Skip to content

Commit 95f3902

Browse files
committed
applied review suggestions
1 parent 440cece commit 95f3902

4 files changed

Lines changed: 5 additions & 5 deletions

File tree

references/kubeflow-troubleshooting.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,8 +109,8 @@ If you pre-created the AuthorizationPolicy with `kubectl` before the first {helm
109109
meta.helm.sh/release-namespace=kubeflow --overwrite
110110
----
111111

112-
{seaweedfs} pod stuck ContainerCreating::
113-
On K3s 1.34 + cri-dockerd ({ranchera} Desktop), a race between the CNI and the container runtime can leave the {seaweedfs} pod stuck.
112+
{seaweedfs} pod stuck on ContainerCreating::
113+
On K3s 1.34 with cri-dockerd ({ranchera} Desktop), a race between the CNI and the container runtime can leave the {seaweedfs} pod stuck.
114114
{seaweedfs} acquires a LevelDB file lock on startup.
115115
If the pod is stuck, the lock is held and the next pod will also fail to start.
116116
To recover, run the following commands:

references/kubeflow-upgrade-notes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ When switching database images or StorageClasses, delete the PVC manually first:
5151
Training operator webhook secret migration (auto)::
5252
On upgrade from chart versions prior to 0.3.0, a pre-upgrade hook automatically migrates the `training-operator-webhook-cert` Secret from type `kubernetes.io/tls` to `Opaque`.
5353
No manual action is required.
54-
If the `kubectl get jobs -n kubeflow` command reports a hook failure, delete the secret manually and re-run `helm upgrade`:
54+
If the `kubectl get jobs -n kubeflow` command reports a hook failure, delete the secret manually and rerun `helm upgrade`:
5555
+
5656
[source,bash,subs="+attributes"]
5757
----

tasks/kubeflow-hardening.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ KFP and Dex PodDisruptionBudgets are already enabled by default.
151151
+
152152
PDBs protect against voluntary disruptions (node drains) but only provide meaningful coverage with 2 or more replicas.
153153
With a single replica, the PDB allows full eviction.
154-
See the xref:kubeflow-limitations[Known limitations] section for which controllers support HA.
154+
See xref:kubeflow-limitations[Known limitations] for supported HA controllers.
155155

156156
. *Apply resource quotas per user namespace.*
157157
+

tasks/kubeflow-user-profiles.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Add the user to your values file and run `helm upgrade`:
6565
--set "user-namespace.additionalUsers[0].namespace=tux"
6666
----
6767

68-
Alternatively, add the user to your values file and re-run the upgrade:
68+
Alternatively, add the user to your values file and rerun the upgrade:
6969

7070
[source,bash]
7171
----

0 commit comments

Comments
 (0)