diff --git a/_partials/getting-started/_cluster_observability.mdx b/_partials/getting-started/_cluster_observability.mdx
index 43ba13bede..e7b9a211c8 100644
--- a/_partials/getting-started/_cluster_observability.mdx
+++ b/_partials/getting-started/_cluster_observability.mdx
@@ -12,6 +12,6 @@ environments. Several are av
you can use to add additional monitoring capabilities to your cluster.
Refer to the
-guide to learn how to deploy a monitoring stack using the open-source tool
+guide to learn how to deploy a monitoring stack using the open source tool
[Prometheus](https://prometheus.io/docs/introduction/overview/) and how to configure a host cluster to forward metrics
to the monitoring stack.
\ No newline at end of file
diff --git a/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md b/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md
index f03f1ac869..035a98b969 100644
--- a/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md
+++ b/docs/deprecated/clusters/edge/edgeforge-workflow/build-images.md
@@ -209,7 +209,7 @@ the edge location.
:::info
You can use several software tools to create a bootable USB drive, such as [balenaEtcher](https://www.balena.io/etcher).
-For a PXE server, there are open-source projects such as [Fog](https://fogproject.org/download.php) or
+For a PXE server, there are open source projects such as [Fog](https://fogproject.org/download.php) or
[Windows Deployment Services](https://learn.microsoft.com/en-us/windows/deployment/wds-boot-support) for Windows.
:::
diff --git a/docs/deprecated/integrations/azure-cni.md b/docs/deprecated/integrations/azure-cni.md
index 98f7a38fe7..3530c018e8 100644
--- a/docs/deprecated/integrations/azure-cni.md
+++ b/docs/deprecated/integrations/azure-cni.md
@@ -44,7 +44,7 @@ wider manifest that also creates a deployment or service. Palette leverages two
- **azure**: Azure's own implementation, called Azure Network Policy.
-- **calico**: An open-source network and network security solution founded by [Tigera](https://www.tigera.io/).
+- **calico**: An open source network and network security solution founded by [Tigera](https://www.tigera.io/).
Palette users can choose any one of the above Network Policies and provide it to the pack YAML file as `networkPolicy`
as given below:
diff --git a/docs/deprecated/integrations/byoos.md b/docs/deprecated/integrations/byoos.md
index e7b4e03f9a..f092d52a1a 100644
--- a/docs/deprecated/integrations/byoos.md
+++ b/docs/deprecated/integrations/byoos.md
@@ -18,7 +18,7 @@ needs.
Using your custom OS provides several benefits, including the ability to control your own dependencies, improve
performance, and ensure compatibility with your existing applications. With BYOOS, you can choose the OS that best fits
-your needs, whether it's a commercial or open-source distribution, and integrate it with your Kubernetes clusters. The
+your needs, whether it's a commercial or open source distribution, and integrate it with your Kubernetes clusters. The
BYOOS pack can be used with both Edge and non-Edge environments.
## Versions Supported
diff --git a/docs/deprecated/integrations/calico.md b/docs/deprecated/integrations/calico.md
index beeabcf456..e2504c2b2f 100644
--- a/docs/deprecated/integrations/calico.md
+++ b/docs/deprecated/integrations/calico.md
@@ -14,7 +14,7 @@ Palette Network Pack(s) helps provision resources for setting up Cluster network
Kubernetes network model can be found
[here](https://kubernetes.io/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model).
-[Project Calico](http://docs.projectcalico.org/) is an open-source container networking provider and network policy
+[Project Calico](http://docs.projectcalico.org/) is an open source container networking provider and network policy
engine.
Calico provides highly scalable networking and network policy solution for connecting Kubernetes pods based on the same
diff --git a/docs/deprecated/integrations/cilium-tetragon.md b/docs/deprecated/integrations/cilium-tetragon.md
index e70e033c73..91b8950df6 100644
--- a/docs/deprecated/integrations/cilium-tetragon.md
+++ b/docs/deprecated/integrations/cilium-tetragon.md
@@ -12,7 +12,7 @@ tags: ["packs", "cilium-tetragon", "monitoring"]
[Tetragon](https://github.com/cilium/tetragon) is an eBPF based security observability and runtime enforcement. eBPF is
used to safely and efficiently extend the kernel's capabilities without requiring changing the kernel source code or
-loading kernel modules. Tetragon is a Cilium community open-source project that enables profound visibility with
+loading kernel modules. Tetragon is a Cilium community open source project that enables profound visibility with
filtering and aggregation with the eBPF collector support to deliver visibility at depth with minimal overhead.
Palette supports Cilium Tetragon as an add-on pack for monitoring services. Refer to the
diff --git a/docs/deprecated/integrations/cilium.md b/docs/deprecated/integrations/cilium.md
index 68c0b05bc5..032b3bfe0f 100644
--- a/docs/deprecated/integrations/cilium.md
+++ b/docs/deprecated/integrations/cilium.md
@@ -14,7 +14,7 @@ Palette Network Pack(s) helps provision resources for setting up Cluster network
network model design goals visit
[here](https://kubernetes.io/docs/concepts/cluster-administration/networking/#the-kubernetes-network-model).
-Palette supports **Cilium**, an open-source software for securing and observing network connectivity between
+Palette supports **Cilium**, an open source software for securing and observing network connectivity between
cloud-native container workloads. Cilium is underpinned by a Linux Kernel technology called eBPF, to enable dynamic and
strong security visibility and control logic within Linux. As eBPF runs within the Linux Kernel, Cilium security
policies are applied and updated independent of the application code or container configuration.
diff --git a/docs/deprecated/integrations/konvoy.md b/docs/deprecated/integrations/konvoy.md
index ea7137b653..a4ab100804 100644
--- a/docs/deprecated/integrations/konvoy.md
+++ b/docs/deprecated/integrations/konvoy.md
@@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/k8s-dashboard/blobs/sha256:2de5d8
tags: ["packs", "konvoy", "kubernetes"]
---
-[Konvoy](https://d2iq.com/products/konvoy) is a Kubernetes distribution by D2iQ. It is built on pure open-source
+[Konvoy](https://d2iq.com/products/konvoy) is a Kubernetes distribution by D2iQ. It is built on pure open source
Kubernetes and includes a full suite of integrated and supported best-of-breed Day-2 platform applications for an
out-of-the-box, production-ready experience.
diff --git a/docs/deprecated/integrations/kubehunter.md b/docs/deprecated/integrations/kubehunter.md
index ea72bf5784..c15e035517 100644
--- a/docs/deprecated/integrations/kubehunter.md
+++ b/docs/deprecated/integrations/kubehunter.md
@@ -10,7 +10,7 @@ logoUrl: "https://registry.dev.spectrocloud.com/v1/kubehunter/blobs/sha256:6b6b9
tags: ["packs", "kube-hunter", "security"]
---
-Kube Hunter is an open-source tool that hunts for security issues in your Kubernetes clusters. It’s designed to increase
+Kube Hunter is an open source tool that hunts for security issues in your Kubernetes clusters. It’s designed to increase
awareness and visibility of the security controls in Kubernetes environments. Kube-hunter probes a domain or address
range for open Kubernetes-related ports, and tests for any configuration issues that leave your cluster exposed to
attackers. It can be run on a machine in the cluster, and select the option to probe all the local network interfaces.
diff --git a/docs/deprecated/integrations/kubernetes-edge.md b/docs/deprecated/integrations/kubernetes-edge.md
index 2b42d5410b..042616cc5a 100644
--- a/docs/deprecated/integrations/kubernetes-edge.md
+++ b/docs/deprecated/integrations/kubernetes-edge.md
@@ -28,12 +28,12 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat
## What is PXK-E?
-PXK-E is a customized version of the open-source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes.
+PXK-E is a customized version of the open source Cloud Native Computing Foundation (CNCF) distribution of Kubernetes.
This Kubernetes distribution is customized and optimized for edge computing environments and can be deployed through
Palette. PXK-E is the Kubernetes distribution Palette defaults to when deploying Edge clusters.
-PXK-E differs from the upstream open-source Kubernetes version by optimizing for operations in an edge computing
-environment. PXK-E also differentiates itself by using the Kairos open-source project as the base operating system (OS).
+PXK-E differs from the upstream open source Kubernetes version by optimizing for operations in an edge computing
+environment. PXK-E also differentiates itself by using the Kairos open source project as the base operating system (OS).
PXK-E’s use of Kairos means the OS is immutable, which significantly improves the security posture and reduces potential
attack surfaces.
@@ -50,13 +50,13 @@ PXK-E manages the underlying OS and the Kubernetes layer together, which reduces
maintaining two separate components.
PXK-E allows you to apply different flavors of container storage interfaces (CSI) and container network interfaces
-(CNI). Other open-source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There
+(CNI). Other open source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There
is additional complexity and overhead when you want to consume different interface plugins with traditional Kubernetes
distributions. Using PXK-E, you select the interface plugin you want to apply without additional overhead and
complexity.
There are no changes to the Kubernetes source code used in PXK-E, and it follows the same versioning schema as the
-upstream open-source Kubernetes distribution.
+upstream open source Kubernetes distribution.
:::info
@@ -105,7 +105,7 @@ four months. Once we stop supporting the minor version, we initiate the deprecat
| `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. |
| `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). |
-You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source
+You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source
project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md)
reference.
@@ -490,7 +490,7 @@ In this example, Palette is used as the IDP, and all users in the `dev-east-2` w
| `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. |
| `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). |
-You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source
+You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source
project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md)
reference.
@@ -876,7 +876,7 @@ In this example, Palette is used as the IDP, and all users in the `dev-east-2` w
| `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. |
| `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). |
-You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source
+You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source
project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md)
reference.
@@ -1262,7 +1262,7 @@ In this example, Palette is used as the IDP, and all users in the `dev-east-2` w
| `cluster.config.initConfiguration.nodeRegistration.kubeletExtraArgs` | This parameter contains extra arguments for kubelet during node registration, such as setting feature gates, protecting kernel defaults, and disabling the read-only port. |
| `pack.palette.config.oidc.identityProvider` | Dynamically enabled OpenID Connect (OIDC) Identity Provider (IDP) setting based on your UI selection when you add the PXK-E pack to your profile. This parameter appears in the YAML file after you make a selection. Refer to [Configure OIDC Identity Provider](#configure-custom-oidc). |
-You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open-source
+You can add cloud-init stages exposed by [Kairos](https://kairos.io/docs/architecture/cloud-init/), an open source
project. For more information, check out the [Cloud Init Stages](../clusters/edge/edge-configuration/cloud-init.md)
reference.
diff --git a/docs/deprecated/integrations/kubernetes.md b/docs/deprecated/integrations/kubernetes.md
index 8fb6195aae..4a9bb53c2a 100644
--- a/docs/deprecated/integrations/kubernetes.md
+++ b/docs/deprecated/integrations/kubernetes.md
@@ -31,25 +31,25 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat
## What is PXK?
-Palette eXtended Kubernetes (PXK) is a recompiled version of the open-source Cloud Native Computing Foundation (CNCF)
+Palette eXtended Kubernetes (PXK) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF)
distribution of Kubernetes. This Kubernetes version can be deployed through Palette to all major infrastructure
providers, public cloud providers, and private data center providers. This is the default distribution when deploying a
Kubernetes cluster through Palette. You have the option to choose other Kubernetes distributions, such as MicroK8s,
Konvoy, and more, should you want to consume a different Kubernetes distribution.
-PXK is different from the upstream open-source Kubernetes version primarily because of the carefully reviewed and
+PXK is different from the upstream open source Kubernetes version primarily because of the carefully reviewed and
applied hardening of the operating system (OS) and Kubernetes. The hardening ranges from removing unused kernel modules
to using an OS configuration that follows industry best practices. Our recompiled Kubernetes configuration addresses
common Kubernetes deployment security pitfalls and implements industry best practices.
A benefit of Palette when used with PXK is the ability to apply different flavors of container storage interface (CSI)
-plugins and container network interface (CNI) plugins. Other open-source Kubernetes distributions, such as MicroK8s,
+plugins and container network interface (CNI) plugins. Other open source Kubernetes distributions, such as MicroK8s,
RKE2, and K3s, come with a default CSI and CNI. Additional complexity and overhead are required from you to enable
different interfaces. PXK supports the ability to select other interface plugins out of the box without any additional
overhead or complexity needed from your side.
-There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream
-open-source Kubernetes distribution.
+There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream open
+source Kubernetes distribution.
:::info
diff --git a/docs/deprecated/integrations/ngrok.md b/docs/deprecated/integrations/ngrok.md
index 6ecf29368b..5bc70aa058 100644
--- a/docs/deprecated/integrations/ngrok.md
+++ b/docs/deprecated/integrations/ngrok.md
@@ -13,7 +13,7 @@ tags: ["packs", "ngrok", "network", "kubernetes"]
The ngrok [Ingress Controller for Kubernetes](https://github.com/ngrok/kubernetes-ingress-controller) adds public and
secure ingress traffic to Kubernetes applications. Enforce authentication and authorization at the edge with ngrok,
preventing unauthorized traffic from ever reaching your cluster and rogue webhooks from looping and spamming your
-service. This open-source
+service. This open source
[Ingress Controller](https://kubernetes.io/docs/concepts/services-networking/ingress-controllers) works with Palette to
provide ingress to your applications, APIs, or other resources while also offloading network ingress and middleware
execution to ngrok's platform. Balance traffic between multiple redundant Points of Presence (PoPs) in ngrok’s global
diff --git a/docs/deprecated/integrations/prometheus-agent.md b/docs/deprecated/integrations/prometheus-agent.md
index f1404b62de..49c59e37d0 100644
--- a/docs/deprecated/integrations/prometheus-agent.md
+++ b/docs/deprecated/integrations/prometheus-agent.md
@@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/prometheus-operator/blobs/sha256:
tags: ["packs", "prometheus-agent", "monitoring"]
---
-Prometheus is an open-source monitoring and alerting system that is designed to collect and analyze metrics from various
+Prometheus is an open source monitoring and alerting system that is designed to collect and analyze metrics from various
systems and services.
Prometheus is built around a time-series database that stores metrics data. It uses a flexible querying language called
diff --git a/docs/deprecated/integrations/prometheus-operator.md b/docs/deprecated/integrations/prometheus-operator.md
index a4e3ecc22d..b25b087a9e 100644
--- a/docs/deprecated/integrations/prometheus-operator.md
+++ b/docs/deprecated/integrations/prometheus-operator.md
@@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/prometheus-operator/blobs/sha256:
tags: ["packs", "prometheus-operator", "monitoring"]
---
-Prometheus is an open-source monitoring system that is designed to collect and analyze metrics from various sources,
+Prometheus is an open source monitoring system that is designed to collect and analyze metrics from various sources,
such as applications, servers, and networks. It is widely used in the DevOps world to monitor the health and performance
of applications and infrastructure. Prometheus stores metrics in a time-series database and provides a query language
for analyzing the data. It also includes a powerful alerting system that can notify operators when thresholds are
@@ -161,7 +161,7 @@ Toggle the **Enable** button to enable the use of Ingress.
#### Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -382,7 +382,7 @@ Toggle the **Enable** button to enable the use of Ingress.
#### Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -603,7 +603,7 @@ Toggle the **Enable** button to enable the use of Ingress.
#### Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -824,7 +824,7 @@ Toggle the **Enable** button to enable the use of Ingress.
#### Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -1007,7 +1007,7 @@ Toggle the **Enable** button to enable the use of Ingress.
#### Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -1148,7 +1148,7 @@ Toggle the **Enable** button to enable the use of Ingress.
#### Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
diff --git a/docs/deprecated/integrations/trident.md b/docs/deprecated/integrations/trident.md
index f4f26a5cff..ebbccb6291 100644
--- a/docs/deprecated/integrations/trident.md
+++ b/docs/deprecated/integrations/trident.md
@@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/csi-trident/blobs/sha256:d4dd2ecf
tags: ["packs", "trident", "storage"]
---
-Astra Trident, is an open-source project backed and maintained by [NetApp](https://www.netapp.com/) and is designed to
+Astra Trident, is an open source project backed and maintained by [NetApp](https://www.netapp.com/) and is designed to
provide persistence storage to containerized applications using industry-standard interfaces, such as the Container
Storage Interface (CSI).
diff --git a/docs/deprecated/integrations/ubuntu.md b/docs/deprecated/integrations/ubuntu.md
index 9ab4c3491d..aa827375e5 100644
--- a/docs/deprecated/integrations/ubuntu.md
+++ b/docs/deprecated/integrations/ubuntu.md
@@ -10,7 +10,7 @@ logoUrl: "https://registry.spectrocloud.com/v1/ubuntu-vsphere/blobs/sha256:09a72
tags: ["packs", "ubuntu", "operating system"]
---
-[Ubuntu](https://ubuntu.com) is an open-source operating system based on the Linux kernel. Developed by Canonical Ltd.,
+[Ubuntu](https://ubuntu.com) is an open source operating system based on the Linux kernel. Developed by Canonical Ltd.,
Ubuntu is a popular choice for desktops, servers, and cloud environments due to its ease of use, robustness, and
versatility.
diff --git a/docs/docs-content/architecture/grps-proxy.md b/docs/docs-content/architecture/grps-proxy.md
index 95e626ee6b..d42af85d45 100644
--- a/docs/docs-content/architecture/grps-proxy.md
+++ b/docs/docs-content/architecture/grps-proxy.md
@@ -10,7 +10,7 @@ sidebar_custom_props:
---
Palette uses [gRPC](https://grpc.io) to communicate between the management platform and the workload cluster. gRPC is a
-high-performance, open-source universal Remote Procedure Call (RPC) framework. It is used to build distributed
+high-performance, open source universal Remote Procedure Call (RPC) framework. It is used to build distributed
applications and services. gRPC is based on HTTP/2 and uses protocol buffers ([protobuf](https://protobuf.dev/)) as the
underlying data serialization framework.
@@ -67,7 +67,7 @@ to some vendors' documentation that addresses HTTP/2 and gRPC support.
## Squid Proxy With SSL Bump
-A common open-source proxy server is [Squid](https://wiki.squid-cache.org). Squid is a caching proxy for the Web
+A common open source proxy server is [Squid](https://wiki.squid-cache.org). Squid is a caching proxy for the Web
supporting HTTP, HTTPS, FTP, and more. Squid supports gRPC but requires additional configuration. gRPC with SSL bump
does not work with all versions of Squid, such as versions 5 and 6. Review the
[SSL Bump issue](https://bugs.squid-cache.org/show_bug.cgi?id=5245) to learn more about the issue and track the progress
diff --git a/docs/docs-content/automation/crossplane/crossplane.md b/docs/docs-content/automation/crossplane/crossplane.md
index 9738d81c1d..c250a55157 100644
--- a/docs/docs-content/automation/crossplane/crossplane.md
+++ b/docs/docs-content/automation/crossplane/crossplane.md
@@ -7,7 +7,7 @@ sidebar_position: 0
tags: ["crossplane", "iac", "automation", "infrastructure as code"]
---
-Palette supports the open-source Cloud Native Computing Foundation (CNCF) project
+Palette supports the open source Cloud Native Computing Foundation (CNCF) project
[Crossplane](https://www.crossplane.io/). Crossplane transforms Kubernetes clusters into universal control planes,
extending the Kubernetes API and enabling infrastructure resource provisioning and management across major
infrastructure providers.
diff --git a/docs/docs-content/byoos/byoos.md b/docs/docs-content/byoos/byoos.md
index 96b1797c80..3b02d7f65c 100644
--- a/docs/docs-content/byoos/byoos.md
+++ b/docs/docs-content/byoos/byoos.md
@@ -15,7 +15,7 @@ specific requirements. This feature is especially useful for organizations with
compliance, or specific hardware configurations.
The ability to bring your own OS to Palette gives you more control over dependencies in your environment and ensures
-compatibility with your existing applications. The OS you bring can be commercial or an open-source distribution.
+compatibility with your existing applications. The OS you bring can be commercial or an open source distribution.
## Resources
diff --git a/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md b/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md
index 2ebbe12cdc..ee8a318c0a 100644
--- a/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md
+++ b/docs/docs-content/clusters/cluster-management/backup-restore/backup-restore.md
@@ -64,7 +64,7 @@ object storage solutions as backup locations.
:::info
-Palette uses open-source Velero to provide backup and restore capabilities. You can learn more about Velero by checking
+Palette uses open source Velero to provide backup and restore capabilities. You can learn more about Velero by checking
out the Velero [Restore Reference](https://velero.io/docs/main/restore-reference/) and
[Backup Reference](https://velero.io/docs/main/backup-reference/).
diff --git a/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md b/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md
index c29894035a..9dd82bb2c1 100644
--- a/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md
+++ b/docs/docs-content/clusters/cluster-management/backup-restore/create-cluster-backup.md
@@ -15,7 +15,7 @@ the source cluster.
:::info
-Palette uses open-source Velero to provide backup and restore capabilities. You can learn more about Velero by checking
+Palette uses open source Velero to provide backup and restore capabilities. You can learn more about Velero by checking
out their [Restore Reference](https://velero.io/docs/main/restore-reference) and
[Backup Reference](https://velero.io/docs/main/backup-reference).
diff --git a/docs/docs-content/clusters/cluster-management/compliance-scan.md b/docs/docs-content/clusters/cluster-management/compliance-scan.md
index d837aaf4c3..6228917b06 100644
--- a/docs/docs-content/clusters/cluster-management/compliance-scan.md
+++ b/docs/docs-content/clusters/cluster-management/compliance-scan.md
@@ -29,7 +29,7 @@ the row of the node you want to scan, and select **Turn off maintenance mode**.
This scan examines the compliance of deployed Kubernetes security features against the CIS Kubernetes Benchmarks. CIS
Kubernetes Benchmarks are consensus-driven security guidelines for the Kubernetes. Different releases of the CIS
benchmark cover different releases of Kubernetes. By default, Kubernetes configuration security will determine the test
-set based on the Kubernetes version running on the cluster being scanned. Internally, Palette leverages an open-source
+set based on the Kubernetes version running on the cluster being scanned. Internally, Palette leverages an open source
tool called KubeBench from Aqua Security to perform this scan. Scans are run against control plane and worker nodes of
the Kubernetes cluster, and a combined report is made available on the UI. Users can filter the report to view only the
control plane or worker results if required.
@@ -44,7 +44,7 @@ and it is suggested to be tested manually.
Kubernetes penetration testing scans Kubernetes-related open-ports for any configuration issues that can leave the
tenant clusters exposed to attackers. It hunts for security issues in your Kubernetes clusters and increases awareness
and visibility of the security controls in Kubernetes environments. The scan gives a full report on the cluster security
-concerns. Internally Palette leverages an open-source tool called KubeHunter from Aqua Security to perform this scan.
+concerns. Internally Palette leverages an open source tool called KubeHunter from Aqua Security to perform this scan.
Scans are run in 2 modes, Internal and External. In the internal mode, tests are run against the internal endpoint of
the API server, whereas, in external mode, the external public-facing endpoint is used for testing. A combined report of
vulnerabilities found in both modes is shown on the Palette UI. Users can filter the report to view just the internal or
@@ -55,7 +55,7 @@ external report if required.
## Conformance Testing
Kubernetes conformance testing is about validating your Kubernetes configuration to ensure that they are conformant to
-the CNCF specifications. Palette leverages an open-source tool called Sonobuoy to perform this scan. Automatically
+the CNCF specifications. Palette leverages an open source tool called Sonobuoy to perform this scan. Automatically
select a subset of relevant tests for execution based on the type of cloud (public, private) and the type of deployment
infrastructure (IaaS, managed cloud service). Each test can take up to 2 hours to complete. If a cluster has a single
worker node, a few tests may fail due to resources. For accurate assessment of conformance for distribution of
@@ -91,7 +91,7 @@ and choose the desired SBOM format, scan scope, and an optional backup location.
Palette will identify every unique container image within your chosen scope and generate an SBOM for that image. Palette
also runs the SBOM through a vulnerability scanner to flag any Common Vulnerabilities and Exposures (CVEs). Palette
-leverages two open-source tools from Anchore: [Syft](https://github.com/anchore/syft) for SBOM generation and
+leverages two open source tools from Anchore: [Syft](https://github.com/anchore/syft) for SBOM generation and
[Grype](https://github.com/anchore/grype) for vulnerability detection.
Suppose you specify a [backup location](backup-restore/backup-restore.md). In that case, the SBOM for each image will be
@@ -109,7 +109,7 @@ location setting.
- [SPDX](https://github.com/spdx/spdx-spec/blob/v2.2/schemas/spdx-schema.json): A standard SBOM format widely used by
organizations and governments. The SPDX format has been around longer than any other SBOM format.
-- [CycloneDX](https://cyclonedx.org/specification/overview/): An open-source XML-based SBOM format that provides a
+- [CycloneDX](https://cyclonedx.org/specification/overview/): An open source XML-based SBOM format that provides a
standard representation of software components and their metadata.
- Syft JSON: Syft's custom SBOM format. The Syft SBOM format contains the most metadata compared to the other SBOM
diff --git a/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md b/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md
index c65d7f3df1..745921cae2 100644
--- a/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md
+++ b/docs/docs-content/clusters/cluster-management/monitoring/deploy-monitor-stack.md
@@ -8,7 +8,7 @@ sidebar_position: 0
tags: ["clusters", "cluster management", "monitoring"]
---
-The monitoring stack you will deploy uses the open-source tool,
+The monitoring stack you will deploy uses the open source tool,
[Prometheus](https://prometheus.io/docs/introduction/overview/), to support your environment's monitoring requirements.
The monitoring stack is a centralized server or aggregation spot to which all other clusters will forward metrics. The
monitoring stack is a dedicated Kubernetes cluster for monitoring and metrics aggregation in your Palette environment.
diff --git a/docs/docs-content/clusters/data-center/maas/architecture.md b/docs/docs-content/clusters/data-center/maas/architecture.md
index 5223307aa8..6b5d584126 100644
--- a/docs/docs-content/clusters/data-center/maas/architecture.md
+++ b/docs/docs-content/clusters/data-center/maas/architecture.md
@@ -7,11 +7,11 @@ sidebar_position: 0
tags: ["data center", "maas", "architecture"]
---
-Canonical MAAS is an open-source tool that lets you discover, commission, deploy and re-deploy operating systems to
+Canonical MAAS is an open source tool that lets you discover, commission, deploy and re-deploy operating systems to
physical servers. The following are some architectural highlights of bare-metal Kubernetes clusters that Palette deploys
using Canonical MAAS. Refer to the PCG deployment options section below to learn more about PCG deployment.
-- Palette integrates with MAAS through Spectro Cloud’s open-source Cloud Native Computing Foundation (CNCF)
+- Palette integrates with MAAS through Spectro Cloud’s open source Cloud Native Computing Foundation (CNCF)
[Cluster API provider](https://github.com/spectrocloud/cluster-api-provider-maas). Refer to the table below
- Palette provides a cloud-like experience for deploying clusters on bare metal servers. The result is increased
diff --git a/docs/docs-content/clusters/edge/architecture.md b/docs/docs-content/clusters/edge/architecture.md
index 45ae9710e2..caacf9d501 100644
--- a/docs/docs-content/clusters/edge/architecture.md
+++ b/docs/docs-content/clusters/edge/architecture.md
@@ -20,7 +20,7 @@ The following are architectural highlights of Palette-provisioned Edge native cl
- Edge supports adding multiple devices to the site to form a multi-node Kubernetes cluster.
- Operating system (OS) images are derived from immutable container-based OS images provided by the
- [Kairos](http://kairos.io) open-source project.
+ [Kairos](http://kairos.io) open source project.
- The installation is bootstrapped using a relatively small distribution-agnostic _Stylus_ installer image. The
operating system and Kubernetes version are derived from cluster profile settings associated with the edge site and
diff --git a/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md b/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md
index a0bef57ff1..852e04ef79 100644
--- a/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md
+++ b/docs/docs-content/clusters/edge/edge-configuration/cloud-init.md
@@ -8,7 +8,7 @@ tags: ["edge"]
---
The installation process supports all the cloud-init stages exposed by
-[Kairos](https://kairos.io/docs/architecture/cloud-init/). Kairos is an open-source project that is used to create
+[Kairos](https://kairos.io/docs/architecture/cloud-init/). Kairos is an open source project that is used to create
immutable images, Kairos is a container layer that enables you to specify dependencies and create resources before
locking down the image.
diff --git a/docs/docs-content/clusters/edge/edge.md b/docs/docs-content/clusters/edge/edge.md
index 0ef3efbb76..e1a2508bb4 100644
--- a/docs/docs-content/clusters/edge/edge.md
+++ b/docs/docs-content/clusters/edge/edge.md
@@ -44,7 +44,7 @@ computing is installed in the device along with the operating system and Kuberne
:::info
-Edge is built on top of the open-source project [Kairos](https://kairos.io), which provides a tamper-proof immutable
+Edge is built on top of the open source project [Kairos](https://kairos.io), which provides a tamper-proof immutable
operating system with zero downtime rolling upgrade.
:::
diff --git a/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md b/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md
index bb92bfebcd..8b421a71d9 100644
--- a/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md
+++ b/docs/docs-content/clusters/edge/site-deployment/site-installation/site-user-data.md
@@ -57,7 +57,7 @@ to a bootable device, such as a USB stick.
:::info
You can use several software tools to create a bootable USB drive, such as
- [balenaEtcher](https://www.balena.io/etcher). For a PXE server, there are open-source projects such as
+ [balenaEtcher](https://www.balena.io/etcher). For a PXE server, there are open source projects such as
[Fog](https://fogproject.org/download.php) or
[Windows Deployment Services](https://learn.microsoft.com/en-us/windows/deployment/wds-boot-support) for Windows.
diff --git a/docs/docs-content/devx/services/service-listings/mysql.md b/docs/docs-content/devx/services/service-listings/mysql.md
index 514e503f84..670864587a 100644
--- a/docs/docs-content/devx/services/service-listings/mysql.md
+++ b/docs/docs-content/devx/services/service-listings/mysql.md
@@ -10,7 +10,7 @@ logoUrl: "https://registry.dev.spectrocloud.com/v1/mysql-operator/blobs/sha256:2
tags: ["devx", "app mode", "pde", "databases"]
---
-[MySQL](https://mysql.com/) is an open-source relational database management system commonly used in web applications
+[MySQL](https://mysql.com/) is an open source relational database management system commonly used in web applications
and other software that requires a database. It is known for its reliability, ease of use, and flexibility. MySQL is
covered under the GNU license and uses structured query language (SQL) to manage data with the following properties:
diff --git a/docs/docs-content/devx/services/service-listings/postgresql-db.md b/docs/docs-content/devx/services/service-listings/postgresql-db.md
index 0236d756ed..74a9919bcc 100644
--- a/docs/docs-content/devx/services/service-listings/postgresql-db.md
+++ b/docs/docs-content/devx/services/service-listings/postgresql-db.md
@@ -10,7 +10,7 @@ logoUrl: "https://upload.wikimedia.org/wikipedia/commons/2/29/Postgresql_elephan
tags: ["devx", "app mode", "pde", "databases"]
---
-Palette supports [Postgres](https://www.postgresql.org/) as a database service. Postgres is a powerful open-source
+Palette supports [Postgres](https://www.postgresql.org/) as a database service. Postgres is a powerful open source
object-relational database system with over 35 years of active deployment with a strong reputation for reliability,
feature robustness, and performance. Postgres uses and extends the SQL language combined with many features that safely
store and scale the most complicated data workloads.
diff --git a/docs/docs-content/devx/services/service-listings/redis-db.md b/docs/docs-content/devx/services/service-listings/redis-db.md
index 9a22f1f5de..7c931fb072 100644
--- a/docs/docs-content/devx/services/service-listings/redis-db.md
+++ b/docs/docs-content/devx/services/service-listings/redis-db.md
@@ -11,7 +11,7 @@ logoUrl: "https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcSjxG5Qb38rX39m1M
tags: ["devx", "app mode", "pde", "databases"]
---
-[Redis](https://redis.io/docs/about/) is an open-source (BSD licensed), in-memory data structure store used as a data
+[Redis](https://redis.io/docs/about/) is an open source (BSD licensed), in-memory data structure store used as a data
cache store or database service. Redis has built-in replication, Lua scripting, least recently used eviction,
transactions, and different levels of on-disk persistence capabilities. In addition, Redis provides high availability
via Redis Sentinel and automatic partitioning with Redis Cluster.
diff --git a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md
index c73e92bccd..47f15cf5ba 100644
--- a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md
+++ b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/airgap-install/install.md
@@ -752,7 +752,7 @@ environment. Reach out to our support team if you need assistance.
:::tip
- For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation
+ For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation
process.
:::
diff --git a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md
index 15169b4112..1b6335f5d9 100644
--- a/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md
+++ b/docs/docs-content/enterprise-version/install-palette/install-on-kubernetes/install.md
@@ -642,7 +642,7 @@ your environment. Reach out to our support team if you need assistance.
:::tip
- For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation
+ For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation
process.
:::
diff --git a/docs/docs-content/getting-started/additional-capabilities/edge.md b/docs/docs-content/getting-started/additional-capabilities/edge.md
index 9dc47d7bf5..88af9bc41e 100644
--- a/docs/docs-content/getting-started/additional-capabilities/edge.md
+++ b/docs/docs-content/getting-started/additional-capabilities/edge.md
@@ -15,7 +15,7 @@ These locations include hospitals, retail stores, Telco environments, restaurant
areas, and many more.
Palette Edge supports both VM and container-based workloads, multiple Kubernetes distributions, and Intel and ARM
-hardware architectures. It is built on top of the open-source project [Kairos](https://kairos.io/), which enables the
+hardware architectures. It is built on top of the open source project [Kairos](https://kairos.io/), which enables the
creation and customization of immutable versions of operating systems. Additionally, Palette Edge is designed to scale
to tens of thousands of locations while enforcing policies locally within each cluster.
diff --git a/docs/docs-content/getting-started/aws/scale-secure-cluster.md b/docs/docs-content/getting-started/aws/scale-secure-cluster.md
index 333b1d07b4..16452996df 100644
--- a/docs/docs-content/getting-started/aws/scale-secure-cluster.md
+++ b/docs/docs-content/getting-started/aws/scale-secure-cluster.md
@@ -252,7 +252,7 @@ vulnerabilities. You can perform four types of scans on your cluster.
| --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. |
| Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. |
-| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
+| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
| Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. |
Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab.
diff --git a/docs/docs-content/getting-started/azure/scale-secure-cluster.md b/docs/docs-content/getting-started/azure/scale-secure-cluster.md
index 3f1ca29d83..f6e9f2722b 100644
--- a/docs/docs-content/getting-started/azure/scale-secure-cluster.md
+++ b/docs/docs-content/getting-started/azure/scale-secure-cluster.md
@@ -252,7 +252,7 @@ vulnerabilities. You can perform four types of scans on your cluster.
| --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. |
| Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. |
-| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
+| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
| Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. |
Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab.
diff --git a/docs/docs-content/getting-started/gcp/scale-secure-cluster.md b/docs/docs-content/getting-started/gcp/scale-secure-cluster.md
index 64a1a13ebf..1a70a00f08 100644
--- a/docs/docs-content/getting-started/gcp/scale-secure-cluster.md
+++ b/docs/docs-content/getting-started/gcp/scale-secure-cluster.md
@@ -252,7 +252,7 @@ vulnerabilities. You can perform four types of scans on your cluster.
| --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. |
| Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. |
-| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
+| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
| Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. |
Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab.
diff --git a/docs/docs-content/getting-started/vmware/scale-secure-cluster.md b/docs/docs-content/getting-started/vmware/scale-secure-cluster.md
index 80367ddcb7..6e9963c927 100644
--- a/docs/docs-content/getting-started/vmware/scale-secure-cluster.md
+++ b/docs/docs-content/getting-started/vmware/scale-secure-cluster.md
@@ -263,7 +263,7 @@ vulnerabilities. You can perform four types of scans on your cluster.
| --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| Kubernetes Configuration Security | This scan examines the compliance of deployed security features against the CIS Kubernetes Benchmarks, which are consensus-driven security guidelines for Kubernetes. By default, the test set will execute based on the cluster Kubernetes version. |
| Kubernetes Penetration Testing | This scan evaluates Kubernetes-related open-ports for any configuration issues that can leave the tenant clusters exposed to attackers. It hunts for security issues in your clusters and increases visibility of the security controls in your Kubernetes environments. |
-| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open-source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
+| Kubernetes Conformance Testing | This scan validates your Kubernetes configuration to ensure that it conforms to CNCF specifications. Palette leverages an open source tool called [Sonobuoy](https://sonobuoy.io) to perform this scan. |
| Software Bill of Materials (SBOM) | This scan details the various third-party components and dependencies used by your workloads and helps to manage security and compliance risks associated with those components. |
Navigate to the left **Main Menu** and select **Clusters**. Select your cluster to view its **Overview** tab.
diff --git a/docs/docs-content/glossary-all.md b/docs/docs-content/glossary-all.md
index 8b708f0601..436014aba9 100644
--- a/docs/docs-content/glossary-all.md
+++ b/docs/docs-content/glossary-all.md
@@ -174,35 +174,35 @@ Charts.
## Palette eXtended Kubernetes (PXK)
-Palette eXtended Kubernetes (PXK) is a recompiled version of the open-source Cloud Native Computing Foundation (CNCF)
+Palette eXtended Kubernetes (PXK) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF)
distribution of Kubernetes. This Kubernetes version can be deployed through Palette to all major infrastructure
providers, public cloud providers, and private data center providers. This is the default distribution when deploying a
Kubernetes cluster through Palette. You have the option to choose other Kubernetes distributions, such as MicroK8s,
Konvoy, and more, should you want to consume a different Kubernetes distribution.
-PXK is different from the upstream open-source Kubernetes version primarily because of the carefully reviewed and
+PXK is different from the upstream open source Kubernetes version primarily because of the carefully reviewed and
applied hardening of the operating system (OS) and Kubernetes. The hardening ranges from removing unused kernel modules
to using an OS configuration that follows industry best practices. Our recompiled Kubernetes configuration addresses
common Kubernetes deployment security pitfalls and implements industry best practices.
A benefit of Palette when used with PXK is the ability to apply different flavors of container storage interface (CSI)
-plugins and container network interface (CNI) plugins. Other open-source Kubernetes distributions, such as MicroK8s,
+plugins and container network interface (CNI) plugins. Other open source Kubernetes distributions, such as MicroK8s,
RKE2, and K3s, come with a default CSI and CNI. Additional complexity and overhead are required from you to enable
different interfaces. PXK supports the ability to select other interface plugins out of the box without any additional
overhead or complexity needed from your side.
-There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream
-open-source Kubernetes distribution.
+There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream open
+source Kubernetes distribution.
## Palette eXtended Kubernetes Edge (PXK-E)
-Palette eXtended Kubernetes Edge (PXK-E) is a recompiled version of the open-source Cloud Native Computing Foundation
+Palette eXtended Kubernetes Edge (PXK-E) is a recompiled version of the open source Cloud Native Computing Foundation
(CNCF) distribution of Kubernetes. This Kubernetes distribution is customized and optimized for edge computing
environments and can be deployed through Palette. PXK-E is the Kubernetes distribution Palette defaults to when
deploying Edge clusters.
-PXK-E differs from the upstream open-source Kubernetes version by optimizing for operations in an edge computing
-environment. PXK-E also differentiates itself by using the open-source project, [Kairos](https://kairos.io/) as the base
+PXK-E differs from the upstream open source Kubernetes version by optimizing for operations in an edge computing
+environment. PXK-E also differentiates itself by using the open source project, [Kairos](https://kairos.io/) as the base
operating system (OS). PXK-E’s use of Kairos means the OS is immutable, which significantly improves the security
posture and reduces potential attack surfaces.
@@ -220,13 +220,13 @@ PXK-E manages the underlying OS and the Kubernetes layer together, which reduces
maintaining two separate components.
PXK-E allows you to apply different flavors of container storage interfaces (CSI) and container network interfaces
-(CNI). Other open-source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There
+(CNI). Other open source Kubernetes distributions such as MicroK8s, RKE2, and K3s come with a default CSI and CNI. There
is additional complexity and overhead when you want to consume different interface plugins with traditional Kubernetes
distributions. Using PXK-E, you select the interface plugin you want to apply without additional overhead and
complexity.
There are no changes to the Kubernetes source code used in PXK-E, and it follows the same versioning schema as the
-upstream open-source Kubernetes distribution.
+upstream open source Kubernetes distribution.
## Palette Terminal User Interface (TUI)
diff --git a/docs/docs-content/integrations/cilium-tetragon.md b/docs/docs-content/integrations/cilium-tetragon.md
index e70e033c73..91b8950df6 100644
--- a/docs/docs-content/integrations/cilium-tetragon.md
+++ b/docs/docs-content/integrations/cilium-tetragon.md
@@ -12,7 +12,7 @@ tags: ["packs", "cilium-tetragon", "monitoring"]
[Tetragon](https://github.com/cilium/tetragon) is an eBPF based security observability and runtime enforcement. eBPF is
used to safely and efficiently extend the kernel's capabilities without requiring changing the kernel source code or
-loading kernel modules. Tetragon is a Cilium community open-source project that enables profound visibility with
+loading kernel modules. Tetragon is a Cilium community open source project that enables profound visibility with
filtering and aggregation with the eBPF collector support to deliver visibility at depth with minimal overhead.
Palette supports Cilium Tetragon as an add-on pack for monitoring services. Refer to the
diff --git a/docs/docs-content/integrations/cni-azure.md b/docs/docs-content/integrations/cni-azure.md
index 3bcabe5315..fa5f2cf96f 100644
--- a/docs/docs-content/integrations/cni-azure.md
+++ b/docs/docs-content/integrations/cni-azure.md
@@ -34,7 +34,7 @@ CNI:
- **azure**: Azure's own implementation, called
[Azure Network Policy](https://learn.microsoft.com/en-us/azure/virtual-network/kubernetes-network-policies).
-- **calico**: An open-source network and network security solution developed by [Tigera](https://www.tigera.io/).
+- **calico**: An open source network and network security solution developed by [Tigera](https://www.tigera.io/).
- **none**: No network policy is applied. Use this option if you do not want to apply any network policy.
diff --git a/docs/docs-content/integrations/csi-rook-ceph-addon.md b/docs/docs-content/integrations/csi-rook-ceph-addon.md
index 1181b6f1c6..15fc921274 100644
--- a/docs/docs-content/integrations/csi-rook-ceph-addon.md
+++ b/docs/docs-content/integrations/csi-rook-ceph-addon.md
@@ -1,7 +1,7 @@
---
sidebar_label: "rook-ceph"
title: "Rook Ceph"
-description: "Rook is an open-source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph
+description: "Rook is an open source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph
storage to natively integrate with cloud-native environments. Ceph is a distributed storage system that provides file,
block, and object storage and is deployed in large-scale production clusters."
hide_table_of_contents: true
diff --git a/docs/docs-content/integrations/csi-rook-ceph.md b/docs/docs-content/integrations/csi-rook-ceph.md
index d08f6f6cdf..36397d095c 100644
--- a/docs/docs-content/integrations/csi-rook-ceph.md
+++ b/docs/docs-content/integrations/csi-rook-ceph.md
@@ -1,7 +1,7 @@
---
sidebar_label: "rook-ceph"
title: "Rook Ceph"
-description: "Rook is an open-source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph
+description: "Rook is an open source cloud-native storage orchestrator that provides the platform, framework, and support for Ceph
storage to natively integrate with cloud-native environments. Ceph is a distributed storage system that provides file,
block, and object storage and is deployed in large-scale production clusters."
hide_table_of_contents: true
diff --git a/docs/docs-content/integrations/kubernetes-support.md b/docs/docs-content/integrations/kubernetes-support.md
index 9af0507ad3..e7e5e33d12 100644
--- a/docs/docs-content/integrations/kubernetes-support.md
+++ b/docs/docs-content/integrations/kubernetes-support.md
@@ -20,7 +20,7 @@ The table below lists the Kubernetes distributions we support and the duration o
| Kubernetes Distribution | Supported Minor Versions | Support Duration | Notes |
| ------------------------------------------ | ------------------------ | ---------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------- |
-| CNCF Kubernetes | N-3 | 14 months | The official open-source version of [Kubernetes](https://kubernetes.io/). |
+| CNCF Kubernetes | N-3 | 14 months | The official open source version of [Kubernetes](https://kubernetes.io/). |
| Palette eXtended Kubernetes (PXK) | N-3 | 14 months | Additional support may be extended. Discuss this with our support team if you need additional support. |
| Palette eXtended Kubernetes - Edge (PXK-E) | N-3 | 14 months | Additional support may be extended. Discuss this with our support team if you need additional support. |
| Other | N-3 | EOL | Other distributions available in Palette such as K3s, Microk8s, and RKE2, we only support until their official EOL. The EOL is set by the respective owner. |
diff --git a/docs/docs-content/integrations/kubernetes.md b/docs/docs-content/integrations/kubernetes.md
index e5a2d163a3..b851137da0 100644
--- a/docs/docs-content/integrations/kubernetes.md
+++ b/docs/docs-content/integrations/kubernetes.md
@@ -31,25 +31,25 @@ Review our [Maintenance Policy](maintenance-policy.md) to learn about pack updat
## What is PXK?
-Palette eXtended Kubernetes (PXK) is a recompiled version of the open-source Cloud Native Computing Foundation (CNCF)
+Palette eXtended Kubernetes (PXK) is a recompiled version of the open source Cloud Native Computing Foundation (CNCF)
distribution of Kubernetes. This Kubernetes version can be deployed through Palette to all major infrastructure
providers, public cloud providers, and private data center providers. This is the default distribution when deploying a
Kubernetes cluster through Palette. You have the option to choose other Kubernetes distributions, such as MicroK8s,
Konvoy, and more, should you want to consume a different Kubernetes distribution.
-PXK is different from the upstream open-source Kubernetes version primarily because of the carefully reviewed and
+PXK is different from the upstream open source Kubernetes version primarily because of the carefully reviewed and
applied hardening of the operating system (OS) and Kubernetes. The hardening ranges from removing unused kernel modules
to using an OS configuration that follows industry best practices. Our recompiled Kubernetes configuration addresses
common Kubernetes deployment security pitfalls and implements industry best practices.
A benefit of Palette when used with PXK is the ability to apply different flavors of container storage interface (CSI)
-plugins and container network interface (CNI) plugins. Other open-source Kubernetes distributions, such as MicroK8s,
+plugins and container network interface (CNI) plugins. Other open source Kubernetes distributions, such as MicroK8s,
RKE2, and K3s, come with a default CSI and CNI. Additional complexity and overhead are required from you to enable
different interfaces. PXK supports the ability to select other interface plugins out of the box without any additional
overhead or complexity needed from your side.
-There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream
-open-source Kubernetes distribution.
+There are no changes to the Kubernetes source code and we also follow the same versioning schema as the upstream open
+source Kubernetes distribution.
:::info
diff --git a/docs/docs-content/integrations/prometheus-operator.md b/docs/docs-content/integrations/prometheus-operator.md
index 733ec7b646..817d9c9fa4 100644
--- a/docs/docs-content/integrations/prometheus-operator.md
+++ b/docs/docs-content/integrations/prometheus-operator.md
@@ -78,7 +78,7 @@ Toggle the **Enable** button to enable the use of Ingress.
## Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -222,7 +222,7 @@ Toggle the **Enable** button to enable the use of Ingress.
## Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -366,7 +366,7 @@ Toggle the **Enable** button to enable the use of Ingress.
## Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -512,7 +512,7 @@ Toggle the **Enable** button to enable the use of Ingress.
## Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -621,7 +621,7 @@ Toggle the **Enable** button to enable the use of Ingress.
## Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
@@ -721,7 +721,7 @@ Toggle the **Enable** button to enable the use of Ingress.
## Thanos SideCar
-[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open-source system for running large-scale,
+[Thanos](https://prometheus-operator.dev/docs/platform/thanos/) is an open source system for running large-scale,
distributed, and highly available Prometheus setups. Thanos allows Prometheus to store data for extended periods in
object storage, such as Amazon S3 or Google Cloud Storage, instead of a local disk. This enables Prometheus to scale
horizontally without the risk of using up local storage space.
diff --git a/docs/docs-content/introduction/introduction.md b/docs/docs-content/introduction/introduction.md
index fa093ff097..7465f2cb9e 100644
--- a/docs/docs-content/introduction/introduction.md
+++ b/docs/docs-content/introduction/introduction.md
@@ -63,7 +63,7 @@ Palette has the richest coverage in supported environments that includes:
## What is Under the Hood?
-Palette uniquely extends and integrates the Cloud Native Computing Foundation (CNCF) open-source Cluster API project.
+Palette uniquely extends and integrates the Cloud Native Computing Foundation (CNCF) open source Cluster API project.
Palette does this by providing comprehensive full-stack modeling and orchestration, governance, security, and day 0 -
day 2 management capabilities.
diff --git a/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md b/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md
index 79e12c0594..524e81ec47 100644
--- a/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md
+++ b/docs/docs-content/kubernetes-knowlege-hub/how-to/how-to-retrieve-images-from-private-registry.md
@@ -12,7 +12,7 @@ tags: ["how-to", "k8s-tips"]
## How To Retrieve Images from a Private Registry in Kubernetes
-Kubernetes is an open-source container orchestration platform that enables efficient management, deployment, and scaling
+Kubernetes is an open source container orchestration platform that enables efficient management, deployment, and scaling
of containerized applications.
By default, Docker and Kubernetes allow a limited number of unauthenticated pulls from a Docker registry, such as Docker
diff --git a/docs/docs-content/legal-licenses/legal-licenses.md b/docs/docs-content/legal-licenses/legal-licenses.md
index 8797860228..ab91fb5de9 100644
--- a/docs/docs-content/legal-licenses/legal-licenses.md
+++ b/docs/docs-content/legal-licenses/legal-licenses.md
@@ -16,6 +16,6 @@ concerns, please contact us at [contact@spectrocloud.com](mailto:contact@spectro
- [About Us](https://www.spectrocloud.com/company)
- [Compliance](compliance.md)
-- [Open-Source Licenses](oss-licenses.md)
+- [Open Source Licenses](oss-licenses.md)
- [Partners](https://www.spectrocloud.com/partners)
- [Security Bulletins](../security-bulletins/security-bulletins.md)
diff --git a/docs/docs-content/legal-licenses/oss-licenses.md b/docs/docs-content/legal-licenses/oss-licenses.md
index 98c531fb6e..97be3f9f2b 100644
--- a/docs/docs-content/legal-licenses/oss-licenses.md
+++ b/docs/docs-content/legal-licenses/oss-licenses.md
@@ -1,14 +1,14 @@
---
-sidebar_label: "Open-source Licenses"
-title: "Open-source Licenses"
-description: "Review the open-source licenses tied to the libraries and modules currently in use by Palette."
+sidebar_label: "Open source Licenses"
+title: "Open source Licenses"
+description: "Review the open source licenses tied to the libraries and modules currently in use by Palette."
sidebar_position: 30
tags: ["legal", "licenses"]
---
-The following table lists the open-source licenses tied to the libraries and modules currently in use by Palette. If you
+The following table lists the open source licenses tied to the libraries and modules currently in use by Palette. If you
have any questions or concerns, contact us at support@spectrocloud.com
| **Library** | **Version** | **License** |
diff --git a/docs/docs-content/tutorials/profiles/deploy-pack.md b/docs/docs-content/tutorials/profiles/deploy-pack.md
index 739215979c..16db67d568 100644
--- a/docs/docs-content/tutorials/profiles/deploy-pack.md
+++ b/docs/docs-content/tutorials/profiles/deploy-pack.md
@@ -15,7 +15,7 @@ ensures uniformity across your clusters. The primary use cases for creating cust
- Aggregated configuration and application dependencies simplify deployment and consumption.
-- Open-source contributors can add new Kubernetes applications to a custom add-on pack for the community.
+- Open source contributors can add new Kubernetes applications to a custom add-on pack for the community.
- Enterprises can add proprietary Kubernetes applications to a custom add-on pack.
diff --git a/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md b/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md
index e9ae2e0cf2..71d3443156 100644
--- a/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md
+++ b/docs/docs-content/user-management/saml-sso/palette-sso-with-keycloak.md
@@ -9,7 +9,7 @@ hiddenFromNav: false
tags: ["user-management", "oidc-sso", "Keycloak"]
---
-Keycloak is an open-source Identity and Access Management (IAM) tool, primarily used for simplifying the authentication
+Keycloak is an open source Identity and Access Management (IAM) tool, primarily used for simplifying the authentication
and authorization processes in modern applications and services. It provides a wide range of features including Single
Sign-On (SSO), two-factor authentication, and social login capabilities. Keycloak is designed to manage users,
credentials, roles, and groups efficiently, enabling developers to secure their applications and services with minimal
diff --git a/docs/docs-content/vertex/fips/fips-compliant-components.md b/docs/docs-content/vertex/fips/fips-compliant-components.md
index 6a2b9bd9fe..16622dec11 100644
--- a/docs/docs-content/vertex/fips/fips-compliant-components.md
+++ b/docs/docs-content/vertex/fips/fips-compliant-components.md
@@ -60,7 +60,7 @@ each Kubernetes distribution.
:::
-All PXK and PXKE components and supporting open-source components are compiled in their native programming language
+All PXK and PXKE components and supporting open source components are compiled in their native programming language
using language specific FIPS-compliant libraries and static linking. If the component is not available in the form of a
FIPS-compliant binary, we compile it with FIPS-compliant compiler and libraries. The following tables list the
FIPS-compliant components in PXK and PXK-E:
diff --git a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md
index c01fa944c2..8978bfa52d 100644
--- a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md
+++ b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/airgap-install/install.md
@@ -762,7 +762,7 @@ environment. Reach out to our support team if you need assistance.
:::tip
- For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation
+ For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation
process.
:::
diff --git a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md
index 1da2207461..9178577451 100644
--- a/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md
+++ b/docs/docs-content/vertex/install-palette-vertex/install-on-kubernetes/install.md
@@ -674,7 +674,7 @@ your environment. Reach out to our support team if you need assistance.
:::tip
- For a more user-friendly experience, use the open-source tool [k9s](https://k9scli.io/) to monitor the installation
+ For a more user-friendly experience, use the open source tool [k9s](https://k9scli.io/) to monitor the installation
process.
:::
diff --git a/docs/docs-content/vm-management/architecture.md b/docs/docs-content/vm-management/architecture.md
index 484bb4eec9..54d1e1e430 100644
--- a/docs/docs-content/vm-management/architecture.md
+++ b/docs/docs-content/vm-management/architecture.md
@@ -46,7 +46,7 @@ By default, Palette VMO includes the following components:
- **Spectro VM Dashboard**. Enables you to create, manage, and monitor VMs from Palette. The dashboard becomes available
once the VMO pack is successfully deployed as part of your cluster profile.
-- **KubeVirt**. This open-source solution enables you to create and manage VMs within Kubernetes clusters. KubeVirt
+- **KubeVirt**. This open source solution enables you to create and manage VMs within Kubernetes clusters. KubeVirt
extends Kubernetes with additional virtualization resource types using Kubernetes Custom Resource Definitions (CRD)
API.
diff --git a/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md b/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md
index 806e9c2529..025fb7e8cf 100644
--- a/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md
+++ b/docs/docs-content/vm-management/create-manage-vm/advanced-topics/migrate-vm-kubevirt.md
@@ -10,7 +10,7 @@ tags: ["vmo", "palette-cli"]
During large scale Kubernetes adoptions, workloads are often rehosted or migrated instead of being redeployed from
scratch. This process allows system administrators to copy the application, together with its data, to a Kubernetes
-cluster. However, the migration of VMs can be time consuming if done manually, so it is often automated with open-source
+cluster. However, the migration of VMs can be time consuming if done manually, so it is often automated with open source
tools such as [Forklift](https://github.com/kubev2v/forklift).
The [Palette CLI](../../../automation/palette-cli/palette-cli.md) provides the ability to migrate Virtual Machines (VMs)
diff --git a/styleguide/spectro-cloud-style-guide.md b/styleguide/spectro-cloud-style-guide.md
index 03e4d56ef7..437c1cfd35 100644
--- a/styleguide/spectro-cloud-style-guide.md
+++ b/styleguide/spectro-cloud-style-guide.md
@@ -487,7 +487,7 @@ Capitalize the first word and all proper nouns, such as product names. To learn
Don’t capitalize common nouns unless required.
-- Kubernetes is an open-source container orchestration platform.
+- Kubernetes is an open source container orchestration platform.
- Kubectl allows you to connect to, configure and work with your clusters through the command line.