[pve-devel] [PATCH docs] Fixed some wording and typos
Stefan Reiter
s.reiter at proxmox.com
Wed Jun 12 15:06:32 CEST 2019
Signed-off-by: Stefan Reiter <s.reiter at proxmox.com>
---
pve-installation.adoc | 2 +-
pve-intro.adoc | 6 +++---
pve-network.adoc | 28 ++++++++++++++--------------
pve-package-repos.adoc | 2 +-
qm-pci-passthrough.adoc | 12 ++++++------
5 files changed, 25 insertions(+), 25 deletions(-)
diff --git a/pve-installation.adoc b/pve-installation.adoc
index f15258e..691d236 100644
--- a/pve-installation.adoc
+++ b/pve-installation.adoc
@@ -104,7 +104,7 @@ you can choose disks there. Additionally you can set additional options (see
[thumbnail="screenshot/pve-select-location.png", float="left"]
-The next page just ask for basic configuration options like your
+The next page just asks for basic configuration options like your
location, the time zone and keyboard layout. The location is used to
select a download server near you to speed up updates. The installer is
usually able to auto detect those settings, so you only need to change
diff --git a/pve-intro.adoc b/pve-intro.adoc
index e4a8d99..7b236be 100644
--- a/pve-intro.adoc
+++ b/pve-intro.adoc
@@ -39,7 +39,7 @@ enables you to store the configuration of thousands of virtual
machines. By using corosync, these files are replicated in real time
on all cluster nodes. The file system stores all data inside a
persistent database on disk, nonetheless, a copy of the data resides
-in RAM which provides a maximum storage size is 30MB - more than
+in RAM which provides a maximum storage size of 30MB - more than
enough for thousands of VMs.
+
Proxmox VE is the only virtualization platform using this unique
@@ -145,7 +145,7 @@ Flexible Networking
Proxmox VE uses a bridged networking model. All VMs can share one
bridge as if virtual network cables from each guest were all plugged
into the same switch. For connecting VMs to the outside world, bridges
-are attached to physical network cards assigned a TCP/IP
+are attached to physical network cards and assigned a TCP/IP
configuration.
For further flexibility, VLANs (IEEE 802.1q) and network
@@ -183,7 +183,7 @@ Open source software also helps to keep your costs low and makes your
core infrastructure independent from a single vendor.
-Your benefit with {pve}
+Your benefits with {pve}
-----------------------
* Open source software
diff --git a/pve-network.adoc b/pve-network.adoc
index c7ffa6c..b2dae97 100644
--- a/pve-network.adoc
+++ b/pve-network.adoc
@@ -5,14 +5,14 @@ ifdef::wiki[]
:pve-toplevel:
endif::wiki[]
-Network configuration can be done either via the GUI, or by manually
+Network configuration can be done either via the GUI, or by manually
editing the file `/etc/network/interfaces`, which contains the
whole network configuration. The `interfaces(5)` manual page contains the
complete format description. All {pve} tools try hard to keep direct
user modifications, but using the GUI is still preferable, because it
protects you from errors.
-Once the network is configured, you can use the Debian traditional tools `ifup`
+Once the network is configured, you can use the Debian traditional tools `ifup`
and `ifdown` commands to bring interfaces up and down.
NOTE: {pve} does not write changes directly to
@@ -68,16 +68,16 @@ For more information see https://www.freedesktop.org/wiki/Software/systemd/Predi
Choosing a network configuration
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-Depending on your current network organization and your resources you can
+Depending on your current network organization and your resources you can
choose either a bridged, routed, or masquerading networking setup.
{pve} server in a private LAN, using an external gateway to reach the internet
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-The *Bridged* model makes the most sense in this case, and this is also
+The *Bridged* model makes the most sense in this case, and this is also
the default mode on new {pve} installations.
-Each of your Guest system will have a virtual interface attached to the
-{pve} bridge. This is similar in effect to having the Guest network card
+Each of your Guest system will have a virtual interface attached to the
+{pve} bridge. This is similar in effect to having the Guest network card
directly connected to a new switch on your LAN, the {pve} host playing the role
of the switch.
@@ -91,7 +91,7 @@ what your provider allows.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
In that case the only way to get outgoing network accesses for your guest
-systems is to use *Masquerading*. For incoming network access to your guests,
+systems is to use *Masquerading*. For incoming network access to your guests,
you will need to configure *Port Forwarding*.
For further flexibility, you can configure
@@ -104,7 +104,7 @@ Default Configuration using a Bridge
[thumbnail="default-network-setup-bridge.svg"]
Bridges are like physical network switches implemented in software.
-All VMs can share a single bridge, or you can create multiple bridges to
+All VMs can share a single bridge, or you can create multiple bridges to
separate network domains. Each host can have up to 4094 bridges.
The installation program creates a single bridge named `vmbr0`, which
@@ -275,7 +275,7 @@ network-peers use different MAC addresses for their network packet
traffic.
If your switch support the LACP (IEEE 802.3ad) protocol then we recommend using
-the corresponding bonding mode (802.3ad). Otherwise you should generally use the
+the corresponding bonding mode (802.3ad). Otherwise you should generally use the
active-backup mode. +
// http://lists.linux-ha.org/pipermail/linux-ha/2013-January/046295.html
If you intend to run your cluster network on the bonding interfaces, then you
@@ -366,25 +366,25 @@ VLAN for Guest Networks
{pve} supports this setup out of the box. You can specify the VLAN tag
when you create a VM. The VLAN tag is part of the guest network
-configuration. The networking layer supports differnet modes to
+configuration. The networking layer supports different modes to
implement VLANs, depending on the bridge configuration:
* *VLAN awareness on the Linux bridge:*
In this case, each guest's virtual network card is assigned to a VLAN tag,
which is transparently supported by the Linux bridge.
-Trunk mode is also possible, but that makes the configuration
+Trunk mode is also possible, but that makes configuration
in the guest necessary.
* *"traditional" VLAN on the Linux bridge:*
In contrast to the VLAN awareness method, this method is not transparent
and creates a VLAN device with associated bridge for each VLAN.
-That is, if e.g. in our default network, a guest VLAN 5 is used
-to create eno1.5 and vmbr0v5, which remains until rebooting.
+That is, creating a guest on VLAN 5 for example, would create two
+interfaces eno1.5 and vmbr0v5, which would remain until a reboot occurs.
* *Open vSwitch VLAN:*
This mode uses the OVS VLAN feature.
-* *Guest configured VLAN:*
+* *Guest configured VLAN:*
VLANs are assigned inside the guest. In this case, the setup is
completely done inside the guest and can not be influenced from the
outside. The benefit is that you can use more than one VLAN on a
diff --git a/pve-package-repos.adoc b/pve-package-repos.adoc
index 556470f..06d1b2f 100644
--- a/pve-package-repos.adoc
+++ b/pve-package-repos.adoc
@@ -47,7 +47,7 @@ email about the available new packages. On the GUI, the change-log of
each package can be viewed (if available), showing all details of the
update. So you will never miss important security fixes.
-Please note that and you need a valid subscription key to access this
+Please note that you need a valid subscription key to access this
repository. We offer different support levels, and you can find further
details at https://www.proxmox.com/en/proxmox-ve/pricing.
diff --git a/qm-pci-passthrough.adoc b/qm-pci-passthrough.adoc
index a347e31..3895df4 100644
--- a/qm-pci-passthrough.adoc
+++ b/qm-pci-passthrough.adoc
@@ -33,7 +33,7 @@ Further, server grade hardware has often better support than consumer grade
hardware, but even then, many modern system can support this.
Please refer to your hardware vendor to check if they support this feature
-under Linux for your specific setup
+under Linux for your specific setup.
Configuration
@@ -295,7 +295,7 @@ vendor.
Mediated Devices (vGPU, GVT-g)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-Mediated devices are another method to use reuse features and performance from
+Mediated devices are another method to reuse features and performance from
physical hardware for virtualized hardware. These are found most common in
virtualized GPU setups such as Intels GVT-g and Nvidias vGPUs used in their
GRID technology.
@@ -309,12 +309,12 @@ Host Configuration
^^^^^^^^^^^^^^^^^^
In general your card's driver must support that feature, otherwise it will
-not work. So please refer to your vendor for compatbile drivers and how to
+not work. So please refer to your vendor for compatible drivers and how to
configure them.
-Intels drivers for GVT-g are integraded in the Kernel and should work
-with the 5th, 6th and 7th generation Intel Core Processors, further E3 v4, E3
-v5 and E3 v6 Xeon Processors are supported.
+Intels drivers for GVT-g are integrated in the Kernel and should work
+with 5th, 6th and 7th generation Intel Core Processors, as well as E3 v4, E3
+v5 and E3 v6 Xeon Processors.
To enable it for Intel Graphcs, you have to make sure to load the module
'kvmgt' (for example via `/etc/modules`) and to enable it on the Kernel
--
2.20.1
More information about the pve-devel
mailing list