Skip to content

Commit d6a1ba2

Browse files
committed
Fix the grammar by using the verb form 'set up' where appropriate instead of the noun 'setup'
1 parent 17c3350 commit d6a1ba2

File tree

16 files changed

+18
-18
lines changed

16 files changed

+18
-18
lines changed

content/en/docs/concepts/cluster-administration/proxies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ There are several different proxies you may encounter when using Kubernetes:
5656
- implementation varies by cloud provider.
5757

5858
Kubernetes users will typically not need to worry about anything other than the first two types. The cluster admin
59-
will typically ensure that the latter types are setup correctly.
59+
will typically ensure that the latter types are set up correctly.
6060

6161
## Requesting redirects
6262

content/en/docs/concepts/containers/images.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ Credentials can be provided in several ways:
162162
- requires node configuration by cluster administrator
163163
- Pre-pulled Images
164164
- all pods can use any images cached on a node
165-
- requires root access to all nodes to setup
165+
- requires root access to all nodes to set up
166166
- Specifying ImagePullSecrets on a Pod
167167
- only pods which provide own keys can access the private registry
168168
- Vendor-specific or local extensions

content/en/docs/concepts/services-networking/connect-applications-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,7 @@ Noteworthy points about the nginx-secure-app manifest:
305305
serves HTTP traffic on port 80 and HTTPS traffic on 443, and nginx Service
306306
exposes both ports.
307307
- Each container has access to the keys through a volume mounted at `/etc/nginx/ssl`.
308-
This is setup *before* the nginx server is started.
308+
This is set up *before* the nginx server is started.
309309

310310
```shell
311311
kubectl delete deployments,svc my-nginx; kubectl create -f ./nginx-secure-app.yaml

content/en/docs/concepts/services-networking/dns-pod-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ search ns1.svc.cluster-domain.example my.dns.search.suffix
301301
options ndots:2 edns0
302302
```
303303

304-
For IPv6 setup, search path and name server should be setup like this:
304+
For IPv6 setup, search path and name server should be set up like this:
305305

306306
```shell
307307
kubectl exec -it dns-example -- cat /etc/resolv.conf

content/en/docs/concepts/workloads/controllers/deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -620,7 +620,7 @@ deployment.apps/nginx-deployment scaled
620620
```
621621

622622
Assuming [horizontal Pod autoscaling](/docs/tasks/run-application/horizontal-pod-autoscale-walkthrough/) is enabled
623-
in your cluster, you can setup an autoscaler for your Deployment and choose the minimum and maximum number of
623+
in your cluster, you can set up an autoscaler for your Deployment and choose the minimum and maximum number of
624624
Pods you want to run based on the CPU utilization of your existing Pods.
625625

626626
```shell

content/en/docs/reference/setup-tools/kubeadm/implementation-details.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -457,7 +457,7 @@ access the certificate signing API.
457457
This is implemented by creating a ClusterRoleBinding named `kubeadm:kubelet-bootstrap` between the
458458
group above and the default RBAC role `system:node-bootstrapper`.
459459

460-
#### Setup auto approval for new bootstrap tokens
460+
#### Set up auto approval for new bootstrap tokens
461461

462462
Kubeadm ensures that the Bootstrap Token will get its CSR request automatically approved by the
463463
csrapprover controller.
@@ -470,7 +470,7 @@ The role `system:certificates.k8s.io:certificatesigningrequests:nodeclient` shou
470470
well, granting POST permission to
471471
`/apis/certificates.k8s.io/certificatesigningrequests/nodeclient`.
472472

473-
#### Setup nodes certificate rotation with auto approval
473+
#### Set up nodes certificate rotation with auto approval
474474

475475
Kubeadm ensures that certificate rotation is enabled for nodes, and that new certificate request
476476
for nodes will get its CSR request automatically approved by the csrapprover controller.

content/en/docs/setup/production-environment/tools/kubeadm/high-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ in the kubeadm config file.
269269
270270
1. Follow these [instructions](/docs/setup/production-environment/tools/kubeadm/setup-ha-etcd-with-kubeadm/) to set up the etcd cluster.
271271
272-
1. Setup SSH as described [here](#manual-certs).
272+
1. Set up SSH as described [here](#manual-certs).
273273
274274
1. Copy the following files from any etcd node in the cluster to the first control plane node:
275275

content/en/docs/tasks/access-application-cluster/access-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Kubernetes CLI, `kubectl`.
1818
To access a cluster, you need to know the location of the cluster and have credentials
1919
to access it. Typically, this is automatically set-up when you work through
2020
a [Getting started guide](/docs/setup/),
21-
or someone else setup the cluster and provided you with credentials and a location.
21+
or someone else set up the cluster and provided you with credentials and a location.
2222

2323
Check the location and credentials that kubectl knows about with this command:
2424

@@ -265,5 +265,5 @@ There are several different proxies you may encounter when using Kubernetes:
265265
- implementation varies by cloud provider.
266266

267267
Kubernetes users will typically not need to worry about anything other than the first two types. The cluster admin
268-
will typically ensure that the latter types are setup correctly.
268+
will typically ensure that the latter types are set up correctly.
269269

content/en/docs/tasks/administer-cluster/access-cluster-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Kubernetes command-line tool, `kubectl`.
2222
To access a cluster, you need to know the location of the cluster and have credentials
2323
to access it. Typically, this is automatically set-up when you work through
2424
a [Getting started guide](/docs/setup/),
25-
or someone else setup the cluster and provided you with credentials and a location.
25+
or someone else set up the cluster and provided you with credentials and a location.
2626

2727
Check the location and credentials that kubectl knows about with this command:
2828

content/en/docs/tasks/administer-cluster/kubeadm/configure-cgroup-driver.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The [Container runtimes](/docs/setup/production-environment/container-runtimes)
2222
explains that the `systemd` driver is recommended for kubeadm based setups instead
2323
of the `cgroupfs` driver, because kubeadm manages the kubelet as a systemd service.
2424

25-
The page also provides details on how to setup a number of different container runtimes with the
25+
The page also provides details on how to set up a number of different container runtimes with the
2626
`systemd` driver by default.
2727

2828
## Configuring the kubelet cgroup driver

0 commit comments

Comments
 (0)