Skip to content

Commit b7eafa3

Browse files
lucacomeJTorreG
andauthored
Fix typos and links version (#3264)
Co-authored-by: Jcahilltorre <[email protected]>
1 parent 9899c07 commit b7eafa3

File tree

6 files changed

+8
-8
lines changed

6 files changed

+8
-8
lines changed

docs/content/installation/installation-with-operator.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ This document describes how to install the NGINX Ingress Controller in your Kube
1717
* For NGINX Plus Ingress Controller, see [here](/nginx-ingress-controller/installation/pulling-ingress-controller-image) for details on how to pull the image from the F5 Docker registry.
1818
* To pull from the F5 Container registry, configure a docker registry secret using your JWT token from the MyF5 portal by following the instructions from [here](/nginx-ingress-controller/installation/using-the-jwt-token-docker-secret).
1919
* It is also possible to build your own image and push it to your private Docker registry by following the instructions from [here](/nginx-ingress-controller/installation/building-ingress-controller-image).
20-
2. Install the NGINX Ingress Operator following the [instructions](https://github.com/nginxinc/nginx-ingress-helm-operator/blob/v1.0.0/docs/installation.md).
21-
3. Create the default server secret and SecurityContextConstraint as oulined in the [instructions](https://github.com/nginxinc/nginx-ingress-helm-operator/blob/v1.0.0/docs/installation.md).
20+
2. Install the NGINX Ingress Operator following the [instructions](https://github.com/nginxinc/nginx-ingress-helm-operator/blob/v1.2.1/docs/installation.md).
21+
3. Create the default server secret and SecurityContextConstraint as outlined in the [instructions](https://github.com/nginxinc/nginx-ingress-helm-operator/blob/v1.2.1/docs/installation.md).
2222

2323
## 1. Create the NginxIngressController manifest
2424

@@ -56,4 +56,4 @@ $ kubectl apply -f nginx-ingress-controller.yaml
5656
5757
A new instance of the NGINX Ingress Controller will be deployed by the NGINX Ingress Operator in the `default` namespace with default parameters.
5858
59-
To configure other parameters of the NginxIngressController resource, check the [documentation](https://github.com/nginxinc/nginx-ingress-helm-operator/blob/v1.0.0/docs/nginx-ingress-controller.md).
59+
To configure other parameters of the NginxIngressController resource, check the [documentation](https://github.com/nginxinc/nginx-ingress-helm-operator/blob/v1.2.1/docs/nginx-ingress-controller.md).

docs/content/intro/how-nginx-ingress-controller-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -309,7 +309,7 @@ A reload involves multiple steps:
309309
2. Assuming the command succeeds, the Ingress Controller periodically checks for the config version by sending an HTTP request to the config version server on `unix:/var/lib/nginx/nginx-config-version.sock`.
310310
3. Once the Ingress Controller sees the correct config version returned by NGINX, it considers the reload successful. If it doesn't see the correct config version after the configurable timeout (see `-nginx-reload-timeout` [cli argument](/nginx-ingress-controller/configuration/global-configuration/command-line-arguments), the Ingress Controller considers the reload failed.
311311

312-
> The [Ingress Controler Control Loop](#the-control-loop) stops during a reload so that it cannot change any configuration files or reload NGINX until the current reload succeeds or fails.
312+
> The [Ingress Controller Control Loop](#the-control-loop) stops during a reload so that it cannot change any configuration files or reload NGINX until the current reload succeeds or fails.
313313
314314
### When the Ingress Controller Reloads NGINX
315315

examples/custom-resources/externalname-services/transport-server/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ An ExternalName service is defined by an external DNS name that is resolved into
88

99
# Prerequisites
1010

11-
For the illustration purpose we will run NGINX Ingress Controller (refered as NIC in the examples) with the ```-watch-namespace=nginx-ingress,default``` option. The option enables NIC to watch selected namespaces.
11+
For illustration purposes, we will run NGINX Ingress Controller (referred to as NIC in the examples) with the ```-watch-namespace=nginx-ingress,default``` option. The option enables NIC to watch selected namespaces.
1212

1313
Any application deployed in other namespaces will be treated as an external service.
1414

internal/externaldns/controller.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ import (
2222
)
2323

2424
const (
25-
// ControllerName is the name of the externaldns controler.
25+
// ControllerName is the name of the externaldns controller.
2626
ControllerName = "externaldns"
2727
)
2828

pkg/apis/dos/validation/dos.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ func validateResourceReference(ref string) error {
8989
return nil
9090
}
9191

92-
// checkAppProtectDosLogConfContentField check conetent field doesnt appear in dos log
92+
// checkAppProtectDosLogConfContentField check content field doesn't appear in dos log
9393
func checkAppProtectDosLogConfContentField(obj *unstructured.Unstructured) string {
9494
_, found, err := unstructured.NestedMap(obj.Object, "spec", "content")
9595
if err == nil && found {

tests/suite/test_dos.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -435,7 +435,7 @@ def test_dos_arbitrator_different_ns(
435435
Test App Protect Dos: Check new IC pod get learning info with arbitrator from different namespace
436436
"""
437437

438-
print("Remove dos arbitrator from namesapce: ", ingress_controller_prerequisites.namespace)
438+
print("Remove dos arbitrator from namespace: ", ingress_controller_prerequisites.namespace)
439439
delete_dos_arbitrator(
440440
kube_apis.v1, kube_apis.apps_v1_api, "appprotect-dos-arb", ingress_controller_prerequisites.namespace
441441
)

0 commit comments

Comments
 (0)