You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@pulsar.apache.org by pe...@apache.org on 2020/06/05 03:01:41 UTC

[pulsar] branch master updated: fix typo follwing (#7170)

This is an automated email from the ASF dual-hosted git repository.

penghui pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/pulsar.git


The following commit(s) were added to refs/heads/master by this push:
     new 49287fa  fix typo follwing (#7170)
49287fa is described below

commit 49287fa7ef24492502028b5a5e0ef4e06a703717
Author: Jia Zhai <zh...@apache.org>
AuthorDate: Fri Jun 5 11:01:27 2020 +0800

    fix typo follwing (#7170)
    
    fix typo: follwing => following
---
 .../org/apache/pulsar/functions/worker/FunctionRuntimeManager.java  | 2 +-
 site2/docs/deploy-aws.md                                            | 2 +-
 site2/docs/security-athenz.md                                       | 4 ++--
 site2/docs/security-extending.md                                    | 2 +-
 site2/docs/security-jwt.md                                          | 2 +-
 site2/docs/security-tls-authentication.md                           | 4 ++--
 site2/docs/security-tls-transport.md                                | 6 +++---
 site2/website/versioned_docs/version-2.4.0/security-jwt.md          | 2 +-
 site2/website/versioned_docs/version-2.4.1/security-athenz.md       | 4 ++--
 .../versioned_docs/version-2.4.1/security-tls-authentication.md     | 4 ++--
 .../website/versioned_docs/version-2.4.1/security-tls-transport.md  | 4 ++--
 site2/website/versioned_docs/version-2.4.1/security-token-client.md | 2 +-
 site2/website/versioned_docs/version-2.4.2/security-athenz.md       | 4 ++--
 .../versioned_docs/version-2.4.2/security-tls-authentication.md     | 4 ++--
 .../website/versioned_docs/version-2.4.2/security-tls-transport.md  | 4 ++--
 site2/website/versioned_docs/version-2.4.2/security-token-client.md | 2 +-
 site2/website/versioned_docs/version-2.5.0/deploy-aws.md            | 2 +-
 site2/website/versioned_docs/version-2.5.0/security-extending.md    | 2 +-
 .../versioned_docs/version-2.5.0/security-tls-authentication.md     | 4 ++--
 .../website/versioned_docs/version-2.5.0/security-tls-transport.md  | 4 ++--
 site2/website/versioned_docs/version-2.5.1/security-jwt.md          | 2 +-
 .../versioned_docs/version-2.5.1/security-tls-authentication.md     | 4 ++--
 .../website/versioned_docs/version-2.5.1/security-tls-transport.md  | 4 ++--
 site2/website/versioned_docs/version-2.5.2/security-jwt.md          | 2 +-
 .../versioned_docs/version-2.5.2/security-tls-authentication.md     | 4 ++--
 .../website/versioned_docs/version-2.5.2/security-tls-transport.md  | 4 ++--
 26 files changed, 42 insertions(+), 42 deletions(-)

diff --git a/pulsar-functions/worker/src/main/java/org/apache/pulsar/functions/worker/FunctionRuntimeManager.java b/pulsar-functions/worker/src/main/java/org/apache/pulsar/functions/worker/FunctionRuntimeManager.java
index 90cab3f..7d17ef3 100644
--- a/pulsar-functions/worker/src/main/java/org/apache/pulsar/functions/worker/FunctionRuntimeManager.java
+++ b/pulsar-functions/worker/src/main/java/org/apache/pulsar/functions/worker/FunctionRuntimeManager.java
@@ -254,7 +254,7 @@ public class FunctionRuntimeManager implements AutoCloseable{
 
     /**
      * Get current assignments
-     * @return a map of current assignments in the follwing format
+     * @return a map of current assignments in the following format
      * {workerId : {FullyQualifiedInstanceId : Assignment}}
      */
     public synchronized Map<String, Map<String, Assignment>> getCurrentAssignments() {
diff --git a/site2/docs/deploy-aws.md b/site2/docs/deploy-aws.md
index 62b0aab..f01288d 100644
--- a/site2/docs/deploy-aws.md
+++ b/site2/docs/deploy-aws.md
@@ -74,7 +74,7 @@ id_rsa               id_rsa.pub
 
 ## Create AWS resources using Terraform
 
-To start building AWS resources with Terraform, you need to install all Terraform dependencies. Enter the follwing command:
+To start building AWS resources with Terraform, you need to install all Terraform dependencies. Enter the following command:
 
 ```bash
 $ terraform init
diff --git a/site2/docs/security-athenz.md b/site2/docs/security-athenz.md
index a074385..737d9d1 100644
--- a/site2/docs/security-athenz.md
+++ b/site2/docs/security-athenz.md
@@ -14,7 +14,7 @@ To begin, you need to set up Athenz service access control. You need to create d
 
 ### Create the tenant domain and service
 
-On the [tenant](reference-terminology.md#tenant) side, you need to do the follwing things:
+On the [tenant](reference-terminology.md#tenant) side, you need to do the following things:
 
 1. Create a domain, such as `shopping`
 2. Generate a private/public key pair
@@ -26,7 +26,7 @@ For more specific steps involving the Athenz UI, refer to [Example Service Acces
 
 ### Create the provider domain and add the tenant service to some role members
 
-On the provider side, you need to do the follwing things:
+On the provider side, you need to do the following things:
 
 1. Create a domain, such as `pulsar`
 2. Create a role
diff --git a/site2/docs/security-extending.md b/site2/docs/security-extending.md
index 518390d..6631a63 100644
--- a/site2/docs/security-extending.md
+++ b/site2/docs/security-extending.md
@@ -83,7 +83,7 @@ public interface AuthenticationProvider extends Closeable {
 }
 ```
 
-The follwing is the example for Broker authentication plugins:
+The following is the example for Broker authentication plugins:
 
  * Mutual TLS -- https://github.com/apache/pulsar/blob/master/pulsar-broker-common/src/main/java/org/apache/pulsar/broker/authentication/AuthenticationProviderTls.java
  * Athenz -- https://github.com/apache/pulsar/blob/master/pulsar-broker-auth-athenz/src/main/java/org/apache/pulsar/broker/authentication/AuthenticationProviderAthenz.java
diff --git a/site2/docs/security-jwt.md b/site2/docs/security-jwt.md
index 06ec114..8d89071 100644
--- a/site2/docs/security-jwt.md
+++ b/site2/docs/security-jwt.md
@@ -14,7 +14,7 @@ is permitted to do some actions (eg: publish to a topic or consume from a topic)
 
 A user typically gets a token string from the administrator (or some automated service).
 
-The compact representation of a signed JWT is a string that looks like as the follwing:
+The compact representation of a signed JWT is a string that looks like as the following:
 
 ```
 eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJKb2UifQ.ipevRNuRP6HflG8cFKnmUPtypruRC4fb1DWtoLL62SY
diff --git a/site2/docs/security-tls-authentication.md b/site2/docs/security-tls-authentication.md
index 478d29b..98dfab6 100644
--- a/site2/docs/security-tls-authentication.md
+++ b/site2/docs/security-tls-authentication.md
@@ -16,13 +16,13 @@ Client certificates are generated using the certificate authority. Server certif
 
 The biggest difference between client certs and server certs is that the **common name** for the client certificate is the **role token** which that client is authenticated as.
 
-First, you need to enter the follwing command to generate the key :
+First, you need to enter the following command to generate the key :
 
 ```bash
 $ openssl genrsa -out admin.key.pem 2048
 ```
 
-Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the follwing command:
+Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the following command:
 
 ```bash
 $ openssl pkcs8 -topk8 -inform PEM -outform PEM \
diff --git a/site2/docs/security-tls-transport.md b/site2/docs/security-tls-transport.md
index 8dbe5fb..54ae876 100644
--- a/site2/docs/security-tls-transport.md
+++ b/site2/docs/security-tls-transport.md
@@ -40,7 +40,7 @@ Follow the guide below to set up a certificate authority. You can also refer to
 
 1. Create the certificate for the CA. You can use CA to sign both the broker and client certificates. This ensures that each party will trust the others. You should store CA in a very secure location (ideally completely disconnected from networks, air gapped, and fully encrypted).
 
-2. Entering the follwing command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direct [...]
+2. Entering the following command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direc [...]
 
 ```bash
 mkdir my-ca
@@ -96,7 +96,7 @@ openssl pkcs8 -topk8 -inform PEM -outform PEM \
       -in broker.key.pem -out broker.key-pk8.pem -nocrypt
 ```
 
-2. Enter the follwing command to generate the certificate request.
+2. Enter the following command to generate the certificate request.
 
 ```bash
 openssl req -config openssl.cnf \
@@ -253,4 +253,4 @@ var client = PulsarClient.Builder()
                          .VerifyCertificateAuthority(true) //Default is 'true'
                          .VerifyCertificateName(false)     //Default is 'false'
                          .Build();
-```
\ No newline at end of file
+```
diff --git a/site2/website/versioned_docs/version-2.4.0/security-jwt.md b/site2/website/versioned_docs/version-2.4.0/security-jwt.md
index 97e9855..8f5eac8 100644
--- a/site2/website/versioned_docs/version-2.4.0/security-jwt.md
+++ b/site2/website/versioned_docs/version-2.4.0/security-jwt.md
@@ -15,7 +15,7 @@ is permitted to do some actions (eg: publish to a topic or consume from a topic)
 
 A user typically gets a token string from the administrator (or some automated service).
 
-The compact representation of a signed JWT is a string that looks like as the follwing:
+The compact representation of a signed JWT is a string that looks like as the following:
 
 ```
 eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJKb2UifQ.ipevRNuRP6HflG8cFKnmUPtypruRC4fb1DWtoLL62SY
diff --git a/site2/website/versioned_docs/version-2.4.1/security-athenz.md b/site2/website/versioned_docs/version-2.4.1/security-athenz.md
index d02c897..fe10a9d 100644
--- a/site2/website/versioned_docs/version-2.4.1/security-athenz.md
+++ b/site2/website/versioned_docs/version-2.4.1/security-athenz.md
@@ -15,7 +15,7 @@ To begin, you need to set up Athenz service access control. You need to create d
 
 ### Create the tenant domain and service
 
-On the [tenant](reference-terminology.md#tenant) side, you need to do the follwing things:
+On the [tenant](reference-terminology.md#tenant) side, you need to do the following things:
 
 1. Create a domain, such as `shopping`
 2. Generate a private/public key pair
@@ -27,7 +27,7 @@ For more specific steps involving the Athenz UI, refer to [Example Service Acces
 
 ### Create the provider domain and add the tenant service to some role members
 
-On the provider side, you need to do the follwing things:
+On the provider side, you need to do the following things:
 
 1. Create a domain, such as `pulsar`
 2. Create a role
diff --git a/site2/website/versioned_docs/version-2.4.1/security-tls-authentication.md b/site2/website/versioned_docs/version-2.4.1/security-tls-authentication.md
index 70b2a9e..933e3e8 100644
--- a/site2/website/versioned_docs/version-2.4.1/security-tls-authentication.md
+++ b/site2/website/versioned_docs/version-2.4.1/security-tls-authentication.md
@@ -15,13 +15,13 @@ Client certificates are generated using the certificate authority. Server certif
 
 The biggest difference between client certs and server certs is that the **common name** for the client certificate is the **role token** which that client is authenticated as.
 
-First, you need to enter the follwing command to generate the key :
+First, you need to enter the following command to generate the key :
 
 ```bash
 $ openssl genrsa -out admin.key.pem 2048
 ```
 
-Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the follwing command:
+Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the following command:
 
 ```bash
 $ openssl pkcs8 -topk8 -inform PEM -outform PEM \
diff --git a/site2/website/versioned_docs/version-2.4.1/security-tls-transport.md b/site2/website/versioned_docs/version-2.4.1/security-tls-transport.md
index 39010d8..4f6c0a7 100644
--- a/site2/website/versioned_docs/version-2.4.1/security-tls-transport.md
+++ b/site2/website/versioned_docs/version-2.4.1/security-tls-transport.md
@@ -39,7 +39,7 @@ Follow the guide below to set up a certificate authority. You can also refer to
 
 1. Create the certificate for the CA. You can use CA to sign both the broker and client certificates. This ensures that each party will trust the others. You should store CA in a very secure location (ideally completely disconnected from networks, air gapped, and fully encrypted).
 
-2. Entering the follwing command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direct [...]
+2. Entering the following command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direc [...]
 
 ```bash
 mkdir my-ca
@@ -95,7 +95,7 @@ openssl pkcs8 -topk8 -inform PEM -outform PEM \
     -in broker.key.pem -out broker.key-pk8.pem -nocrypt
 ```
 
-2. Enter the follwing command to generate the certificate request.
+2. Enter the following command to generate the certificate request.
 
 ```bash
 openssl req -config openssl.cnf \
diff --git a/site2/website/versioned_docs/version-2.4.1/security-token-client.md b/site2/website/versioned_docs/version-2.4.1/security-token-client.md
index 5223a2a..d9feb91 100644
--- a/site2/website/versioned_docs/version-2.4.1/security-token-client.md
+++ b/site2/website/versioned_docs/version-2.4.1/security-token-client.md
@@ -15,7 +15,7 @@ is permitted to do some actions (for example, publish messages to a topic or con
 
 The administrator (or some automated service) typically gives a user a token string.
 
-The compact representation of a signed JWT is a string that looks like as the follwing:
+The compact representation of a signed JWT is a string that looks like as the following:
 
 ```
 eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJKb2UifQ.ipevRNuRP6HflG8cFKnmUPtypruRC4fb1DWtoLL62SY
diff --git a/site2/website/versioned_docs/version-2.4.2/security-athenz.md b/site2/website/versioned_docs/version-2.4.2/security-athenz.md
index 186e451..a4117b6 100644
--- a/site2/website/versioned_docs/version-2.4.2/security-athenz.md
+++ b/site2/website/versioned_docs/version-2.4.2/security-athenz.md
@@ -15,7 +15,7 @@ To begin, you need to set up Athenz service access control. You need to create d
 
 ### Create the tenant domain and service
 
-On the [tenant](reference-terminology.md#tenant) side, you need to do the follwing things:
+On the [tenant](reference-terminology.md#tenant) side, you need to do the following things:
 
 1. Create a domain, such as `shopping`
 2. Generate a private/public key pair
@@ -27,7 +27,7 @@ For more specific steps involving the Athenz UI, refer to [Example Service Acces
 
 ### Create the provider domain and add the tenant service to some role members
 
-On the provider side, you need to do the follwing things:
+On the provider side, you need to do the following things:
 
 1. Create a domain, such as `pulsar`
 2. Create a role
diff --git a/site2/website/versioned_docs/version-2.4.2/security-tls-authentication.md b/site2/website/versioned_docs/version-2.4.2/security-tls-authentication.md
index 2372fd9..52664c2 100644
--- a/site2/website/versioned_docs/version-2.4.2/security-tls-authentication.md
+++ b/site2/website/versioned_docs/version-2.4.2/security-tls-authentication.md
@@ -15,13 +15,13 @@ Client certificates are generated using the certificate authority. Server certif
 
 The biggest difference between client certs and server certs is that the **common name** for the client certificate is the **role token** which that client is authenticated as.
 
-First, you need to enter the follwing command to generate the key :
+First, you need to enter the following command to generate the key :
 
 ```bash
 $ openssl genrsa -out admin.key.pem 2048
 ```
 
-Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the follwing command:
+Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the following command:
 
 ```bash
 $ openssl pkcs8 -topk8 -inform PEM -outform PEM \
diff --git a/site2/website/versioned_docs/version-2.4.2/security-tls-transport.md b/site2/website/versioned_docs/version-2.4.2/security-tls-transport.md
index 961f736..20f4c7a 100644
--- a/site2/website/versioned_docs/version-2.4.2/security-tls-transport.md
+++ b/site2/website/versioned_docs/version-2.4.2/security-tls-transport.md
@@ -39,7 +39,7 @@ Follow the guide below to set up a certificate authority. You can also refer to
 
 1. Create the certificate for the CA. You can use CA to sign both the broker and client certificates. This ensures that each party will trust the others. You should store CA in a very secure location (ideally completely disconnected from networks, air gapped, and fully encrypted).
 
-2. Entering the follwing command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direct [...]
+2. Entering the following command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direc [...]
 
 ```bash
 mkdir my-ca
@@ -95,7 +95,7 @@ openssl pkcs8 -topk8 -inform PEM -outform PEM \
     -in broker.key.pem -out broker.key-pk8.pem -nocrypt
 ```
 
-2. Enter the follwing command to generate the certificate request.
+2. Enter the following command to generate the certificate request.
 
 ```bash
 openssl req -config openssl.cnf \
diff --git a/site2/website/versioned_docs/version-2.4.2/security-token-client.md b/site2/website/versioned_docs/version-2.4.2/security-token-client.md
index 3ccabe4..8eea060 100644
--- a/site2/website/versioned_docs/version-2.4.2/security-token-client.md
+++ b/site2/website/versioned_docs/version-2.4.2/security-token-client.md
@@ -15,7 +15,7 @@ is permitted to do some actions (for example, publish messages to a topic or con
 
 The administrator (or some automated service) typically gives a user a token string.
 
-The compact representation of a signed JWT is a string that looks like as the follwing:
+The compact representation of a signed JWT is a string that looks like as the following:
 
 ```
 eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJKb2UifQ.ipevRNuRP6HflG8cFKnmUPtypruRC4fb1DWtoLL62SY
diff --git a/site2/website/versioned_docs/version-2.5.0/deploy-aws.md b/site2/website/versioned_docs/version-2.5.0/deploy-aws.md
index 7b00cee..9ff9de4 100644
--- a/site2/website/versioned_docs/version-2.5.0/deploy-aws.md
+++ b/site2/website/versioned_docs/version-2.5.0/deploy-aws.md
@@ -75,7 +75,7 @@ id_rsa               id_rsa.pub
 
 ## Create AWS resources using Terraform
 
-To start building AWS resources with Terraform, you need to install all Terraform dependencies. Enter the follwing command:
+To start building AWS resources with Terraform, you need to install all Terraform dependencies. Enter the following command:
 
 ```bash
 $ terraform init
diff --git a/site2/website/versioned_docs/version-2.5.0/security-extending.md b/site2/website/versioned_docs/version-2.5.0/security-extending.md
index 8d72583..02c39c2 100644
--- a/site2/website/versioned_docs/version-2.5.0/security-extending.md
+++ b/site2/website/versioned_docs/version-2.5.0/security-extending.md
@@ -84,7 +84,7 @@ public interface AuthenticationProvider extends Closeable {
 }
 ```
 
-The follwing is the example for Broker authentication plugins:
+The following is the example for Broker authentication plugins:
 
  * Mutual TLS -- https://github.com/apache/pulsar/blob/master/pulsar-broker-common/src/main/java/org/apache/pulsar/broker/authentication/AuthenticationProviderTls.java
  * Athenz -- https://github.com/apache/pulsar/blob/master/pulsar-broker-auth-athenz/src/main/java/org/apache/pulsar/broker/authentication/AuthenticationProviderAthenz.java
diff --git a/site2/website/versioned_docs/version-2.5.0/security-tls-authentication.md b/site2/website/versioned_docs/version-2.5.0/security-tls-authentication.md
index 9067b35..68fd151 100644
--- a/site2/website/versioned_docs/version-2.5.0/security-tls-authentication.md
+++ b/site2/website/versioned_docs/version-2.5.0/security-tls-authentication.md
@@ -15,13 +15,13 @@ Client certificates are generated using the certificate authority. Server certif
 
 The biggest difference between client certs and server certs is that the **common name** for the client certificate is the **role token** which that client is authenticated as.
 
-First, you need to enter the follwing command to generate the key :
+First, you need to enter the following command to generate the key :
 
 ```bash
 $ openssl genrsa -out admin.key.pem 2048
 ```
 
-Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the follwing command:
+Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the following command:
 
 ```bash
 $ openssl pkcs8 -topk8 -inform PEM -outform PEM \
diff --git a/site2/website/versioned_docs/version-2.5.0/security-tls-transport.md b/site2/website/versioned_docs/version-2.5.0/security-tls-transport.md
index 03a0511..712cbbe 100644
--- a/site2/website/versioned_docs/version-2.5.0/security-tls-transport.md
+++ b/site2/website/versioned_docs/version-2.5.0/security-tls-transport.md
@@ -39,7 +39,7 @@ Follow the guide below to set up a certificate authority. You can also refer to
 
 1. Create the certificate for the CA. You can use CA to sign both the broker and client certificates. This ensures that each party will trust the others. You should store CA in a very secure location (ideally completely disconnected from networks, air gapped, and fully encrypted).
 
-2. Entering the follwing command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direct [...]
+2. Entering the following command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direc [...]
 
 ```bash
 mkdir my-ca
@@ -95,7 +95,7 @@ openssl pkcs8 -topk8 -inform PEM -outform PEM \
     -in broker.key.pem -out broker.key-pk8.pem -nocrypt
 ```
 
-2. Enter the follwing command to generate the certificate request.
+2. Enter the following command to generate the certificate request.
 
 ```bash
 openssl req -config openssl.cnf \
diff --git a/site2/website/versioned_docs/version-2.5.1/security-jwt.md b/site2/website/versioned_docs/version-2.5.1/security-jwt.md
index 062a780..479d535 100644
--- a/site2/website/versioned_docs/version-2.5.1/security-jwt.md
+++ b/site2/website/versioned_docs/version-2.5.1/security-jwt.md
@@ -15,7 +15,7 @@ is permitted to do some actions (eg: publish to a topic or consume from a topic)
 
 A user typically gets a token string from the administrator (or some automated service).
 
-The compact representation of a signed JWT is a string that looks like as the follwing:
+The compact representation of a signed JWT is a string that looks like as the following:
 
 ```
 eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJKb2UifQ.ipevRNuRP6HflG8cFKnmUPtypruRC4fb1DWtoLL62SY
diff --git a/site2/website/versioned_docs/version-2.5.1/security-tls-authentication.md b/site2/website/versioned_docs/version-2.5.1/security-tls-authentication.md
index 8f1c06f..3ad6cc1 100644
--- a/site2/website/versioned_docs/version-2.5.1/security-tls-authentication.md
+++ b/site2/website/versioned_docs/version-2.5.1/security-tls-authentication.md
@@ -17,13 +17,13 @@ Client certificates are generated using the certificate authority. Server certif
 
 The biggest difference between client certs and server certs is that the **common name** for the client certificate is the **role token** which that client is authenticated as.
 
-First, you need to enter the follwing command to generate the key :
+First, you need to enter the following command to generate the key :
 
 ```bash
 $ openssl genrsa -out admin.key.pem 2048
 ```
 
-Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the follwing command:
+Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the following command:
 
 ```bash
 $ openssl pkcs8 -topk8 -inform PEM -outform PEM \
diff --git a/site2/website/versioned_docs/version-2.5.1/security-tls-transport.md b/site2/website/versioned_docs/version-2.5.1/security-tls-transport.md
index 525dba4..b4abe0f 100644
--- a/site2/website/versioned_docs/version-2.5.1/security-tls-transport.md
+++ b/site2/website/versioned_docs/version-2.5.1/security-tls-transport.md
@@ -41,7 +41,7 @@ Follow the guide below to set up a certificate authority. You can also refer to
 
 1. Create the certificate for the CA. You can use CA to sign both the broker and client certificates. This ensures that each party will trust the others. You should store CA in a very secure location (ideally completely disconnected from networks, air gapped, and fully encrypted).
 
-2. Entering the follwing command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direct [...]
+2. Entering the following command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direc [...]
 
 ```bash
 mkdir my-ca
@@ -97,7 +97,7 @@ openssl pkcs8 -topk8 -inform PEM -outform PEM \
     -in broker.key.pem -out broker.key-pk8.pem -nocrypt
 ```
 
-2. Enter the follwing command to generate the certificate request.
+2. Enter the following command to generate the certificate request.
 
 ```bash
 openssl req -config openssl.cnf \
diff --git a/site2/website/versioned_docs/version-2.5.2/security-jwt.md b/site2/website/versioned_docs/version-2.5.2/security-jwt.md
index 346bc05..296fd5e 100644
--- a/site2/website/versioned_docs/version-2.5.2/security-jwt.md
+++ b/site2/website/versioned_docs/version-2.5.2/security-jwt.md
@@ -15,7 +15,7 @@ is permitted to do some actions (eg: publish to a topic or consume from a topic)
 
 A user typically gets a token string from the administrator (or some automated service).
 
-The compact representation of a signed JWT is a string that looks like as the follwing:
+The compact representation of a signed JWT is a string that looks like as the following:
 
 ```
 eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJKb2UifQ.ipevRNuRP6HflG8cFKnmUPtypruRC4fb1DWtoLL62SY
diff --git a/site2/website/versioned_docs/version-2.5.2/security-tls-authentication.md b/site2/website/versioned_docs/version-2.5.2/security-tls-authentication.md
index 4da3c88..fc0a735 100644
--- a/site2/website/versioned_docs/version-2.5.2/security-tls-authentication.md
+++ b/site2/website/versioned_docs/version-2.5.2/security-tls-authentication.md
@@ -17,13 +17,13 @@ Client certificates are generated using the certificate authority. Server certif
 
 The biggest difference between client certs and server certs is that the **common name** for the client certificate is the **role token** which that client is authenticated as.
 
-First, you need to enter the follwing command to generate the key :
+First, you need to enter the following command to generate the key :
 
 ```bash
 $ openssl genrsa -out admin.key.pem 2048
 ```
 
-Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the follwing command:
+Similar to the broker, the client expects the key to be in [PKCS 8](https://en.wikipedia.org/wiki/PKCS_8) format, so you need to convert it by entering the following command:
 
 ```bash
 $ openssl pkcs8 -topk8 -inform PEM -outform PEM \
diff --git a/site2/website/versioned_docs/version-2.5.2/security-tls-transport.md b/site2/website/versioned_docs/version-2.5.2/security-tls-transport.md
index 911f000..0f5d717 100644
--- a/site2/website/versioned_docs/version-2.5.2/security-tls-transport.md
+++ b/site2/website/versioned_docs/version-2.5.2/security-tls-transport.md
@@ -41,7 +41,7 @@ Follow the guide below to set up a certificate authority. You can also refer to
 
 1. Create the certificate for the CA. You can use CA to sign both the broker and client certificates. This ensures that each party will trust the others. You should store CA in a very secure location (ideally completely disconnected from networks, air gapped, and fully encrypted).
 
-2. Entering the follwing command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direct [...]
+2. Entering the following command to create a directory for your CA, and place [this openssl configuration file](https://github.com/apache/pulsar/tree/master/site2/website/static/examples/openssl.cnf) in the directory. You may want to modify the default answers for company name and department in the configuration file. Export the location of the CA directory to the environment variable, CA_HOME. The configuration file uses this environment variable to find the rest of the files and direc [...]
 
 ```bash
 mkdir my-ca
@@ -97,7 +97,7 @@ openssl pkcs8 -topk8 -inform PEM -outform PEM \
     -in broker.key.pem -out broker.key-pk8.pem -nocrypt
 ```
 
-2. Enter the follwing command to generate the certificate request.
+2. Enter the following command to generate the certificate request.
 
 ```bash
 openssl req -config openssl.cnf \