Skip to content

Commit 2aacd98

Browse files
authored
[DOCS] Replace 'log into' with 'log in to' (#72324) (#72331)
1 parent 691a546 commit 2aacd98

File tree

6 files changed

+7
-7
lines changed

6 files changed

+7
-7
lines changed

docs/reference/high-availability/backup-and-restore-security-config.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ GET /_snapshot/my_backup/snapshot_1
198198
--------------------------------------------------
199199
// TEST[continued]
200200

201-
Then log into one of the node hosts, navigate to {es} installation directory,
201+
Then log in to one of the node hosts, navigate to {es} installation directory,
202202
and follow these steps:
203203

204204
. Add a new user with the `superuser` built-in role to the

docs/reference/indices/flush.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ stream, index, or index alias.
3737
Flushing a data stream or index is the process of making sure that any data that is currently
3838
only stored in the <<index-modules-translog,transaction log>> is also
3939
permanently stored in the Lucene index. When restarting, {es} replays any
40-
unflushed operations from the transaction log into the Lucene index to bring it
40+
unflushed operations from the transaction log in to the Lucene index to bring it
4141
back into the state that it was in before the restart. {es} automatically
4242
triggers flushes as needed, using heuristics that trade off the size of the
4343
unflushed transaction log against the cost of performing each flush.

docs/reference/upgrade/reindex_upgrade.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ bin/elasticsearch-users useradd <user_name> \
8282
--
8383
8484
. Use these credentials when you reindex the `.security*` index. That is to say,
85-
use them to log into {kib} and run the Upgrade Assistant or to call the
85+
use them to log in to {kib} and run the Upgrade Assistant or to call the
8686
reindex API. You can use your regular administration credentials to
8787
reindex the other internal indices.
8888

x-pack/docs/en/security/authentication/built-in-users.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Alternatively, you can set the initial passwords for the built-in users by using
8484
the *Management > Users* page in {kib} or the
8585
{ref}/security-api-change-password.html[Change Password API]. These methods are
8686
more complex. You must supply the `elastic` user and its bootstrap password to
87-
log into {kib} or run the API. This requirement means that you cannot use the
87+
log in to {kib} or run the API. This requirement means that you cannot use the
8888
default bootstrap password that is derived from the `keystore.seed` setting.
8989
Instead, you must explicitly set a `bootstrap.password` setting in the keystore
9090
before you start {es}. For example, the following command prompts you to enter a
@@ -96,7 +96,7 @@ bin/elasticsearch-keystore add "bootstrap.password"
9696
----------------------------------------------------
9797

9898
You can then start {es} and {kib} and use the `elastic` user and bootstrap
99-
password to log into {kib} and change the passwords. Alternatively, you can
99+
password to log in to {kib} and change the passwords. Alternatively, you can
100100
submit Change Password API requests for each built-in user. These methods are
101101
better suited for changing your passwords after the initial setup is complete,
102102
since at that point the bootstrap password is no longer required.

x-pack/docs/en/security/authentication/saml-guide.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -458,7 +458,7 @@ The possible solutions to this problem are:
458458
- Advise your users to close their browser after logging out of {kib}
459459
- Enable the `force_authn` setting on your SAML realm. This setting causes the
460460
Elastic Stack to request fresh authentication from the IdP every time a user
461-
attempts to log into {kib}.
461+
attempts to log in to {kib}.
462462
This setting defaults to `false` because it can be a more cumbersome user
463463
experience, but it can also be an effective protection to stop users
464464
piggy-backing on existing IdP sessions.

x-pack/docs/en/security/securing-communications/tutorial-tls-addnodes.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ If you encounter errors, you can see some common problems and solutions in
149149
. Verify that your cluster now contains three nodes.
150150
+
151151
--
152-
For example, log into {kib} with the `elastic` built-in user. Go to
152+
For example, log in to {kib} with the `elastic` built-in user. Go to
153153
*Dev Tools > Console* and run the {ref}/cluster-health.html[cluster health API]:
154154

155155
[source,console]

0 commit comments

Comments
 (0)