diff --git a/docs/examples/auth/client-certs/README.md b/docs/examples/auth/client-certs/README.md index baa91eccdf..072e1d69f2 100644 --- a/docs/examples/auth/client-certs/README.md +++ b/docs/examples/auth/client-certs/README.md @@ -4,7 +4,7 @@ It is possible to enable Client-Certificate Authentication by adding additional Before getting started you must have the following Certificates Setup: 1. CA certificate and Key(Intermediate Certs need to be in CA) -2. Server Certificate(Signed by CA) and Key (CN should be equal the the hostname you will use) +2. Server Certificate(Signed by CA) and Key (CN should be equal the hostname you will use) 3. Client Certificate(Signed by CA) and Key ## Creating Certificate Secrets diff --git a/docs/user-guide/tls.md b/docs/user-guide/tls.md index 9b69614238..c468fa8ab6 100644 --- a/docs/user-guide/tls.md +++ b/docs/user-guide/tls.md @@ -4,7 +4,7 @@ Anytime we reference a TLS secret, we mean a PEM-encoded X.509, RSA (2048) secret. -You can generate a self-signed certificate and private key with with: +You can generate a self-signed certificate and private key with: ```bash $ openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout ${KEY_FILE} -out ${CERT_FILE} -subj "/CN=${HOST}/O=${HOST}"` diff --git a/internal/ingress/metric/collectors/socket.go b/internal/ingress/metric/collectors/socket.go index 1f30c9b720..904921d124 100644 --- a/internal/ingress/metric/collectors/socket.go +++ b/internal/ingress/metric/collectors/socket.go @@ -171,7 +171,7 @@ func NewSocketCollector(pod, namespace, class string) (*SocketCollector, error) bytesSent: prometheus.NewHistogramVec( prometheus.HistogramOpts{ Name: "bytes_sent", - Help: "The the number of bytes sent to a client", + Help: "The number of bytes sent to a client", Namespace: PrometheusNamespace, Buckets: prometheus.ExponentialBuckets(10, 10, 7), // 7 buckets, exponential factor of 10. ConstLabels: constLabels,