Skip to content

Commit 6dd64f2

Browse files
committed
typos etc.
1 parent e56aa61 commit 6dd64f2

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

modules/tutorials/pages/jupyterhub.adoc

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ spec:
3434
nodePort: 31093 # <1>
3535
----
3636
37-
<1> Static value for the purposes of the demo.
37+
<1> Static value for the purposes of the demo
3838
3939
They are:
4040
@@ -302,7 +302,7 @@ This section of the JupyterHub configuration specifies that we are using Generic
302302
303303
<1> We need to either provide a list of users using `allowed_users`, or to explicitly allow _all_ users, as done here.
304304
We will delegate this to Keycloak so that we do not have to maintain users in two places
305-
<2> Each admin user will have access to an Admin tab on the JupyterHub UI where certain user-management actions can be carried out.
305+
<2> Each admin user will have access to an Admin tab on the JupyterHub UI where certain user-management actions can be carried out
306306
<3> Define the Keycloak scope
307307
<4> Specifies which authenticator class to use
308308
@@ -352,8 +352,7 @@ This can be seen below:
352352
353353
<1> Specify which certificate(s) should be used internally (in the code above this is using the default certificate, but is included for the sake of completion)
354354
<2> Create the certificate with the same secret class (`tls`) as Keycloak
355-
<3> Mount this certificate
356-
If the default file is not overwritten, but is mounted to a new file in the same directory, then the certificates should be updated by calling e.g. `update-ca-certificates`.
355+
<3> Mount this certificate: if the default file is not overwritten, but is mounted to a new file in the same directory, then the certificates should be updated by calling e.g. `update-ca-certificates`
357356
<4> Ensure python is using the same certificate
358357
359358
[#endpoints]
@@ -382,7 +381,7 @@ As mentioned in the <<services, Services>> section above, we want to define the
382381
[#driver]
383382
=== Driver Service (Spark)
384383
385-
NOTE: When using Spark from within a notebook, please the <<provisos, Provisos>> section below.
384+
NOTE: When using Spark from within a notebook, please take note of the <<provisos, Provisos>> section below.
386385
387386
In the same way, we can use another script to define a driver service for each user.
388387
This is essential when using Spark from within a JupyterHub notebook so that executor Pods can be spawned from the user's kernel in a user-specific way.
@@ -432,7 +431,7 @@ This script instructs JupyterHub to use `KubeSpawner` to create a service refere
432431
433432
=== Profiles
434433
435-
The `singleuser.profileList` section of the Helm chart values allows us to define notebook profiles by setting the CPU, Memory and Image combinations that can be selected. For instance, the profiles below allows us to select 2/4/etc. CPUs, 4/8/etc. GB RAM and to select one of two images.
434+
The `singleuser.profileList` section of the Helm chart values allows us to define notebook profiles by setting the CPU, Memory and Image combinations that can be selected. For instance, the profiles below allows us to select 2/4/etc. CPUs, 4/8/etc. GB RAM and to choose between one of two images.
436435
437436
[source,yaml]
438437
----
@@ -541,9 +540,9 @@ To avoid this, care needs to be taken to use images for the notebook and the Spa
541540
[#provisos]
542541
=== Provisos
543542
544-
WARNING: When running a distributed Spark cluster from within a JupyterHub notebook, the notebook acts as the driver and requests executors Pods from k8s.
543+
WARNING: When running a distributed Spark cluster from within a JupyterHub notebook, the notebook acts as the driver and requests executor Pods from k8s.
545544
These Pods in turn can mount *all* volumes and Secrets in that namespace.
546-
To prevent this from breaking user separation, it is planned to use an OPA gatekeeper to define OPA rules that restrict what the created executor Pods can mount. This is not yet implemented in the demo nor reflected in this tutorial.
545+
To prevent this from breaking user isolation, it is planned to use an OPA gatekeeper to define OPA rules that restrict what the created executor Pods can mount. This is not yet implemented in the demo nor reflected in this tutorial.
547546
548547
=== Overview
549548

0 commit comments

Comments
 (0)