From 9fa4c6c3222a5783579bc1af383b4ade527e71a6 Mon Sep 17 00:00:00 2001 From: Alex Khaerov Date: Wed, 17 Aug 2022 03:39:59 +0800 Subject: [PATCH] DOC: Minor typos fixes (#669) Co-authored-by: Tom Proctor --- values.yaml | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/values.yaml b/values.yaml index 66b5723..190fe1f 100644 --- a/values.yaml +++ b/values.yaml @@ -101,7 +101,7 @@ injector: webhook: # Configures failurePolicy of the webhook. The "unspecified" default behaviour depends on the # API Version of the WebHook. - # To block pod creation while webhook is unavailable, set the policy to `Fail` below. + # To block pod creation while the webhook is unavailable, set the policy to `Fail` below. # See https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#failure-policy # failurePolicy: Ignore @@ -192,7 +192,7 @@ injector: # caBundle is a base64-encoded PEM-encoded certificate bundle for the CA # that signed the TLS certificate that the webhook serves. This must be set - # if secretName is non-null, unless an external service like cert-manager is + # if secretName is non-null unless an external service like cert-manager is # keeping the caBundle updated. caBundle: "" @@ -232,7 +232,7 @@ injector: # KUBERNETES_SERVICE_HOST: kubernetes.default.svc # Affinity Settings for injector pods - # This can either be multi-line string or YAML matching the PodSpec's affinity field. + # This can either be a multi-line string or YAML matching the PodSpec's affinity field. # Commenting out or setting as empty the affinity variable, will allow # deployment of multiple replicas to single node services such as Minikube. affinity: | @@ -442,7 +442,7 @@ server: extraContainers: null # shareProcessNamespace enables process namespace sharing between Vault and the extraContainers - # This is useful if Vault must be signaled, e.g. to send a SIGHUP for log rotation + # This is useful if Vault must be signaled, e.g. to send a SIGHUP for a log rotation shareProcessNamespace: false # extraArgs is a string containing additional Vault server arguments. @@ -592,10 +592,10 @@ server: service: enabled: true # clusterIP controls whether a Cluster IP address is attached to the - # Vault service within Kubernetes. By default the Vault service will + # Vault service within Kubernetes. By default, the Vault service will # be given a Cluster IP address, set to None to disable. When disabled # Kubernetes will create a "headless" service. Headless services can be - # used to communicate with pods directly through DNS instead of a round robin + # used to communicate with pods directly through DNS instead of a round-robin # load balancer. # clusterIP: None @@ -653,7 +653,7 @@ server: annotations: {} # This configures the Vault Statefulset to create a PVC for audit - # logs. Once Vault is deployed, initialized and unsealed, Vault must + # logs. Once Vault is deployed, initialized, and unsealed, Vault must # be configured to use this for audit logs. This will be mounted to # /vault/audit # See https://www.vaultproject.io/docs/audit/index.html to know more @@ -720,7 +720,7 @@ server: # crypto_key = "vault-helm-unseal-key" #} - # Run Vault in "HA" mode. There are no storage requirements unless audit log + # Run Vault in "HA" mode. There are no storage requirements unless the audit log # persistence is required. In HA mode Vault will configure itself to use Consul # for its storage backend. The default configuration provided will work the Consul # Helm project by default. It is possible to manually configure Vault to use a