Skip to content

Commit 8416f54

Browse files
Merge pull request #53165 from xenolinux/post-install-overview
Modify/edit the existing content
2 parents 45c2abf + 55a771c commit 8416f54

File tree

1 file changed

+12
-8
lines changed

1 file changed

+12
-8
lines changed

post_installation_configuration/index.adoc

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@ After installing {product-title}, a cluster administrator can configure and cust
1818
* Alerts and notifications
1919
2020
[id="post-install-tasks"]
21-
== Performing post-installation configuration tasks
21+
== Configuration tasks to perform after installation
2222

2323
Cluster administrators can perform the following post-installation configuration tasks:
2424

2525
* xref:../post_installation_configuration/machine-configuration-tasks.adoc#post-install-machine-configuration-tasks[Configure operating system features]:
26-
Machine Config Operator (MCO) manages `MachineConfig` objects. By using MCO, you can perform the following on an {product-title} cluster:
26+
Machine Config Operator (MCO) manages `MachineConfig` objects. By using MCO, you can perform the following tasks on an {product-title} cluster:
2727

2828
** Configure nodes by using `MachineConfig` objects
2929
** Configure MCO-related custom resources
@@ -47,7 +47,7 @@ As a cluster administrator, you can modify the configuration resources of the ma
4747
** Cloud provider credential management
4848

4949
* xref:../post_installation_configuration/configuring-private-cluster.adoc#configuring-private-cluster[Configure cluster components to be private]:
50-
By default, the installation program provisions {product-title} by using a publicly accessible DNS and endpoints. If you want your cluster to be accessible from within an internal network only, configure the following components to be private:
50+
By default, the installation program provisions {product-title} by using a publicly accessible DNS and endpoints. If you want your cluster to be accessible only from within an internal network, configure the following components to be private:
5151

5252
** DNS
5353
** Ingress Controller
@@ -63,23 +63,27 @@ As a cluster administrator, you can perform the following operations with the ma
6363
** Enable Device Manager
6464

6565
* xref:../post_installation_configuration/network-configuration.adoc#post-install-network-configuration[Configure network]:
66-
After installing {product-title}, as a cluster administrator, you can configure the following:
66+
After installing {product-title}, you can configure the following:
6767

6868
** Ingress cluster traffic
6969
** Node port service range
7070
** Network policy
7171
** Enabling the cluster-wide proxy
7272

7373
* xref:../post_installation_configuration/storage-configuration.adoc#post-install-storage-configuration[Configure storage]:
74-
By default, containers operate using ephemeral storage or transient local storage. The ephemeral storage has a lifetime limitation, so you must configure persistent storage to store the data for a long time.
74+
By default, containers operate using ephemeral storage or transient local storage. The ephemeral storage has a lifetime limitation. TO store the data for a long time, you must configure persistent storage.
7575
You can configure storage by using one of the following methods:
7676

7777
** *Dynamic provisioning*: You can dynamically provision storage on demand by defining and creating storage classes that control different levels of storage, including storage access.
7878

79-
** *Static provisioning*: Cluster administrators can use Kubernetes persistent volumes to make existing storage available to a cluster by supporting various device configurations and mount options.
79+
** *Static provisioning*: You can use Kubernetes persistent volumes to make existing storage available to a cluster. Static provisioning can support various device configurations and mount options.
8080

8181
* xref:../post_installation_configuration/preparing-for-users.adoc#post-install-preparing-for-users[Configure users]:
82-
OAuth access tokens allow users to authenticate themselves to the API. As a cluster administrator, you can configure OAuth to specify an identity provider, use role-based access control to define and apply permissions to users, and install an Operator from OperatorHub.
82+
OAuth access tokens allow users to authenticate themselves to the API. As a cluster administrator, you can configure OAuth to perform the following tasks:
83+
+
84+
* Specify an identity provider
85+
* Use role-based access control to define and supply permissions to users
86+
* Install an Operator from OperatorHub
8387

8488
* xref:../post_installation_configuration/configuring-alert-notifications.adoc#configuring-alert-notifications[Manage alerts and notifications]:
85-
As a cluster administrator, you can view firing alerts by default from the Alerting UI of the web console. You can also configure {product-title} to send alert notifications to external systems so that you learn about important issues with your cluster.
89+
By default, firing alerts are displayed on the Alerting UI of the web console. You can also configure {product-title} to send alert notifications to external systems.

0 commit comments

Comments
 (0)