diff --git a/contrib/vault/roles/vault/tasks/bootstrap/sync_secrets.yml b/contrib/vault/roles/vault/tasks/bootstrap/sync_secrets.yml
index 8c1ae39290d0c5dbf89f9d4da3d344d0ff9b5be8..dff1f16ddfea3795a65c4029c716ca0e4e0646bf 100644
--- a/contrib/vault/roles/vault/tasks/bootstrap/sync_secrets.yml
+++ b/contrib/vault/roles/vault/tasks/bootstrap/sync_secrets.yml
@@ -21,7 +21,7 @@
 - name: bootstrap/sync_secrets | Print out warning message if secrets are not available and vault is initialized
   pause:
     prompt: >
-         Vault orchestration may not be able to proceed. The Vault cluster is initialzed, but
+         Vault orchestration may not be able to proceed. The Vault cluster is initialized, but
          'root_token' or 'unseal_keys' were not found in {{ vault_secrets_dir }}. These are
          needed for many vault orchestration steps.
   when: vault_cluster_is_initialized and not vault_secrets_available
diff --git a/docs/dns-stack.md b/docs/dns-stack.md
index be84a882ad0f27b23b4683057eabcad16d0c268f..47273f877bd0c4626d82c3ef91e542f2377035e3 100644
--- a/docs/dns-stack.md
+++ b/docs/dns-stack.md
@@ -25,7 +25,7 @@ values lead to poor performance of DNS stack, so please choose it wisely.
 Custom search domains to be added in addition to the cluster search domains (``default.svc.{{ dns_domain }}, svc.{{ dns_domain }}``).
 
 Most Linux systems limit the total number of search domains to 6 and the total length of all search domains
-to 256 characters. Depending on the length of ``dns_domain``, you're limitted to less then the total limit.
+to 256 characters. Depending on the length of ``dns_domain``, you're limited to less then the total limit.
 
 Please note that ``resolvconf_mode: docker_dns`` will automatically add your systems search domains as
 additional search domains. Please take this into the accounts for the limits.
diff --git a/roles/download/tasks/download_file.yml b/roles/download/tasks/download_file.yml
index 2aca43d5ef3b1b758306a313114f9cce13c7bcb3..45fc43dcb421503933674cb61b6a89c97d3df374 100644
--- a/roles/download/tasks/download_file.yml
+++ b/roles/download/tasks/download_file.yml
@@ -1,6 +1,6 @@
 ---
 - block:
-  - name: download_file | Starting dowload of file
+  - name: download_file | Starting download of file
     debug:
       msg: "{{ download.url }}"
     run_once: "{{ download_run_once }}"
diff --git a/roles/kubernetes-apps/cloud_controller/oci/tasks/credentials-check.yml b/roles/kubernetes-apps/cloud_controller/oci/tasks/credentials-check.yml
index 7688eef24d723be93891adb13d4fbf32226bf013..1a02281ccb41bd4b0f44961a119b35da24c69c67 100644
--- a/roles/kubernetes-apps/cloud_controller/oci/tasks/credentials-check.yml
+++ b/roles/kubernetes-apps/cloud_controller/oci/tasks/credentials-check.yml
@@ -49,7 +49,7 @@
 
 - name: "OCI Cloud Controller | Credentials Check | oci_subnet1_id"
   fail:
-    msg: "oci_subnet1_id is missing. This is the first subnet to which loadbalancers will be added"
+    msg: "oci_subnet1_id is missingg. This is the first subnet to which loadbalancers will be added"
   when:
     - oci_subnet1_id is not defined or not oci_subnet1_id
 
diff --git a/roles/kubernetes-apps/registry/README.md b/roles/kubernetes-apps/registry/README.md
index eccf384a9f4c71b77e7fab52f4b0363dc1fc72b4..3d94af960a6dfb5957c4de283bf6b07b2b94c3f8 100644
--- a/roles/kubernetes-apps/registry/README.md
+++ b/roles/kubernetes-apps/registry/README.md
@@ -223,7 +223,7 @@ spec:
 ```
 <!-- END MUNGE: EXAMPLE ../../saltbase/salt/kube-registry-proxy/kube-registry-proxy.yaml -->
 
-When modifying replication-controller, service and daemon-set defintions, take
+When modifying replication-controller, service and daemon-set definitionss, take
 care to ensure *unique* identifiers for the rc-svc couple and the daemon-set.
 Failing to do so will have register the localhost proxy daemon-sets to the
 upstream service. As a result they will then try to proxy themselves, which
diff --git a/roles/kubespray-defaults/defaults/main.yaml b/roles/kubespray-defaults/defaults/main.yaml
index dda1f5c743897e79bfee57a57b2425a198db6726..5bc285a7f2357e343b3a1af9654b646ee255a8f6 100644
--- a/roles/kubespray-defaults/defaults/main.yaml
+++ b/roles/kubespray-defaults/defaults/main.yaml
@@ -1,6 +1,6 @@
 ---
 # Use proxycommand if bastion host is in group all
-# This change obseletes editing ansible.cfg file depending on bastion existance
+# This change obseletes editing ansible.cfg file depending on bastion existence
 ansible_ssh_common_args: "{% if 'bastion' in groups['all'] %} -o ProxyCommand='ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -W %h:%p {{ hostvars['bastion']['ansible_user'] }}@{{ hostvars['bastion']['ansible_host'] }} {% if ansible_ssh_private_key_file is defined %}-i {{ ansible_ssh_private_key_file }}{% endif %} ' {% endif %}"
 
 kube_api_anonymous_auth: true
diff --git a/roles/network_plugin/calico/templates/calico-cr.yml.j2 b/roles/network_plugin/calico/templates/calico-cr.yml.j2
index 9e10d8523247388732bb6f50cded62448822c3b2..cfffce3d3274e92e7d6a9bf212e24d45cdd262be 100644
--- a/roles/network_plugin/calico/templates/calico-cr.yml.j2
+++ b/roles/network_plugin/calico/templates/calico-cr.yml.j2
@@ -103,7 +103,7 @@ rules:
       - get
       - list
       - watch
-  # These permissions are only requried for upgrade from v2.6, and can
+  # These permissions are only required for upgrade from v2.6, and can
   # be removed after upgrade or on fresh installations.
   - apiGroups: ["crd.projectcalico.org"]
     resources: