Skip to content

Commit

Permalink
Examples spell fixes and discord example fix (gravitational#22606)
Browse files Browse the repository at this point in the history
  • Loading branch information
stevenGravy authored Mar 3, 2023
1 parent d4163e1 commit d281fd7
Show file tree
Hide file tree
Showing 9 changed files with 12 additions and 12 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ resource "aws_security_group_rule" "auth_ingress_allow_cidr_traffic" {

// Allow traffic from nodes to auth servers.
// Teleport nodes heartbeat presence to auth server.
// This rule uses CIDR as opposed to security group ip becasue traffic coming from NLB
// This rule uses CIDR as opposed to security group ip because traffic coming from NLB
// (network load balancer from Amazon)
// is not marked with security group ID and rules using the security group ids do not work,
// so CIDR ranges are necessary.
Expand Down
2 changes: 1 addition & 1 deletion examples/aws/terraform/ha-autoscale-cluster/monitor_asg.tf
Original file line number Diff line number Diff line change
Expand Up @@ -184,7 +184,7 @@ resource "aws_security_group_rule" "monitor_egress_allow_all_traffic" {

// Network load balancer for influxdb collector
// Notice that in this case it is in the single subnet
// because network load balancers only distriute traffic
// because network load balancers only distribute traffic
// in the same AZ, and this example does not have HA InfluxDB setup
resource "aws_lb" "monitor" {
name = "${var.cluster_name}-monitor"
Expand Down
2 changes: 1 addition & 1 deletion examples/aws/terraform/ha-autoscale-cluster/node_iam.tf
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
// Node isntance profile and roles
// Node instance profile and roles
resource "aws_iam_role" "node" {
name = "${var.cluster_name}-node"

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ resource "aws_route_table_association" "node" {
}

// Node security groups do not allow direct internet access
// and only allow traffic comming in from proxies or
// and only allow traffic coming in from proxies or
// emergency access bastions
resource "aws_security_group" "node" {
name = "${var.cluster_name}-node"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ spec:
nullable: true
type: array
db_users:
description: DatabaseUsers is a list of databaes users this role
description: DatabaseUsers is a list of databases users this role
is allowed to connect as.
items:
type: string
Expand Down Expand Up @@ -458,7 +458,7 @@ spec:
nullable: true
type: array
db_users:
description: DatabaseUsers is a list of databaes users this role
description: DatabaseUsers is a list of databases users this role
is allowed to connect as.
items:
type: string
Expand Down Expand Up @@ -1082,7 +1082,7 @@ spec:
nullable: true
type: array
db_users:
description: DatabaseUsers is a list of databaes users this role
description: DatabaseUsers is a list of databases users this role
is allowed to connect as.
items:
type: string
Expand Down Expand Up @@ -1465,7 +1465,7 @@ spec:
nullable: true
type: array
db_users:
description: DatabaseUsers is a list of databaes users this role
description: DatabaseUsers is a list of databases users this role
is allowed to connect as.
items:
type: string
Expand Down
2 changes: 1 addition & 1 deletion examples/chart/teleport-kube-agent/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ $ helm install teleport-kube-agent . \
--set kubeClusterName=${KUBERNETES_CLUSTER_NAME?}
```

Note that due to backwards compatbility, the `labels` value **only** applies to the Teleport
Note that due to backwards compatibility, the `labels` value **only** applies to the Teleport
Kubernetes service. To set labels for applications or databases, use the different formats
detailed below.

Expand Down
2 changes: 1 addition & 1 deletion examples/gke-auth/get-kubeconfig.sh
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
# cloud provider specific auth "plugins" because it works on any cluster
# and does not require any extra binaries. It produces kubeconfig to build/kubeconfig

# This script can be used to retreive x509 certificate from a GKE cluster
# This script can be used to retrieve x509 certificate from a GKE cluster
# which can be used for accessing the CSR API with Teleport
#
# For more information see:
Expand Down
2 changes: 1 addition & 1 deletion examples/load-tests/node-agent/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ serviceAccount:
create: true

joinParams:
# the kubernetes join method is not currently suited for joining a large amoubt of nodes in a short time
# the kubernetes join method is not currently suited for joining a large amount of nodes in a short time
method: token
# DO NOT USE THIS IN PRODUCTION
token_name: qwertyuiop
Expand Down
2 changes: 1 addition & 1 deletion examples/resources/plugins/teleport-discord-helm.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ teleport: {}
# address: "teleportauth:3025" # Teleport Auth Server GRPC API address
# identitySecretName: teleport-plugin-discord-identity # Secret containing identity

disxcord:
discord:
token: "XXXXXXXX" # Discord Bot OAuth token

# Mapping from role to recipients
Expand Down

0 comments on commit d281fd7

Please sign in to comment.