164] 📦 Deploying Promtail…
153-
INFO[0166] ✅ Success.
154-
INFO[0166] 🛬 Installation completed successfully. Time for a break, maybe?
129+
INFO[0000] 🚦 Validating the provided configuration…
130+
INFO[0000] ✅ Provided configuration is valid.
131+
INFO[0000] 🚦 Validating existing installation…
132+
INFO[0000] ✅ Existing installation is valid.
133+
INFO[0000] 🛫 Deploying KKP Seed MLA Stack…
134+
INFO[0000] 📦 Deploying Node Exporter ...
135+
INFO[0006] ✅ Success.
136+
INFO[0006] 📦 Deploying Kube State Metrics…
137+
INFO[0022] ✅ Success.
138+
INFO[0022] 📦 Deploying Grafana…
139+
INFO[0055] ✅ Success.
140+
INFO[0055] 📦 Deploying Blackbox Exporter…
141+
INFO[0064] ✅ Success.
142+
INFO[0064] 📦 Deploying Alert Manager…
143+
INFO[0074] ✅ Success.
144+
INFO[0074] 📦 Deploying Prometheus…
145+
INFO[0075] ✅ Success.
146+
INFO[0075] 📦 Deploying Helm Exporter…
147+
INFO[0076] ✅ Success.
148+
INFO[0076] 📦 Deploying Karma…
149+
INFO[0078] ✅ Success.
150+
INFO[0078] 📦 Deploying Loki…
151+
INFO[0164] ✅ Success.
152+
INFO[0164] 📦 Deploying Promtail…
153+
INFO[0166] ✅ Success.
154+
INFO[0166] 🛬 Installation completed successfully. Time for a break, maybe?
155155
```
156156

157157
### Going Further

content/kubermatic/main/tutorials-howtos/networking/expose-strategies/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ which limits the number of total clusters per Seed based on the NodePort range c
2929

3030
By default, the nodeport-proxy is enabled for this expose strategy. If services of type LoadBalancer are
3131
available in the Seed, all the services of all user clusters will be made available through a single LoadBalancer
32-
service in front of the nodeport-proxy. This approach however has a limitation on sme cloud platforms, where the
32+
service in front of the nodeport-proxy. This approach however has a limitation on some cloud platforms, where the
3333
number of listeners per load balancer is limited, which can limit the total number of user clusters per Seed even more.
3434
[The nodeport-proxy can be disabled](#disabling-nodeport-proxy-for-the-nodeport-expose-strategy)
3535
if your platform doesn't support LoadBalancer services or if the front LoadBalancer service is not required.

content/kubermatic/main/tutorials-howtos/storage/disable-csi-driver/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,4 +48,4 @@ spec:
4848
disableCsiDriver: true
4949
```
5050

51-
User clusters that already have the CSI driver addon installed can also be updated to disable the CSI driver addon using the `disableCsiDriver: true` option. However, before doing this the cluster admin must ensure that none of the PVCs & PVs that belong to the storage class that has the CSI driver as the provisioner are in use, if there is any PVC that belongs to a storage class that uses the CSI driver KKP will not disable it. If for any reason the admin removes the storage class even if it has PVs that are in use & then disables the CSI driver, it will have an undesired impact on the cluster. Hence, it is expected that the admin is careful while making this change & does not remove the storage class before disabling the CSI driver.
51+
User clusters that already have the CSI driver addon installed can also be updated to disable the CSI driver addon using the `disableCsiDriver: true` option. However, before doing this the cluster admin must ensure that none of the PVCs & PVs that belong to the storage class that has the CSI driver as the provisioner are in use, if there is any PVC that belongs to a storage class that uses the CSI driver KKP will not disable it. If for any reason the admin removes the storage class even if it has PVs that are in use & then disables the CSI driver, it will have an undesired impact on the cluster. Hence, it is expected that the admin is careful while making this change & does not remove the storage class before disabling the CSI driver.

content/kubermatic/v2.12/advanced/addons/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ helm upgrade --install --wait --timeout 300 --values values.yaml --namespace kub
5757

5858
##### Setting a custom docker registry
5959

60-
In case you want to set a custom registry for all addons, you can specify the `-overwrideRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
60+
In case you want to set a custom registry for all addons, you can specify the `-overwriteRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
6161
It will set the specified registry on all control plane components & addons.
6262

6363
### How to Add a Custom Addon

content/kubermatic/v2.12/advanced/oidc_auth/_index.en.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ This is best done by directly changing the entries in the corresponding `values.
7878
The value for `.Values.kubermatic.auth.issuerCookieKey` can be randomly generated (e.g. `openssl rand -hex 32`) and should have 32 or 64 bytes.
7979
{{% /notice %}}
8080

81-
`kubermatic-controll-manager` must be run with the following flags:
81+
`kubermatic-controller-manager` must be run with the following flags:
8282

8383
```plaintext
8484
--feature-gates={{ .Values.kubermatic.controller.featureGates }} # must contain "OpenIDAuthPlugin=true"
@@ -96,7 +96,7 @@ You can set it by changing the `kubermatic.ui.config` entry in the `values.yaml`
9696

9797
### Root CA Certificates Chain
9898

99-
In order to verify OIDC provider's certificate in `kubermatic-controll-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
99+
In order to verify OIDC provider's certificate in `kubermatic-controller-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
100100
chain including all intermediary CAs certificates. Note that we expect that all certificates will be PEM encoded.
101101

102102
For example if the certificate used by your provider was issued by Let's Encrypt. You can visit [Let's Encrypt](https://letsencrypt.org/certificates) to download the necessary certificates

content/kubermatic/v2.13/advanced/addons/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ helm upgrade --install --wait --timeout 300 --values values.yaml --namespace kub
5757

5858
##### Setting a Custom Docker Registry
5959

60-
In case you want to set a custom registry for all addons, you can specify the `-overwrideRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
60+
In case you want to set a custom registry for all addons, you can specify the `-overwriteRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
6161
It will set the specified registry on all control plane components & addons.
6262

6363
### Accessible Addons

content/kubermatic/v2.13/advanced/oidc_auth/_index.en.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ This is best done by directly changing the entries in the corresponding `values.
7878
The value for `.Values.kubermatic.auth.issuerCookieKey` can be randomly generated (e.g. `openssl rand -hex 32`) and should have 32 or 64 bytes.
7979
{{% /notice %}}
8080

81-
`kubermatic-controll-manager` must be run with the following flags:
81+
`kubermatic-controller-manager` must be run with the following flags:
8282

8383
```plaintext
8484
--feature-gates={{ .Values.kubermatic.controller.featureGates }} # must contain "OpenIDAuthPlugin=true"
@@ -96,7 +96,7 @@ You can set it by changing the `kubermatic.ui.config` entry in the `values.yaml`
9696

9797
### Root CA Certificates Chain
9898

99-
In order to verify OIDC provider's certificate in `kubermatic-controll-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
99+
In order to verify OIDC provider's certificate in `kubermatic-controller-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
100100
chain including all intermediary CAs certificates. Note that we expect that all certificates will be PEM encoded.
101101

102102
For example if the certificate used by your provider was issued by Let's Encrypt. You can visit [Let's Encrypt](https://letsencrypt.org/certificates) to download the necessary certificates

content/kubermatic/v2.14/advanced/oidc_auth/_index.en.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ This is best done by directly changing the entries in the corresponding `values.
7878
The value for `.Values.kubermatic.auth.issuerCookieKey` can be randomly generated (e.g. `openssl rand -hex 32`) and should have 32 or 64 bytes.
7979
{{% /notice %}}
8080

81-
`kubermatic-controll-manager` must be run with the following flags:
81+
`kubermatic-controller-manager` must be run with the following flags:
8282

8383
```plaintext
8484
--feature-gates={{ .Values.kubermatic.controller.featureGates }} # must contain "OpenIDAuthPlugin=true"
@@ -96,7 +96,7 @@ You can set it by changing the `kubermatic.ui.config` entry in the `values.yaml`
9696

9797
### Root CA Certificates Chain
9898

99-
In order to verify OIDC provider's certificate in `kubermatic-controll-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
99+
In order to verify OIDC provider's certificate in `kubermatic-controller-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
100100
chain including all intermediary CAs certificates. Note that we expect that all certificates will be PEM encoded.
101101

102102
For example if the certificate used by your provider was issued by Let's Encrypt. You can visit [Let's Encrypt](https://letsencrypt.org/certificates) to download the necessary certificates

content/kubermatic/v2.21/architecture/supported-providers/kubevirt/kubevirt.en.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -446,9 +446,9 @@ What happens if we update a `VirtualMachineInstancePreset` existing in the `defa
446446
- The updated `VirtualMachineInstancePreset` will be reconciled from the `default` namespace into the `cluster-xyz` namespace.
447447
Give it some time to be reconciled. The reconciliation interval is configurable (refer to `providerReconciliationInterval`
448448
in [Seed configuration]({{< ref "../../../tutorials-howtos/project-and-cluster-management/seed-cluster/" >}})
449-
- For all `VirtualMachineIsntances` already created, this will have no impact.
449+
- For all `VirtualMachineInstances` already created, this will have no impact.
450450
Please refer to [KubeVirt Preset documentation](https://kubevirt.io/user-guide/virtual_machines/presets/#updating-a-virtualmachineinstancepreset)
451-
- The update will then be effective for new `VirtualMachineIsntances`.
451+
- The update will then be effective for new `VirtualMachineInstances`.
452452

453453
*Note 2:* Limitation of the list of reconciled fields.
454454

content/kubermatic/v2.22/tutorials-howtos/networking/expose-strategies/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ which limits the number of total clusters per Seed based on the NodePort range c
2525

2626
By default, the nodeport-proxy is enabled for this expose strategy. If services of type LoadBalancer are
2727
available in the Seed, all the services of all user clusters will be made available through a single LoadBalancer
28-
service in front of the nodeport-proxy. This approach however has a limitation on sme cloud platforms, where the
28+
service in front of the nodeport-proxy. This approach however has a limitation on some cloud platforms, where the
2929
number of listeners per load balancer is limited, which can limit the total number of user clusters per Seed even more.
3030
[The nodeport-proxy can be disabled](#disabling-nodeport-proxy-for-the-nodeport-expose-strategy)
3131
if your platform doesn't support LoadBalancer services or if the front LoadBalancer service is not required.

content/kubermatic/v2.23/tutorials-howtos/networking/expose-strategies/_index.en.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ which limits the number of total clusters per Seed based on the NodePort range c
2828

2929
By default, the nodeport-proxy is enabled for this expose strategy. If services of type LoadBalancer are
3030
available in the Seed, all the services of all user clusters will be made available through a single LoadBalancer
31-
service in front of the nodeport-proxy. This approach however has a limitation on sme cloud platforms, where the
31+
service in front of the nodeport-proxy. This approach however has a limitation on some cloud platforms, where the
3232
number of listeners per load balancer is limited, which can limit the total number of user clusters per Seed even more.
3333
[The nodeport-proxy can be disabled](#disabling-nodeport-proxy-for-the-nodeport-expose-strategy)
3434
if your platform doesn't support LoadBalancer services or if the front LoadBalancer service is not required.

content/kubermatic/v2.24/tutorials-howtos/monitoring-logging-alerting/master-seed/customization/thanos.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ weight = 20
77

88
This page explains how we can integrate [Thanos](https://thanos.io/) long term storage of metrics with KKP seed Prometheus
99

10-
## Pre-requsites
10+
## Prerequisites
1111
1. Helm is installed.
1212
1. KKP v2.22.4+ is installed in the cluster.
1313
1. KKP Prometheus chart has been deployed in each seed where you want to store long term metrics
@@ -20,16 +20,16 @@ Below page outlines
2020

2121
## Install thanos chart
2222

23-
You can install the Thanos Helm chart from Bitnami chart repository
23+
You can install the Thanos Helm chart from Bitnami chart repository
2424
```shell
2525
HELM_EXPERIMENTAL_OCI=1 helm upgrade --install thanos \
2626
--namespace monitoring --create-namespace\
2727
--version 12.8.6 \
2828
-f thanos-values.yaml \
29-
oci://registry-1.docker.io/bitnamicharts/thanos
29+
oci://registry-1.docker.io/bitnamicharts/thanos
3030
```
3131

32-
### Basic Thanos Customization file
32+
### Basic Thanos Customization file
3333
You can configure Thanos to store the metrics in any s3 compatible storage as well as many other popular cloud storage solutions.
3434

3535
Below yaml snippet uses Azure Blob storage configuration. You can refer to all [supported object storage configurations](https://thanos.io/tip/thanos/storage.md/#supported-clients).
@@ -93,7 +93,7 @@ prometheus:
9393
- name: thanos
9494
mountPath: /etc/thanos
9595
secretName: prometheus-thanos
96-
96+
9797
# Add thanos sidecar to prometheus pods
9898
sidecarContainers:
9999
thanos:

0 commit comments

Comments
 (0)