Remove inappropriate .spelling entry (#5087)

This commit is contained in:
Frank Budinsky 2019-09-30 14:32:23 -04:00 committed by Istio Automation
parent 7701cc2387
commit 60aa772335
2 changed files with 1 additions and 2 deletions

View File

@ -404,7 +404,6 @@ platform-specific
pluggability
pluggable
png
PodSecurityPolicy
pprof
pre-connected
pre-specified

View File

@ -67,7 +67,7 @@ The following table shows all the options that the `istio-cni` Helm chart suppor
| `cniBinDir` | | `/opt/cni/bin` | Must be the same as the environment's `--cni-bin-dir` setting (`kubelet` parameter). |
| `cniConfDir` | | `/etc/cni/net.d` | Must be the same as the environment's `--cni-conf-dir` setting (`kubelet` parameter). |
| `cniConfFileName` | | | Leave unset to auto-find the first file in the `cni-conf-dir` (as `kubelet` does). Primarily used for testing `install-cni` plugin configuration. If set, `install-cni` will inject the plugin configuration into this file in the `cni-conf-dir`. |
| `psp_cluster_role` | | | This value refers to a `ClusterRole` and can be used to create a `RoleBinding` in the namespace of `istio-cni`. This is useful if you use [PodSecurityPolicy](https://kubernetes.io/docs/concepts/policy/pod-security-policy) and want to allow `istio-cni` to run as `priviliged` Pods. |
| `psp_cluster_role` | | | This value refers to a `ClusterRole` and can be used to create a `RoleBinding` in the namespace of `istio-cni`. This is useful if you use [Pod Security Policies](https://kubernetes.io/docs/concepts/policy/pod-security-policy) and want to allow `istio-cni` to run as `priviliged` Pods. |
### Excluding specific Kubernetes namespaces