Skip to content

Commit 0c1990c

Browse files
authored
minor typo fixes (#631)
* minor typo fixes * minor fixes
1 parent 1d3b108 commit 0c1990c

File tree

5 files changed

+6
-9
lines changed

5 files changed

+6
-9
lines changed

latest/bpg/networking/ipv6.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,7 @@ image::ipv6_eks-cluster-ipv6-foundation.png[Dual Stack VPC, EKS Cluster in IPv6
3838

3939
== Overview
4040

41-
EKS/IPv6 is only supported in prefix mode (VPC-CNI Plug-in ENI IP assign mode). Learn more on xref:prefix-mode-linux[Prefix
42-
Mode].
41+
EKS/IPv6 is only supported in prefix mode (VPC-CNI Plug-in ENI IP assign mode). Learn more on xref:prefix-mode-linux[Prefix Mode].
4342

4443
Prefix assignment only works on Nitro-based EC2 instances, hence EKS/IPv6 is only supported when the cluster data-plane uses EC2 Nitro-based instances.
4544

latest/bpg/networking/vpc-cni.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ It is advised that you https://aws.github.io/aws-eks-best-practices/security/doc
169169

170170
=== Handle Liveness/Readiness Probe failures
171171

172-
We advise increasing the liveness and readiness probe timeout values (default `timeoutSeconds: 10`) for EKS 1.20 an later clusters to prevent probe failures from causing your application's Pod to become stuck in a containerCreating state. This problem has been seen in data-intensive and batch-processing clusters. High CPU use causes aws-node probe health failures, leading to unfulfilled Pod CPU requests. In addition to modifying the probe timeout, ensure that the CPU resource requests (default `CPU: 25m`) for aws-node are correctly configured. We do not suggest updating the settings unless your node is having issues.
172+
We advise increasing the liveness and readiness probe timeout values (default `timeoutSeconds: 10`) for EKS 1.20 and later clusters to prevent probe failures from causing your application's Pod to become stuck in a containerCreating state. This problem has been seen in data-intensive and batch-processing clusters. High CPU use causes aws-node probe health failures, leading to unfulfilled Pod CPU requests. In addition to modifying the probe timeout, ensure that the CPU resource requests (default `CPU: 25m`) for aws-node are correctly configured. We do not suggest updating the settings unless your node is having issues.
173173

174174
We highly encourage you to run sudo `bash /opt/cni/bin/aws-cni-support.sh` on a node while you engage Amazon EKS support. The script will assist in evaluating kubelet logs and memory utilization on the node. Please consider installing SSM Agent on Amazon EKS worker nodes to run the script.
175175

latest/bpg/reliability/application.adoc

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -380,10 +380,8 @@ Deployment and stop sending traffic to the new Deployment.
380380

381381
Although Kubernetes offers no native way to perform canary deployments,
382382
you can use tools such as https://github.com/weaveworks/flagger[Flagger]
383-
with
384-
https://docs.flagger.app/tutorials/istio-progressive-delivery[Istio] or
385-
https://docs.flagger.app/install/flagger-install-on-eks-appmesh[App
386-
Mesh].
383+
with
384+
https://docs.flagger.app/tutorials/istio-progressive-delivery[Istio].
387385

388386
== Health checks and self-healing
389387

latest/bpg/reliability/controlplane.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -273,7 +273,7 @@ https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-con
273273
admission webhooks and mutating admission webhooks]. These allow a user
274274
to extend the kubernetes API and validate or mutate objects before they
275275
are accepted by the API. Poor configurations of these webhooks can
276-
distabilize the EKS control plane by blocking cluster critical
276+
destabilize the EKS control plane by blocking cluster critical
277277
operations.
278278

279279
In order to avoid impacting cluster critical operations either avoid

latest/bpg/security/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ infrastructure/cluster. That can be handled by the
6363
https://github.com/kubernetes/autoscaler/blob/master/cluster-autoscaler/cloudprovider/aws/README.md[cluster-autoscaler]
6464
or other technologies such as https://karpenter.sh/[Karpenter], native
6565
AWS autoscaling, SpotInst’s
66-
https://spot.io/solutions/kubernetes-2/[Ocean], or Atlassian’s
66+
https://spot.io/product/ocean[Ocean], or Atlassian’s
6767
https://github.com/atlassian/escalator[Escalator].
6868

6969
.Shared Responsibility Model - MNG

0 commit comments

Comments
 (0)