Skip to content

Commit

Permalink
DOC: Minor typos fixes (#669)
Browse files Browse the repository at this point in the history
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
  • Loading branch information
hayorov and tomhjp authored Aug 16, 2022
1 parent eca526b commit 9fa4c6c
Showing 1 changed file with 8 additions and 8 deletions.
16 changes: 8 additions & 8 deletions values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ injector:
webhook:
# Configures failurePolicy of the webhook. The "unspecified" default behaviour depends on the
# API Version of the WebHook.
# To block pod creation while webhook is unavailable, set the policy to `Fail` below.
# To block pod creation while the webhook is unavailable, set the policy to `Fail` below.
# See https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#failure-policy
#
failurePolicy: Ignore
Expand Down Expand Up @@ -192,7 +192,7 @@ injector:

# caBundle is a base64-encoded PEM-encoded certificate bundle for the CA
# that signed the TLS certificate that the webhook serves. This must be set
# if secretName is non-null, unless an external service like cert-manager is
# if secretName is non-null unless an external service like cert-manager is
# keeping the caBundle updated.
caBundle: ""

Expand Down Expand Up @@ -232,7 +232,7 @@ injector:
# KUBERNETES_SERVICE_HOST: kubernetes.default.svc

# Affinity Settings for injector pods
# This can either be multi-line string or YAML matching the PodSpec's affinity field.
# This can either be a multi-line string or YAML matching the PodSpec's affinity field.
# Commenting out or setting as empty the affinity variable, will allow
# deployment of multiple replicas to single node services such as Minikube.
affinity: |
Expand Down Expand Up @@ -442,7 +442,7 @@ server:
extraContainers: null

# shareProcessNamespace enables process namespace sharing between Vault and the extraContainers
# This is useful if Vault must be signaled, e.g. to send a SIGHUP for log rotation
# This is useful if Vault must be signaled, e.g. to send a SIGHUP for a log rotation
shareProcessNamespace: false

# extraArgs is a string containing additional Vault server arguments.
Expand Down Expand Up @@ -592,10 +592,10 @@ server:
service:
enabled: true
# clusterIP controls whether a Cluster IP address is attached to the
# Vault service within Kubernetes. By default the Vault service will
# Vault service within Kubernetes. By default, the Vault service will
# be given a Cluster IP address, set to None to disable. When disabled
# Kubernetes will create a "headless" service. Headless services can be
# used to communicate with pods directly through DNS instead of a round robin
# used to communicate with pods directly through DNS instead of a round-robin
# load balancer.
# clusterIP: None

Expand Down Expand Up @@ -653,7 +653,7 @@ server:
annotations: {}

# This configures the Vault Statefulset to create a PVC for audit
# logs. Once Vault is deployed, initialized and unsealed, Vault must
# logs. Once Vault is deployed, initialized, and unsealed, Vault must
# be configured to use this for audit logs. This will be mounted to
# /vault/audit
# See https://www.vaultproject.io/docs/audit/index.html to know more
Expand Down Expand Up @@ -720,7 +720,7 @@ server:
# crypto_key = "vault-helm-unseal-key"
#}
# Run Vault in "HA" mode. There are no storage requirements unless audit log
# Run Vault in "HA" mode. There are no storage requirements unless the audit log
# persistence is required. In HA mode Vault will configure itself to use Consul
# for its storage backend. The default configuration provided will work the Consul
# Helm project by default. It is possible to manually configure Vault to use a
Expand Down

0 comments on commit 9fa4c6c

Please sign in to comment.