mirror of https://github.com/kubernetes/kops.git
fix-up some spelling mistakes
This commit is contained in:
parent
27c035b56c
commit
7f64de4c34
|
@ -178,7 +178,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl
|
|||
kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides IAMRole=ExistsAndWarnIfChanges,IAMRolePolicy=ExistsAndWarnIfChanges,IAMInstanceProfileRole=ExistsAndWarnIfChanges
|
||||
```
|
||||
|
||||
*Everytime `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.*
|
||||
*Every time `kops update cluster` is run, it must include the above `--lifecycle-overrides` unless a non-`security` phase is specified.*
|
||||
|
||||
Finally, perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration:
|
||||
|
||||
|
|
|
@ -46,7 +46,7 @@ Now run a cluster update to create the new launch configuration, using [lifecycl
|
|||
kops update cluster ${CLUSTER_NAME} --yes --lifecycle-overrides SecurityGroup=ExistsAndWarnIfChanges,SecurityGroupRule=ExistsAndWarnIfChanges
|
||||
```
|
||||
|
||||
*Everytime `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.*
|
||||
*Every time `kops update cluster` is ran, it must include the above `--lifecycle-overrides`.*
|
||||
|
||||
Then perform a rolling update in order to replace EC2 instances in the ASG with the new launch configuration:
|
||||
|
||||
|
|
|
@ -18,7 +18,7 @@ set -x
|
|||
|
||||
CACHE_DIR=/nvidia-device-plugin
|
||||
|
||||
# Load Passthrough enviroment variables from the original kops hook
|
||||
# Load Passthrough environment variables from the original kops hook
|
||||
source $CACHE_DIR/environment
|
||||
|
||||
# Support both deviceplugin and legacy (accelerator) GPU modes.
|
||||
|
|
|
@ -525,7 +525,7 @@ spec:
|
|||
volumePluginDirectory:
|
||||
description: The full path of the directory in which to search for
|
||||
additional third party volume plugins (this path must be writeable,
|
||||
dependant on your choice of OS)
|
||||
dependent on your choice of OS)
|
||||
type: string
|
||||
volumeStatsAggPeriod:
|
||||
description: VolumeStatsAggPeriod is the interval for kubelet to
|
||||
|
|
|
@ -28,7 +28,7 @@ type alwaysAllowAuth struct{}
|
|||
|
||||
// NewAuthorizer creates and returns a alwaysAllow node authorizer
|
||||
func NewAuthorizer() (server.Authorizer, error) {
|
||||
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments")
|
||||
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments")
|
||||
|
||||
return &alwaysAllowAuth{}, nil
|
||||
}
|
||||
|
|
|
@ -28,7 +28,7 @@ type alwaysallowVerifier struct{}
|
|||
|
||||
// NewVerifier creates and returns a new Verifier
|
||||
func NewVerifier() (server.Verifier, error) {
|
||||
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritive checks and should only be used in test environments")
|
||||
utils.Logger.Warn("note the alwaysallow authorizer performs no authoritative checks and should only be used in test environments")
|
||||
|
||||
return &alwaysallowVerifier{}, nil
|
||||
}
|
||||
|
|
|
@ -109,7 +109,7 @@ func (c *Config) UseFeature(name string) bool {
|
|||
return false
|
||||
}
|
||||
|
||||
// NodeRegistration is an incomming request
|
||||
// NodeRegistration is an incoming request
|
||||
type NodeRegistration struct {
|
||||
// Spec is the request specification
|
||||
Spec NodeRegistrationSpec
|
||||
|
|
|
@ -96,7 +96,7 @@ func (t *LaunchTemplate) RenderAWS(c *awsup.AWSAPITarget, a, ep, changes *Launch
|
|||
Name: t.IAMInstanceProfile.Name,
|
||||
}
|
||||
}
|
||||
// @step: are the node publically facing
|
||||
// @step: are the node publicly facing
|
||||
if fi.BoolValue(t.AssociatePublicIP) {
|
||||
lc.NetworkInterfaces = append(lc.NetworkInterfaces,
|
||||
&ec2.LaunchTemplateInstanceNetworkInterfaceSpecificationRequest{
|
||||
|
|
|
@ -130,7 +130,7 @@ func (e *FloatingIP) GetDependencies(tasks map[string]fi.Task) []fi.Task {
|
|||
if _, ok := task.(*LB); ok {
|
||||
deps = append(deps, task)
|
||||
}
|
||||
// We cant create a floating IP until the router with access to the external network
|
||||
// We can't create a floating IP until the router with access to the external network
|
||||
// Has created an interface to our subnet
|
||||
if _, ok := task.(*RouterInterface); ok {
|
||||
deps = append(deps, task)
|
||||
|
|
Loading…
Reference in New Issue