Skip to content

Commit d536e46

Browse files
committed
fix typos
1 parent 0e33f9a commit d536e46

File tree

39 files changed

+85
-87
lines changed

39 files changed

+85
-87
lines changed

content/en/docs/concepts/cluster-administration/system-metrics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ allow-list:
214214
215215
Additionally, the `cardinality_enforcement_unexpected_categorizations_total` meta-metric records the
216216
count of unexpected categorizations during cardinality enforcement, that is, whenever a label value
217-
is encountered that is not allowed with respect to the allow-list contraints.
217+
is encountered that is not allowed with respect to the allow-list constraints.
218218

219219
## {{% heading "whatsnext" %}}
220220

content/en/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ The general workflow of a device plugin includes the following steps:
114114
// informed allocation decision when possible.
115115
rpc GetPreferredAllocation(PreferredAllocationRequest) returns (PreferredAllocationResponse) {}
116116
117-
// PreStartContainer is called, if indicated by Device Plugin during registeration phase,
117+
// PreStartContainer is called, if indicated by Device Plugin during registration phase,
118118
// before each container start. Device plugin can run device specific operations
119119
// such as resetting the device before making devices available to the container.
120120
rpc PreStartContainer(PreStartContainerRequest) returns (PreStartContainerResponse) {}
@@ -346,7 +346,7 @@ update and Kubelet needs to be restarted to reflect the correct resource capacit
346346
{{< /note >}}
347347

348348
```gRPC
349-
// AllocatableResourcesResponses contains informations about all the devices known by the kubelet
349+
// AllocatableResourcesResponses contains information about all the devices known by the kubelet
350350
message AllocatableResourcesResponse {
351351
repeated ContainerDevices devices = 1;
352352
repeated int64 cpu_ids = 2;

content/en/docs/concepts/policy/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,5 +64,5 @@ Dynamic Admission Controllers that act as flexible policy engines are being deve
6464
## Apply policies using Kubelet configurations
6565

6666
Kubernetes allows configuring the Kubelet on each worker node. Some Kubelet configurations act as policies:
67-
* [Process ID limts and reservations](/docs/concepts/policy/pid-limiting/) are used to limit and reserve allocatable PIDs.
67+
* [Process ID limits and reservations](/docs/concepts/policy/pid-limiting/) are used to limit and reserve allocatable PIDs.
6868
* [Node Resource Managers](/docs/concepts/policy/node-resource-managers/) can manage compute, memory, and device resources for latency-critical and high-throughput workloads.

content/en/docs/concepts/security/security-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -390,7 +390,7 @@ availability state and recommended to improve your security posture:
390390

391391
[`NodeRestriction`](/docs/reference/access-authn-authz/admission-controllers/#noderestriction)
392392
: Restricts kubelet's permissions to only modify the pods API resources they own
393-
or the node API ressource that represent themselves. It also prevents kubelet
393+
or the node API resource that represent themselves. It also prevents kubelet
394394
from using the `node-restriction.kubernetes.io/` annotation, which can be used
395395
by an attacker with access to the kubelet's credentials to influence pod
396396
placement to the controlled node.

content/en/docs/concepts/services-networking/endpoint-slices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ perfectly full distribution of EndpointSlices. As an example, if there are 10
210210
new endpoints to add and 2 EndpointSlices with room for 5 more endpoints each,
211211
this approach will create a new EndpointSlice instead of filling up the 2
212212
existing EndpointSlices. In other words, a single EndpointSlice creation is
213-
preferrable to multiple EndpointSlice updates.
213+
preferable to multiple EndpointSlice updates.
214214

215215
With kube-proxy running on each Node and watching EndpointSlices, every change
216216
to an EndpointSlice becomes relatively expensive since it will be transmitted to

content/en/docs/concepts/workloads/controllers/job.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -395,7 +395,7 @@ for pod failures independently for each index. To do so, set the
395395
`.spec.backoffLimitPerIndex` to specify the maximal number of pod failures
396396
per index.
397397

398-
When the per-index backoff limit is exceeded for an index, Kuberentes considers the index as failed and adds it to the
398+
When the per-index backoff limit is exceeded for an index, Kubernetes considers the index as failed and adds it to the
399399
`.status.failedIndexes` field. The succeeded indexes, those with a successfully
400400
executed pods, are recorded in the `.status.completedIndexes` field, regardless of whether you set
401401
the `backoffLimitPerIndex` field.
@@ -940,7 +940,7 @@ the Job status, allowing the Pod to be removed by other controllers or users.
940940

941941
{{< note >}}
942942
See [My pod stays terminating](/docs/tasks/debug/debug-application/debug-pods/) if you
943-
observe that pods from a Job are stucked with the tracking finalizer.
943+
observe that pods from a Job are stuck with the tracking finalizer.
944944
{{< /note >}}
945945

946946
### Elastic Indexed Jobs

content/en/docs/concepts/workloads/controllers/replicaset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ pod1 1/1 Running 0 36s
225225
pod2 1/1 Running 0 36s
226226
```
227227

228-
In this manner, a ReplicaSet can own a non-homogenous set of Pods
228+
In this manner, a ReplicaSet can own a non-homogeneous set of Pods
229229

230230
## Writing a ReplicaSet manifest
231231

content/en/docs/contribute/style/diagram-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -624,7 +624,7 @@ caption and the diagram referral.
624624
flowchart
625625
A[Diagram<br><br>Inline Mermaid or<br>SVG image files]
626626
B[Diagram Caption<br><br>Add Figure Number. and<br>Caption Text]
627-
C[Diagram Referral<br><br>Referenence Figure Number<br>in text]
627+
C[Diagram Referral<br><br>Reference Figure Number<br>in text]
628628

629629
classDef box fill:#fff,stroke:#000,stroke-width:1px,color:#000;
630630
class A,B,C box

content/en/docs/reference/access-authn-authz/certificate-signing-requests.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -438,7 +438,7 @@ controller in the cluster, so they have several security features:
438438
`<signerNameDomain>/*`.
439439
* Signer-linked ClusterTrustBundles **must** be named with a prefix derived from
440440
their `spec.signerName` field. Slashes (`/`) are replaced with colons (`:`),
441-
and a final colon is appended. This is followed by an arbitary name. For
441+
and a final colon is appended. This is followed by an arbitrary name. For
442442
example, the signer `example.com/mysigner` can be linked to a
443443
ClusterTrustBundle `example.com:mysigner:<arbitrary-name>`.
444444

content/en/docs/reference/access-authn-authz/service-accounts-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ purged by the control plane.
166166
If users use an invalidated auto-generated token, the token validator will
167167

168168
1. add an audit annotation for the key-value pair
169-
`authentication.k8s.io/legacy-token-invalidated: <secret name>/<namepace>`,
169+
`authentication.k8s.io/legacy-token-invalidated: <secret name>/<namespace>`,
170170
1. increment the `invalid_legacy_auto_token_uses_total` metric count,
171171
1. update the Secret label `kubernetes.io/legacy-token-last-used` with the new
172172
date,

0 commit comments

Comments
 (0)