From e29ba1db0bafc1a565baf65cefe83c9e84020678 Mon Sep 17 00:00:00 2001 From: Robert Volkmann Date: Mon, 18 Nov 2024 13:35:13 +0100 Subject: [PATCH] Fix typos --- control-plane/roles/gardener/README.md | 2 +- control-plane/roles/isolated-clusters/README.md | 4 ++-- .../grafana-dashboards/gardener/gardener-usage-overview.yaml | 2 +- .../grafana-dashboards/gardener/shoot-customization.yaml | 2 +- .../templates/grafana-dashboards/sonic-exporter.yaml | 2 +- .../roles/monitoring/templates/prometheus-stack-values.yaml | 2 +- .../roles/monitoring/prometheus/files/rules/haproxy.yaml | 2 +- partition/roles/sonic-upgrade/README.md | 2 +- 8 files changed, 9 insertions(+), 9 deletions(-) diff --git a/control-plane/roles/gardener/README.md b/control-plane/roles/gardener/README.md index f843fb47..119979d6 100644 --- a/control-plane/roles/gardener/README.md +++ b/control-plane/roles/gardener/README.md @@ -25,7 +25,7 @@ Check out the Gardener project for further documentation on [gardener.cloud](htt | gardener_backup_infrastructure_secret | | Specifies the secret for the backup infrastructure | | gardener_soil_name | | The name of the initial `Seed` (used for spinning up shooted seeds) | | gardener_soil_kubeconfig_file_path | | The kubeconfig path to the initial seed cluster | -| gardener_soil_vertical_pod_autoscaler_enabled | | Enables the VPA for the intial seed cluster | +| gardener_soil_vertical_pod_autoscaler_enabled | | Enables the VPA for the initial seed cluster | | gardener_soil_project_owner_name | | Specifies the owner name for the project that the initial seed uses to set up shooted seeds | | gardener_soil_project_members | | Specifies the members of the soil project. Each member requires a `name` and a `role`. Optionally, and array of `roles` can be specified. Example: `{"name": "admin", "role": "admin", "roles": ["owner"]}` | | gardener_gardenlet_shoot_concurrent_syncs | | Specifies the amount of concurrent shoot syncs for the Gardenlet | diff --git a/control-plane/roles/isolated-clusters/README.md b/control-plane/roles/isolated-clusters/README.md index 42a29bca..57dc19f4 100644 --- a/control-plane/roles/isolated-clusters/README.md +++ b/control-plane/roles/isolated-clusters/README.md @@ -1,6 +1,6 @@ # isolated clusters -Contains roles for deploying addtional services for the isolated cluster feature as described [here](https://docs.metal-stack.io/stable/overview/isolated-kubernetes/). +Contains roles for deploying additional services for the isolated cluster feature as described [here](https://docs.metal-stack.io/stable/overview/isolated-kubernetes/). It contains the services: @@ -17,7 +17,7 @@ The `control-plane-defaults` folder contains defaults that are used by multiple | Name | Mandatory | Description | | ---------------------------------------------------------------- | --------- | ------------------------------------------------------------------------------------------------ | -| isolated_clusters_virtual_garden_kubeconfig | | The kubeconfig to access the virutal garden as a string value. | +| isolated_clusters_virtual_garden_kubeconfig | | The kubeconfig to access the virtual garden as a string value. | | isolated_clusters_ntp_image_name | | The image name of the ntp service for the partition. | | isolated_clusters_ntp_image_tag | yes | The tag or version of the ntp service container image. | | isolated_clusters_ntp_namespace | | The namespace to deploy the ntp server to. | diff --git a/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/gardener-usage-overview.yaml b/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/gardener-usage-overview.yaml index 4a35b697..4e8f1a64 100644 --- a/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/gardener-usage-overview.yaml +++ b/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/gardener-usage-overview.yaml @@ -441,7 +441,7 @@ data: } ], "thresholds": "", - "title": "Maximum Node Cound ($iaas)", + "title": "Maximum Node Count ($iaas)", "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ diff --git a/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/shoot-customization.yaml b/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/shoot-customization.yaml index 7fb32b64..724f3d51 100644 --- a/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/shoot-customization.yaml +++ b/control-plane/roles/monitoring/templates/grafana-dashboards/gardener/shoot-customization.yaml @@ -2323,7 +2323,7 @@ data: "uid": "prometheus" }, "decimals": null, - "description": "Count of Shoots which have nginx ingress conroller addon enabled.", + "description": "Count of Shoots which have nginx ingress controller addon enabled.", "format": "none", "gauge": { "maxValue": 100, diff --git a/control-plane/roles/monitoring/templates/grafana-dashboards/sonic-exporter.yaml b/control-plane/roles/monitoring/templates/grafana-dashboards/sonic-exporter.yaml index 30dc8958..19b40d0b 100644 --- a/control-plane/roles/monitoring/templates/grafana-dashboards/sonic-exporter.yaml +++ b/control-plane/roles/monitoring/templates/grafana-dashboards/sonic-exporter.yaml @@ -2086,7 +2086,7 @@ data: "refId": "A" } ], - "title": "Tranceiver Info", + "title": "Transceiver Info", "transformations": [ { "id": "seriesToRows", diff --git a/control-plane/roles/monitoring/templates/prometheus-stack-values.yaml b/control-plane/roles/monitoring/templates/prometheus-stack-values.yaml index 7c42722d..5439daee 100644 --- a/control-plane/roles/monitoring/templates/prometheus-stack-values.yaml +++ b/control-plane/roles/monitoring/templates/prometheus-stack-values.yaml @@ -403,7 +403,7 @@ additionalPrometheusRulesMap: labels: severity: "warning" annotations: - description: "{{ $value }}% of {{ $labels.networkId }} Internet IP adresses in {{ $labels.partition }} are in use." + description: "{{ $value }}% of {{ $labels.networkId }} Internet IP addresses in {{ $labels.partition }} are in use." - alert: NetworkPrefixCapacityLow expr: avg(metal_network_prefix_used{isPrivateSuper="true"}) by (partition, networkId) / avg(metal_network_prefix_available{isPrivateSuper="true"}) by (partition, networkId) * 100 > 80 for: 10m diff --git a/partition/roles/monitoring/prometheus/files/rules/haproxy.yaml b/partition/roles/monitoring/prometheus/files/rules/haproxy.yaml index 2ba0006c..9521319e 100644 --- a/partition/roles/monitoring/prometheus/files/rules/haproxy.yaml +++ b/partition/roles/monitoring/prometheus/files/rules/haproxy.yaml @@ -7,4 +7,4 @@ groups: labels: severity: critical annotations: - descritption: "HAProxy reports all servers are unhealthy for {{ $labels.proxy }}" + description: "HAProxy reports all servers are unhealthy for {{ $labels.proxy }}" diff --git a/partition/roles/sonic-upgrade/README.md b/partition/roles/sonic-upgrade/README.md index d8e34057..fc6302b4 100644 --- a/partition/roles/sonic-upgrade/README.md +++ b/partition/roles/sonic-upgrade/README.md @@ -8,7 +8,7 @@ It depends on the `switch_facts` module from `ansible-common`, so make sure modu | Name | Mandatory | Description | | ------------------------ | --------- | ------------------------------------------------------------------------------------------------------------------- | -| sonic_upgrade_host | yes | The host from which to dowload the image. | +| sonic_upgrade_host | yes | The host from which to download the image. | | sonic_upgrade_image_path | | The path to the image. If this is given and not `sonic_upgrade_host`, the image is pushed to the device by ansible. | | sonic_upgrade_vrf | | The vrf used for pulling the upgrade image. | | sonic_upgrade_protocol | | The protocol (http or https) to use when downloading the sonic image. |