Skip to content

Commit 3ff5ec1

Browse files
committed
clean up use of word: just
1 parent ee85c6c commit 3ff5ec1

File tree

81 files changed

+130
-148
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+130
-148
lines changed

content/en/docs/concepts/architecture/nodes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ and contains the services necessary to run
1717
{{< glossary_tooltip text="Pods" term_id="pod" >}}
1818

1919
Typically you have several nodes in a cluster; in a learning or resource-limited
20-
environment, you might have just one.
20+
environment, you might have only one node.
2121

2222
The [components](/docs/concepts/overview/components/#node-components) on a node include the
2323
{{< glossary_tooltip text="kubelet" term_id="kubelet" >}}, a

content/en/docs/concepts/cluster-administration/flow-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ poorly-behaved workloads that may be harming system health.
427427
histogram vector of queue lengths for the queues, broken down by
428428
the labels `priority_level` and `flow_schema`, as sampled by the
429429
enqueued requests. Each request that gets queued contributes one
430-
sample to its histogram, reporting the length of the queue just
430+
sample to its histogram, reporting the length of the queue immediately
431431
after the request was added. Note that this produces different
432432
statistics than an unbiased survey would.
433433
{{< note >}}

content/en/docs/concepts/cluster-administration/manage-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -278,7 +278,7 @@ pod/my-nginx-2035384211-u3t6x labeled
278278
```
279279

280280
This first filters all pods with the label "app=nginx", and then labels them with the "tier=fe".
281-
To see the pods you just labeled, run:
281+
To see the pods you labeled, run:
282282

283283
```shell
284284
kubectl get pods -l app=nginx -L tier
@@ -411,7 +411,7 @@ and
411411

412412
## Disruptive updates
413413

414-
In some cases, you may need to update resource fields that cannot be updated once initialized, or you may just want to make a recursive change immediately, such as to fix broken pods created by a Deployment. To change such fields, use `replace --force`, which deletes and re-creates the resource. In this case, you can modify your original configuration file:
414+
In some cases, you may need to update resource fields that cannot be updated once initialized, or you may want to make a recursive change immediately, such as to fix broken pods created by a Deployment. To change such fields, use `replace --force`, which deletes and re-creates the resource. In this case, you can modify your original configuration file:
415415

416416
```shell
417417
kubectl replace -f https://k8s.io/examples/application/nginx/nginx-deployment.yaml --force

content/en/docs/concepts/cluster-administration/proxies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ There are several different proxies you may encounter when using Kubernetes:
3939
- proxies UDP, TCP and SCTP
4040
- does not understand HTTP
4141
- provides load balancing
42-
- is just used to reach services
42+
- is only used to reach services
4343

4444
1. A Proxy/Load-balancer in front of apiserver(s):
4545

content/en/docs/concepts/configuration/manage-resources-containers.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,7 @@ You cannot overcommit `hugepages-*` resources.
7272
This is different from the `memory` and `cpu` resources.
7373
{{< /note >}}
7474

75-
CPU and memory are collectively referred to as *compute resources*, or just
76-
*resources*. Compute
75+
CPU and memory are collectively referred to as *compute resources*, or *resources*. Compute
7776
resources are measurable quantities that can be requested, allocated, and
7877
consumed. They are distinct from
7978
[API resources](/docs/concepts/overview/kubernetes-api/). API resources, such as Pods and
@@ -554,7 +553,7 @@ extender.
554553

555554
### Consuming extended resources
556555

557-
Users can consume extended resources in Pod specs just like CPU and memory.
556+
Users can consume extended resources in Pod specs like CPU and memory.
558557
The scheduler takes care of the resource accounting so that no more than the
559558
available amount is simultaneously allocated to Pods.
560559

content/en/docs/concepts/configuration/secret.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ empty-secret Opaque 0 2m6s
109109
```
110110

111111
The `DATA` column shows the number of data items stored in the Secret.
112-
In this case, `0` means we have just created an empty Secret.
112+
In this case, `0` means we have created an empty Secret.
113113

114114
### Service account token Secrets
115115

content/en/docs/concepts/containers/images.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ Here are the recommended steps to configuring your nodes to use a private regist
135135
example, run these on your desktop/laptop:
136136

137137
1. Run `docker login [server]` for each set of credentials you want to use. This updates `$HOME/.docker/config.json` on your PC.
138-
1. View `$HOME/.docker/config.json` in an editor to ensure it contains just the credentials you want to use.
138+
1. View `$HOME/.docker/config.json` in an editor to ensure it contains only the credentials you want to use.
139139
1. Get a list of your nodes; for example:
140140
- if you want the names: `nodes=$( kubectl get nodes -o jsonpath='{range.items[*].metadata}{.name} {end}' )`
141141
- if you want to get the IP addresses: `nodes=$( kubectl get nodes -o jsonpath='{range .items[*].status.addresses[?(@.type=="ExternalIP")]}{.address} {end}' )`

content/en/docs/concepts/extend-kubernetes/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ Kubernetes provides several built-in authentication methods, and an [Authenticat
145145

146146
### Authorization
147147

148-
[Authorization](/docs/reference/access-authn-authz/webhook/) determines whether specific users can read, write, and do other operations on API resources. It just works at the level of whole resources -- it doesn't discriminate based on arbitrary object fields. If the built-in authorization options don't meet your needs, and [Authorization webhook](/docs/reference/access-authn-authz/webhook/) allows calling out to user-provided code to make an authorization decision.
148+
[Authorization](/docs/reference/access-authn-authz/webhook/) determines whether specific users can read, write, and do other operations on API resources. It works at the level of whole resources -- it doesn't discriminate based on arbitrary object fields. If the built-in authorization options don't meet your needs, and [Authorization webhook](/docs/reference/access-authn-authz/webhook/) allows calling out to user-provided code to make an authorization decision.
149149

150150

151151
### Dynamic Admission Control

content/en/docs/concepts/extend-kubernetes/extend-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Kubernetes provides several built-in authentication methods, and an [Authenticat
146146

147147
### Authorization
148148

149-
[Authorization](/docs/reference/access-authn-authz/webhook/) determines whether specific users can read, write, and do other operations on API resources. It just works at the level of whole resources -- it doesn't discriminate based on arbitrary object fields. If the built-in authorization options don't meet your needs, and [Authorization webhook](/docs/reference/access-authn-authz/webhook/) allows calling out to user-provided code to make an authorization decision.
149+
[Authorization](/docs/reference/access-authn-authz/webhook/) determines whether specific users can read, write, and do other operations on API resources. It works at the level of whole resources -- it doesn't discriminate based on arbitrary object fields. If the built-in authorization options don't meet your needs, and [Authorization webhook](/docs/reference/access-authn-authz/webhook/) allows calling out to user-provided code to make an authorization decision.
150150

151151

152152
### Dynamic Admission Control

content/en/docs/concepts/overview/working-with-objects/namespaces.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ resource can only be in one namespace.
2828

2929
Namespaces are a way to divide cluster resources between multiple users (via [resource quota](/docs/concepts/policy/resource-quotas/)).
3030

31-
It is not necessary to use multiple namespaces just to separate slightly different
31+
It is not necessary to use multiple namespaces to separate slightly different
3232
resources, such as different versions of the same software: use
3333
[labels](/docs/concepts/overview/working-with-objects/labels) to distinguish
3434
resources within the same namespace.
@@ -91,7 +91,7 @@ kubectl config view --minify | grep namespace:
9191
When you create a [Service](/docs/concepts/services-networking/service/),
9292
it creates a corresponding [DNS entry](/docs/concepts/services-networking/dns-pod-service/).
9393
This entry is of the form `<service-name>.<namespace-name>.svc.cluster.local`, which means
94-
that if a container just uses `<service-name>`, it will resolve to the service which
94+
that if a container only uses `<service-name>`, it will resolve to the service which
9595
is local to a namespace. This is useful for using the same configuration across
9696
multiple namespaces such as Development, Staging and Production. If you want to reach
9797
across namespaces, you need to use the fully qualified domain name (FQDN).

content/en/docs/concepts/scheduling-eviction/assign-pod-node.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -120,12 +120,12 @@ pod is eligible to be scheduled on, based on labels on the node.
120120

121121
There are currently two types of node affinity, called `requiredDuringSchedulingIgnoredDuringExecution` and
122122
`preferredDuringSchedulingIgnoredDuringExecution`. You can think of them as "hard" and "soft" respectively,
123-
in the sense that the former specifies rules that *must* be met for a pod to be scheduled onto a node (just like
123+
in the sense that the former specifies rules that *must* be met for a pod to be scheduled onto a node (similar to
124124
`nodeSelector` but using a more expressive syntax), while the latter specifies *preferences* that the scheduler
125125
will try to enforce but will not guarantee. The "IgnoredDuringExecution" part of the names means that, similar
126126
to how `nodeSelector` works, if labels on a node change at runtime such that the affinity rules on a pod are no longer
127-
met, the pod will still continue to run on the node. In the future we plan to offer
128-
`requiredDuringSchedulingRequiredDuringExecution` which will be just like `requiredDuringSchedulingIgnoredDuringExecution`
127+
met, the pod continues to run on the node. In the future we plan to offer
128+
`requiredDuringSchedulingRequiredDuringExecution` which will be identical to `requiredDuringSchedulingIgnoredDuringExecution`
129129
except that it will evict pods from nodes that cease to satisfy the pods' node affinity requirements.
130130

131131
Thus an example of `requiredDuringSchedulingIgnoredDuringExecution` would be "only run the pod on nodes with Intel CPUs"

content/en/docs/concepts/security/controlling-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Authenticators are described in more detail in
4343
[Authentication](/docs/reference/access-authn-authz/authentication/).
4444

4545
The input to the authentication step is the entire HTTP request; however, it typically
46-
just examines the headers and/or client certificate.
46+
examines the headers and/or client certificate.
4747

4848
Authentication modules include client certificates, password, and plain tokens,
4949
bootstrap tokens, and JSON Web Tokens (used for service accounts).

content/en/docs/concepts/services-networking/connect-applications-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,7 @@ $ curl https://<EXTERNAL-IP>:<NODE-PORT> -k
387387
<h1>Welcome to nginx!</h1>
388388
```
389389

390-
Let's now recreate the Service to use a cloud load balancer, just change the `Type` of `my-nginx` Service from `NodePort` to `LoadBalancer`:
390+
Let's now recreate the Service to use a cloud load balancer. Change the `Type` of `my-nginx` Service from `NodePort` to `LoadBalancer`:
391391

392392
```shell
393393
kubectl edit svc my-nginx

content/en/docs/concepts/services-networking/ingress.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ There are existing Kubernetes concepts that allow you to expose a single Service
260260
{{< codenew file="service/networking/test-ingress.yaml" >}}
261261

262262
If you create it using `kubectl apply -f` you should be able to view the state
263-
of the Ingress you just added:
263+
of the Ingress you added:
264264

265265
```bash
266266
kubectl get ingress test-ingress

content/en/docs/concepts/services-networking/service-topology.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ the first label matches the originating Node's value for that label. If there is
5757
no backend for the Service on a matching Node, then the second label will be
5858
considered, and so forth, until no labels remain.
5959

60-
If no match is found, the traffic will be rejected, just as if there were no
60+
If no match is found, the traffic will be rejected, as if there were no
6161
backends for the Service at all. That is, endpoints are chosen based on the first
6262
topology key with available backends. If this field is specified and all entries
6363
have no backends that match the topology of the client, the service has no
@@ -87,7 +87,7 @@ traffic as follows.
8787

8888
* Service topology is not compatible with `externalTrafficPolicy=Local`, and
8989
therefore a Service cannot use both of these features. It is possible to use
90-
both features in the same cluster on different Services, just not on the same
90+
both features in the same cluster on different Services, only not on the same
9191
Service.
9292

9393
* Valid topology keys are currently limited to `kubernetes.io/hostname`,

content/en/docs/concepts/services-networking/service.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -527,7 +527,7 @@ for NodePort use.
527527

528528
Using a NodePort gives you the freedom to set up your own load balancing solution,
529529
to configure environments that are not fully supported by Kubernetes, or even
530-
to just expose one or more nodes' IPs directly.
530+
to expose one or more nodes' IPs directly.
531531

532532
Note that this Service is visible as `<NodeIP>:spec.ports[*].nodePort`
533533
and `.spec.clusterIP:spec.ports[*].port`. (If the `--nodeport-addresses` flag in kube-proxy is set, <NodeIP> would be filtered NodeIP(s).)
@@ -785,8 +785,7 @@ you can use the following annotations:
785785
```
786786

787787
In the above example, if the Service contained three ports, `80`, `443`, and
788-
`8443`, then `443` and `8443` would use the SSL certificate, but `80` would just
789-
be proxied HTTP.
788+
`8443`, then `443` and `8443` would use the SSL certificate, but `80` would be proxied HTTP.
790789

791790
From Kubernetes v1.9 onwards you can use [predefined AWS SSL policies](https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-security-policy-table.html) with HTTPS or SSL listeners for your Services.
792791
To see which policies are available for use, you can use the `aws` command line tool:
@@ -1107,7 +1106,7 @@ but the current API requires it.
11071106

11081107
## Virtual IP implementation {#the-gory-details-of-virtual-ips}
11091108

1110-
The previous information should be sufficient for many people who just want to
1109+
The previous information should be sufficient for many people who want to
11111110
use Services. However, there is a lot going on behind the scenes that may be
11121111
worth understanding.
11131112

content/en/docs/concepts/storage/ephemeral-volumes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,8 +135,9 @@ As a cluster administrator, you can use a [PodSecurityPolicy](/docs/concepts/pol
135135
This feature requires the `GenericEphemeralVolume` [feature gate](/docs/reference/command-line-tools-reference/feature-gates/) to be
136136
enabled. Because this is an alpha feature, it is disabled by default.
137137

138-
Generic ephemeral volumes are similar to `emptyDir` volumes, just more
138+
Generic ephemeral volumes are similar to `emptyDir` volumes, except more
139139
flexible:
140+
140141
- Storage can be local or network-attached.
141142
- Volumes can have a fixed size that Pods are not able to exceed.
142143
- Volumes may have some initial data, depending on the driver and

content/en/docs/concepts/storage/persistent-volumes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ A _PersistentVolume_ (PV) is a piece of storage in the cluster that has been pro
2929

3030
A _PersistentVolumeClaim_ (PVC) is a request for storage by a user. It is similar to a Pod. Pods consume node resources and PVCs consume PV resources. Pods can request specific levels of resources (CPU and Memory). Claims can request specific size and access modes (e.g., they can be mounted ReadWriteOnce, ReadOnlyMany or ReadWriteMany, see [AccessModes](#access-modes)).
3131

32-
While PersistentVolumeClaims allow a user to consume abstract storage resources, it is common that users need PersistentVolumes with varying properties, such as performance, for different problems. Cluster administrators need to be able to offer a variety of PersistentVolumes that differ in more ways than just size and access modes, without exposing users to the details of how those volumes are implemented. For these needs, there is the _StorageClass_ resource.
32+
While PersistentVolumeClaims allow a user to consume abstract storage resources, it is common that users need PersistentVolumes with varying properties, such as performance, for different problems. Cluster administrators need to be able to offer a variety of PersistentVolumes that differ in more ways than size and access modes, without exposing users to the details of how those volumes are implemented. For these needs, there is the _StorageClass_ resource.
3333

3434
See the [detailed walkthrough with working examples](/docs/tasks/configure-pod-container/configure-persistent-volume-storage/).
3535

content/en/docs/concepts/storage/storage-classes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ request a particular class. Administrators set the name and other parameters
3737
of a class when first creating StorageClass objects, and the objects cannot
3838
be updated once they are created.
3939

40-
Administrators can specify a default StorageClass just for PVCs that don't
40+
Administrators can specify a default StorageClass only for PVCs that don't
4141
request any particular class to bind to: see the
4242
[PersistentVolumeClaim section](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims)
4343
for details.
@@ -569,7 +569,7 @@ parameters:
569569
`"http(s)://api-server:7860"`
570570
* `registry`: Quobyte registry to use to mount the volume. You can specify the
571571
registry as ``<host>:<port>`` pair or if you want to specify multiple
572-
registries you just have to put a comma between them e.q.
572+
registries, put a comma between them.
573573
``<host1>:<port>,<host2>:<port>,<host3>:<port>``.
574574
The host can be an IP address or if you have a working DNS you can also
575575
provide the DNS names.

content/en/docs/concepts/storage/volume-pvc-datasource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Users need to be aware of the following when using this feature:
4040

4141
## Provisioning
4242

43-
Clones are provisioned just like any other PVC with the exception of adding a dataSource that references an existing PVC in the same namespace.
43+
Clones are provisioned like any other PVC with the exception of adding a dataSource that references an existing PVC in the same namespace.
4444

4545
```yaml
4646
apiVersion: v1

content/en/docs/concepts/storage/volumes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ that run within the pod, and data is preserved across container restarts. When a
3838
ceases to exist, Kubernetes destroys ephemeral volumes; however, Kubernetes does not
3939
destroy persistent volumes.
4040

41-
At its core, a volume is just a directory, possibly with some data in it, which
41+
At its core, a volume is a directory, possibly with some data in it, which
4242
is accessible to the containers in a pod. How that directory comes to be, the
4343
medium that backs it, and the contents of it are determined by the particular
4444
volume type used.

content/en/docs/concepts/workloads/controllers/deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -708,7 +708,7 @@ nginx-deployment-618515232 11 11 11 7m
708708
You can pause a Deployment before triggering one or more updates and then resume it. This allows you to
709709
apply multiple fixes in between pausing and resuming without triggering unnecessary rollouts.
710710
711-
* For example, with a Deployment that was just created:
711+
* For example, with a Deployment that was created:
712712
Get the Deployment details:
713713
```shell
714714
kubectl get deploy

content/en/docs/concepts/workloads/controllers/job.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ pi-5rwd7
9999
```
100100

101101
Here, the selector is the same as the selector for the Job. The `--output=jsonpath` option specifies an expression
102-
that just gets the name from each Pod in the returned list.
102+
with the name from each Pod in the returned list.
103103

104104
View the standard output of one of the pods:
105105

content/en/docs/concepts/workloads/controllers/replicaset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ In this manner, a ReplicaSet can own a non-homogenous set of Pods
222222
## Writing a ReplicaSet manifest
223223

224224
As with all other Kubernetes API objects, a ReplicaSet needs the `apiVersion`, `kind`, and `metadata` fields.
225-
For ReplicaSets, the kind is always just ReplicaSet.
225+
For ReplicaSets, the `kind` is always a ReplicaSet.
226226
In Kubernetes 1.9 the API version `apps/v1` on the ReplicaSet kind is the current version and is enabled by default. The API version `apps/v1beta2` is deprecated.
227227
Refer to the first lines of the `frontend.yaml` example for guidance.
228228

content/en/docs/concepts/workloads/controllers/replicationcontroller.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,8 +110,7 @@ nginx-3ntk0 nginx-4ok8v nginx-qrm3m
110110

111111
Here, the selector is the same as the selector for the ReplicationController (seen in the
112112
`kubectl describe` output), and in a different form in `replication.yaml`. The `--output=jsonpath` option
113-
specifies an expression that just gets the name from each pod in the returned list.
114-
113+
specifies an expression with the name from each pod in the returned list.
115114

116115
## Writing a ReplicationController Spec
117116

content/en/docs/concepts/workloads/pods/pod-lifecycle.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -312,7 +312,7 @@ can specify a readiness probe that checks an endpoint specific to readiness that
312312
is different from the liveness probe.
313313

314314
{{< note >}}
315-
If you just want to be able to drain requests when the Pod is deleted, you do not
315+
If you want to be able to drain requests when the Pod is deleted, you do not
316316
necessarily need a readiness probe; on deletion, the Pod automatically puts itself
317317
into an unready state regardless of whether the readiness probe exists.
318318
The Pod remains in the unready state while it waits for the containers in the Pod

0 commit comments

Comments
 (0)