Skip to content

Commit 753bd4c

Browse files
authored
Fix typos (#483)
1 parent 942eb6f commit 753bd4c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/en/docs/concepts/work-distribution/manifestwork.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -345,7 +345,7 @@ following permission for the managed cluster:
345345
permission, this is why we can grant work-agent service account extra permissions using ManifestWork
346346

347347
So if the workload manifests to be applied on the managed cluster exceeds the above permission, for example some
348-
Customer Resource instances, there will be an error `... is forbidden: User "system:serviceaccount:open-cluster-management-agent:klusterlet-work-sa" cannot get resource ...`
348+
Custom Resource instances, there will be an error `... is forbidden: User "system:serviceaccount:open-cluster-management-agent:klusterlet-work-sa" cannot get resource ...`
349349
reflected on the ManifestWork status.
350350

351351
To prevent this, the service account `klusterlet-work-sa` used by the work-agent needs to be given the corresponding
@@ -604,7 +604,7 @@ spec:
604604
Work-agent uses the SubjectAccessReview API to check whether an executor has permission to the manifest resources, which
605605
will cause a large number of SAR requests to the managed cluster API-server, so we provided a new feature gate
606606
`ExecutorValidatingCaches`(in release `0.10.0`) to cache the result of the executor's permission to the manifest
607-
resource, it is only works when the managed cluster uses
607+
resource, it only works when the managed cluster uses
608608
[RBAC mode authorization](https://kubernetes.io/docs/reference/access-authn-authz/authorization/#authorization-modules),
609609
and is disabled by default as well, but can be enabled by using the following configuration for `Klusterlet`:
610610

0 commit comments

Comments
 (0)