diff --git a/README.md b/README.md
index d0d69e3f..6b0516bf 100644
--- a/README.md
+++ b/README.md
@@ -47,7 +47,7 @@ More information can be found in [the roadmap](#roadmap) below.
- [x] Modular architecture, easy to add or remove features/components
- [x] Automated certificate management
- [x] Automatically update DNS records for exposed services
-- [x] VPN
+- [x] VPN without port forwarding
- [x] Expose services to the internet securely with [Cloudflare Tunnel](https://www.cloudflare.com/products/tunnel/)
- [x] CI/CD platform
- [x] Private container registry
@@ -199,7 +199,7 @@ They can't capture all the project's features, but they are sufficient to get a
|
ZeroTier |
- VPN without port-forwarding |
+ VPN without port forwarding |
diff --git a/docs/installation/production/external-resources.md b/docs/installation/production/external-resources.md
index ea870e03..23cb9848 100644
--- a/docs/installation/production/external-resources.md
+++ b/docs/installation/production/external-resources.md
@@ -11,7 +11,7 @@ Below is a list of external resources and why we need them (also see some [alter
| -------- | -------- | ------- |
| Terraform Cloud | Workspace | Terraform state backend |
| Cloudflare | DNS | DNS and [DNS-01 challenge](https://letsencrypt.org/docs/challenge-types/#dns-01-challenge) for certificates |
-| Cloudflare | Tunnel | Public services to the internet without port-forwarding |
+| Cloudflare | Tunnel | Public services to the internet without port forwarding |
| ZeroTier | Virtual network | Use as VPN to access home network from anywhere (with [UDP hole punching](https://en.wikipedia.org/wiki/UDP_hole_punching)) |
@@ -73,7 +73,7 @@ To avoid vendor lock-in, each external provider must have an equivalent alternat
- Update cert-manager and external-dns to use a different provider
- [Manual DNS setup](../../tutorials/manual-dns-setup.md)
- Cloudflare Tunnel:
- - Use port-forwarding if it's available
+ - Use port forwarding if it's available
- Create a small VPS in the cloud and utilize Wireguard and HAProxy to route traffic via it
- Access everything via VPN
- See also [awesome tunneling](https://github.com/anderspitman/awesome-tunneling)
@@ -81,5 +81,5 @@ To avoid vendor lock-in, each external provider must have an equivalent alternat
- [Host your own ZeroTier](https://docs.zerotier.com/self-hosting/introduction)
- [Tailscale](https://tailscale.com) (closed source, but you can use [Headscale](https://github.com/juanfont/headscale) to host your own Tailscale control server)
- [Netmaker](https://www.netmaker.org) (there's no hosted version, you'll need to host your own server)
- - Wireguard server (requires port-forwarding)
+ - Wireguard server (requires port forwarding)
diff --git a/docs/tutorials/expose-services-to-the-internet.md b/docs/tutorials/expose-services-to-the-internet.md
index 78c5a43c..e52d185e 100644
--- a/docs/tutorials/expose-services-to-the-internet.md
+++ b/docs/tutorials/expose-services-to-the-internet.md
@@ -2,7 +2,7 @@
!!! info
- This tutorial is for Cloudflare Tunnel users, please skip if you use port-forwarding.
+ This tutorial is for Cloudflare Tunnel users, please skip if you use port forwarding.
Apply the `./external` layer to create a tunnel if you haven't already,
then add the following annotations to your `Ingress` object (replace `example.com` with your domain):