Skip to content

Commit a1de536

Browse files
fix typos
1 parent c99d972 commit a1de536

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

_docs/administration/codefresh-runner.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1314,7 +1314,7 @@ If you want to use *LocalSSD* in GKE:
13141314
13151315
*Prerequisites:* [GKE cluster with local SSD](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/local-ssd)
13161316
1317-
Install runner using GKE Local SSD:
1317+
Install Runner using GKE Local SSD:
13181318
```
13191319
codefresh runner init [options] --set-value=Storage.LocalVolumeParentDir=/mnt/disks/ssd0/codefresh-volumes \
13201320
--build-node-selector=cloud.google.com/gke-local-ssd=true
@@ -1337,20 +1337,20 @@ codefresh runner init [options] --set-value=Storage.LocalVolumeParentDir=/mnt/di
13371337
{% endraw %}
13381338
{% endhighlight %}
13391339
1340-
To configure existing Runner with Local SSD follow this article:
1340+
To configure existing Runner with Local SSDs follow this article:
13411341
13421342
[How-to: Configuring an existing Runtime Environment with Local SSDs (GKE only)](https://support.codefresh.io/hc/en-us/articles/360016652920-How-to-Configuring-an-existing-Runtime-Environment-with-Local-SSDs-GKE-only-)
13431343
13441344
##### GCE Disks
13451345
If you want to use *GCE Disks*:
13461346
1347-
*Prerequisite:* volume provisioner (dind-volume-provisioner) should have permissions to create/delete/get of Google disks
1347+
*Prerequisites:* volume provisioner (dind-volume-provisioner) should have permissions to create/delete/get GCE disks
13481348
13491349
There are 3 options to provide cloud credentials on GCE:
13501350
1351-
* run `dind-volume-provisioner-runner` on node with iam role which is allowed to create/delete/get of Google disks
1352-
* create Google Service Account with `ComputeEngine.StorageAdmin`, download its key and pass it to venona installed with `--set-file=Storage.GooogleServiceAccount=/path/to/google-service-account.json`
1353-
* use [Google Workload Identity](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity) to assign iam role to `volume-provisioner-venona` service account
1351+
* run `dind-volume-provisioner-runner` pod on a node with IAM role which is allowed to create/delete/get GCE disks
1352+
* create Google Service Account with `ComputeEngine.StorageAdmin` role, download its key is JSON format and pass it to `codefresh runner init` with `--set-file=Storage.GooogleServiceAccount=/path/to/google-service-account.json`
1353+
* use [Google Workload Identity](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity) to assign IAM role to `volume-provisioner-runner` service account
13541354
13551355
Notice that builds will be running in a single availability zone, so you must specify AvailabilityZone parameters.
13561356
@@ -1359,6 +1359,7 @@ Install Runner using GCE Disks:
13591359
```
13601360
codefresh runner init [options] --set-value=Storage.Backend=gcedisk \
13611361
--set-value=Storage.AvailabilityZone=us-central1-a \
1362+
[--kube-node-selector=failure-domain.beta.kubernetes.io/zone=us-central1-a \]
13621363
--build-node-selector=failure-domain.beta.kubernetes.io/zone=us-central1-a \
13631364
[--set-file=Storage.GoogleServiceAccount=/path/to/google-service-account.json]
13641365
```
@@ -1393,7 +1394,7 @@ codefresh runner init [options] --set-value=Storage.Backend=gcedisk \
13931394
{% endraw %}
13941395
{% endhighlight %}
13951396
1396-
To configure existing Runner with GCE disks follow this article:
1397+
To configure existing Runner with GCE Disks follow this article:
13971398
13981399
[How-to: Configuring an existing Runtime Environment with GCE disks](https://support.codefresh.io/hc/en-us/articles/360016652900-How-to-Configuring-an-existing-Runtime-Environment-with-GCE-disks)
13991400

0 commit comments

Comments
 (0)