Skip to content

Commit 28bfcf6

Browse files
committed
Fixed typos
1 parent f9b8fc1 commit 28bfcf6

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

adoc/SAP-EIC-General.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The following excerpt shows how to create such a CSR:
4141
openssl req -newkey rsa:2048 -keyout domain.key -out domain.csr -passout pass:<csr-passphrase> -subj "/C=DE/ST=BW/L=Nuremberg/O=SUSE"
4242
----
4343

44-
Before you can sign the CSR, you need to add the DNS names of your Kuberntes Services to the CSR.
44+
Before you can sign the CSR, you need to add the DNS names of your Kubernetes Services to the CSR.
4545
Therefore, create a file with the content below and replace the *<servicename>* and *<namespace>* with the name of your Kubernetes service and the namespace in which it is placed:
4646

4747
[source, bash]
@@ -164,7 +164,7 @@ spec:
164164
- key encipherment
165165
----
166166
167-
Apply the yaml file to your kubernetes cluster.
167+
Apply the yaml file to your Kubernetes cluster.
168168
[source, bash]
169169
----
170170
kubectl apply -f selfsigned-issuer.yaml

adoc/SAP-EIC-Harvester-main.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,14 +118,14 @@ For a graphical overview of what is needed, take a look at the landscape overvie
118118

119119
image::SAP-EIC-Harvester-Architecture.svg[title=Architecture EIC Cluster,scaledwidth=99%,opts=inline,Embedded]
120120

121-
* The grey rectangles represent phyiscal servers (hardware).
121+
* The grey rectangles represent physical servers (hardware).
122122
* The orange rectangles represent {harvester} instances.
123123
* The blue rectangles represent Kubernetes clusters.
124124
* The green rectangles represent virtual machines.
125125

126126
We will use this graphic overview in the guide to illustrate what the next step is and what it is for.
127127

128-
NOTE: If you want to test upgrades of {harvester}, we recommend setting up an additional {harvester} cluster and seperate the production {eic} instances from the development and test instances.
128+
NOTE: If you want to test upgrades of {harvester}, we recommend setting up an additional {harvester} cluster and separate the production {eic} instances from the development and test instances.
129129

130130
Starting with installing {harvester}, we will walk you through all the steps you need to take to get a fully set-up Kubernetes landscape for deploying {eic}.
131131

adoc/SAP-Rancher-RKE2-Installation.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ image::SAP-Rancher-Create-Register.png[title=Rancher create registration,scaledw
3838
Now, in a first step, select the roles your node(s) should receive.
3939
A common high availability setup holds:
4040

41-
* 3 x etcd / controll plane nodes
41+
* 3 x etcd / control plane nodes
4242
* 3 x worker nodes
4343
4444
The next step is to copy the registration command to the target machines' shell and execute it.
@@ -67,7 +67,7 @@ image::SAP-Rancher-Create-Harvester-Landing.png[title=Rancher create harvester l
6767
Configure the cluster according to your requirements.
6868
For a highly available setup, we recommend using at least:
6969

70-
* 3 x etcd / controll plane nodes
70+
* 3 x etcd / control plane nodes
7171
* 3 x worker nodes
7272
7373
To do this, configure one pool of machines with a *Machine Count* of 3 and select only *etcd* and *Control Plane* for the roles.

0 commit comments

Comments
 (0)