mirror of https://github.com/kubernetes/kops.git
docs: trivial fix some typos
Although it is spelling mistakes, it might make an affects while reading. Signed-off-by: Nguyen Hai Truong <truongnh@vn.fujitsu.com>
This commit is contained in:
parent
03aa9a4cce
commit
c6cdc34117
|
@ -9,7 +9,7 @@ The [node authorization service] is an experimental service which in the absence
|
|||
- the client certificate by default is added into the system:nodes rbac group _(note, if you are using PSP this is automatically bound by kops on your behalf)_.
|
||||
- the kubelet at this point has a server certificate and the client api certificate and good to go.
|
||||
|
||||
#### **Integretion with Kops**
|
||||
#### **Integration with Kops**
|
||||
|
||||
The node authorization service is run on the master as a daemonset, by default dns is _node-authorizer-internal.dns_zone_:10443 and added via same mechanism at the internal kube-apiserver i.e. annotations on the kube-apiserver pods which is picked up the dns-controller and added to the dns zone.
|
||||
|
||||
|
|
|
@ -146,7 +146,7 @@ Be aware of the following limitations:
|
|||
|
||||
## Flatcar
|
||||
|
||||
Flatcar is a friendly fork of CoreOS and as such, compatible with it. If some issues occurs with it, it is likely that also CoreOS miight be affected. If you encounter any problem please report it to us.
|
||||
Flatcar is a friendly fork of CoreOS and as such, compatible with it. If some issues occurs with it, it is likely that also CoreOS might be affected. If you encounter any problem please report it to us.
|
||||
|
||||
The following steps are known:
|
||||
|
||||
|
|
Loading…
Reference in New Issue