From d9fbd04a33231b53fbcc906f667a2c1412a69185 Mon Sep 17 00:00:00 2001 From: Austin Gebauer <34121980+austingebauer@users.noreply.github.com> Date: Mon, 15 Jun 2020 11:57:51 -0700 Subject: [PATCH] docs: fix typo in gcp and gcpkms secrets (#9228) --- website/pages/docs/secrets/gcp/index.mdx | 2 +- website/pages/docs/secrets/gcpkms/index.mdx | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/website/pages/docs/secrets/gcp/index.mdx b/website/pages/docs/secrets/gcp/index.mdx index 5bb12cf85..d608c84d2 100644 --- a/website/pages/docs/secrets/gcp/index.mdx +++ b/website/pages/docs/secrets/gcp/index.mdx @@ -60,7 +60,7 @@ management tool. If you are running Vault from inside [Google Compute Engine][gce] or [Google Kubernetes Engine][gke], the instance or pod service account can be used in - place or specifying the credentials JSON file. + place of specifying the credentials JSON file. For more information on authentication, see the [authentication section](#authentication) below. 1. Configure a roleset. Rolesets determine the permissions that Service Account diff --git a/website/pages/docs/secrets/gcpkms/index.mdx b/website/pages/docs/secrets/gcpkms/index.mdx index 74f75c1af..d3be76807 100644 --- a/website/pages/docs/secrets/gcpkms/index.mdx +++ b/website/pages/docs/secrets/gcpkms/index.mdx @@ -41,7 +41,7 @@ management tool. If you are running Vault from inside [Google Compute Engine][gce] or [Google Kubernetes Engine][gke], the instance or pod service account can be used in - place or specifying the credentials JSON file. For more information on + place of specifying the credentials JSON file. For more information on authentication, see the [authentication section](#authentication) below. 1. Create a Google Cloud KMS key: