Skip to content

Commit b4f93e9

Browse files
authored
some typo cleanup (#10)
* typo fixups * fix up some aws-isms * fix some grammar/spacing nits
1 parent 3aaafd2 commit b4f93e9

17 files changed

Lines changed: 29 additions & 29 deletions

docs/announcements.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
= Announcements
44
:info_doctype: chapter
55

6-
This topic covers past annoucements of new Eksctl features.
6+
This topic covers past announcements of new Eksctl features.
77

88
== Managed Nodegroups Default
99

docs/clusters/access-entries.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ You can use eksctl to manage EKS Access Entries. Use access entries to grant Kub
66

77
This topic covers how to use eksctl to manage access entries. For general information about access entries, see link:eks/latest/userguide/access-entries.html["Grant IAM users access to Kubernetes with EKS access entries",type="documentation"].
88

9-
You can attach Kubernetes access policies defined by AWS, or assocoiate an IAM Identity with a Kubernetes group.
9+
You can attach Kubernetes access policies defined by AWS, or associate an IAM Identity with a Kubernetes group.
1010

1111
For more information about the available pre-defined policies, see link:eks/latest/userguide/access-policies.html#access-policy-permissions["Associate access policies with access entries",type="documentation"].
1212

13-
If you need to define customer Kubernetes policies, associate the IAM Identity with a Kubernetes group, and grant permissions to that group.
13+
If you need to define custom Kubernetes policies, associate the IAM Identity with a Kubernetes group, and grant permissions to that group.
1414

1515
== Cluster authentication mode
1616

@@ -101,7 +101,7 @@ The integration with access entries for these resources will be achieved behind
101101

102102
Each access entry has a type. For authorizing self-managed nodegroups, `eksctl` will create a unique access entry for each nodegroup with the principal ARN set to the node role ARN and type set to either `EC2_LINUX` or `EC2_WINDOWS` depending on nodegroup amiFamily.
103103

104-
When creating your own access entries, you can also specify `EC2_LINUX` (for an IAM role used with Linux or Bottlerocket self-managed nodes), `EC2_WINDOWS` (for an IAM roles used with Windows self-managed nodes), `FARGATE_LINUX` (for an IAM roles used with AWS Fargate (Fargate)), or `STANDARD` as a type. If you don't specify a type, the default type is set to `STANDARD`.
104+
When creating your own access entries, you can also specify `EC2_LINUX` (for an IAM role used with Linux or Bottlerocket self-managed nodes), `EC2_WINDOWS` (for IAM roles used with Windows self-managed nodes), `FARGATE_LINUX` (for IAM roles used with AWS Fargate (Fargate)), or `STANDARD` as a type. If you don't specify a type, the default type is set to `STANDARD`.
105105

106106
[NOTE]
107107
====
@@ -128,7 +128,7 @@ For an example config file for creating access entries, see https://github.com/e
128128

129129
== Get access entry
130130

131-
The user can retieve all access entries associated with a certain cluster by running one of the following:
131+
The user can retrieve all access entries associated with a certain cluster by running one of the following:
132132

133133
[,shell]
134134
----

docs/clusters/creating-and-managing-clusters.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ nodeGroups:
9595
imageBuilder: true
9696
----
9797

98-
The cluster name or nodegroup name must contain only alphanumeric characters (case-sensitive) and hyphens. It must start with an alphabetic character and can't exceed 128 characters, or you will receive a validation error. For more information, see link:AWSCloudFormation/latest/UserGuide/cfn-using-console-create-stack-parameters.html["Create a stack from the CloudFormation console",type="documentation"] in the AWS CLoudFormation user guide.
98+
The cluster name or nodegroup name must contain only alphanumeric characters (case-sensitive) and hyphens. It must start with an alphabetic character and can't exceed 128 characters, or you will receive a validation error. For more information, see link:AWSCloudFormation/latest/UserGuide/cfn-using-console-create-stack-parameters.html["Create a stack from the CloudFormation console",type="documentation"] in the AWS CloudFormation user guide.
9999

100100
== Update kubeconfig for new cluster
101101

docs/clusters/customizing-the-kubelet.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ nodeGroups:
4545

4646
In this example, given instances of type `m5a.xlarge` which have 4 vCPUs and 16GiB of memory, the `Allocatable` amount
4747
of CPUs would be 3.4 and 15.4 GiB of memory. It is important to know that the values specified in the config file for
48-
the the fields in `kubeletExtraconfig` will completely overwrite the default values specified by eksctl.
48+
the fields in `kubeletExtraConfig` will completely overwrite the default values specified by eksctl.
4949
However, omitting one or more `kubeReserved` parameters will cause the missing parameters to be defaulted to sane
5050
values based on the aws instance type being used.
5151

docs/clusters/eksctl-karpenter.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ spec:
106106
- alias: al2023@latest # Amazon Linux 2023
107107
----
108108

109-
Note that you must specify one of `role` or `instanceProfile` for lauch nodes. If you choose to use `instanceProfile`
109+
Note that you must specify one of `role` or `instanceProfile` for launch nodes. If you choose to use `instanceProfile`
110110
the name of the profile created by `eksctl` follows the pattern: `eksctl-KarpenterNodeInstanceProfile-<cluster-name>`.
111111

112112
## Automatic Security Group Tagging

docs/clusters/fargate.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ pod to match a selector entry. A pod only needs to match one selector
189189
entry to run on the profile. Any pod that matches all the conditions in
190190
a selector field would be scheduled to be run on Fargate. Any pods not
191191
matching either the whitelisted Namespaces but where the user manually
192-
set the scheduler: fargate-scheduler filed would be stuck in a Pending
192+
set the scheduler: fargate-scheduler field would be stuck in a Pending
193193
state, as they were not authorized to run on Fargate.
194194

195195
Profiles must meet the following requirements:
@@ -237,7 +237,7 @@ cluster, it’s also possible to create a Fargate profile with the
237237
NOTE: This operation is only supported on clusters that run on the
238238
EKS platform version `eks.5` or higher.
239239

240-
NOTE: If the existing was created with a version of `eksctl` prior to 0.11.0, you will need to run `eksctl upgrade
240+
NOTE: If the existing cluster was created with a version of `eksctl` prior to 0.11.0, you will need to run `eksctl upgrade
241241
cluster` before creating the Fargate profile.
242242

243243
[source,console]

docs/clusters/unowned-clusters.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,4 +99,4 @@ vpc:
9999
...
100100
----
101101

102-
Fore more information on VPC configuration options, see xref:networking[Networking].
102+
For more information on VPC configuration options, see xref:networking[Networking].

docs/deployment/deployment.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ For the most accurate information about EKS deployment options, see link:eks/lat
1717
** AWS Outposts is a family of fully managed solutions delivering AWS infrastructure and services to virtually any on-premises or edge location for a truly consistent hybrid experience.
1818
** AWS Outposts support in eksctl lets you create local clusters with the entire Kubernetes cluster, including the EKS control plane and worker nodes, running locally on AWS Outposts.
1919
* <<hybrid-nodes>>
20-
** Run on-premises and edge applications on customer-managed infrastructure with the same AWS EKS clusters, features, and tools you use in the AWS Cloud.
20+
** Run on-premises and edge applications on customer-managed infrastructure with the same Amazon EKS clusters, features, and tools you use in AWS.
2121

2222
include::eksctl-anywhere.adoc[leveloffset=+1]
2323

docs/iam/iam-identity-mappings.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
[#iam-identity-mappings]
33
= Manage IAM users and roles
44

5-
NOTE: AWS suggests migraitng to <<pod-identity-associations>> from the `aws-auth` ConfigMap.
5+
NOTE: AWS suggests migrating to <<pod-identity-associations>> from the `aws-auth` ConfigMap.
66

77
EKS clusters use IAM users and roles to control access to the cluster. The rules are implemented in a config map
88

docs/iam/iam-policies.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
[#iam-policies]
33
= IAM policies
44

5-
You can attach Instance Roles to node groups. Workloads running on the node will receive IAM permissions from the node. For mroe information, see link:AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2,type="documentation"].
5+
You can attach Instance Roles to node groups. Workloads running on the node will receive IAM permissions from the node. For more information, see link:AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2,type="documentation"].
66

77
This page lists the pre-defined IAM policy templates available in eksctl. These templates simplify the process of granting your EKS nodes the appropriate AWS service permissions without having to manually create custom IAM policies.
88

0 commit comments

Comments
 (0)