|
| 1 | +[id="post-install-configuration-overview"] |
| 2 | += Post-installation configuration overview |
| 3 | +include::modules/common-attributes.adoc[] |
| 4 | +:context: post-installation-configuration-overview |
| 5 | + |
| 6 | +toc::[] |
| 7 | + |
| 8 | +After installing {product-title}, a cluster administrator can configure and customize the following components: |
| 9 | + |
| 10 | +* Machine |
| 11 | +* Cluster |
| 12 | +* Node |
| 13 | +* Network |
| 14 | +* Storage |
| 15 | +* Users |
| 16 | +* Alerts and notifications |
| 17 | + |
| 18 | +[id="post-install-tasks"] |
| 19 | +== Performing post-installation configuration tasks |
| 20 | + |
| 21 | +Cluster administrators can perform the following post-installation configuration tasks: |
| 22 | + |
| 23 | +* xref:../post_installation_configuration/machine-configuration-tasks.adoc#post-install-machine-configuration-tasks[Configure operating system features]: |
| 24 | +Machine Config Operator (MCO) manages `MachineConfig` objects. By using MCO, you can perform the following on an {product-title} cluster: |
| 25 | + |
| 26 | +** Configure nodes by using `MachineConfig` objects |
| 27 | +** Configure MCO-related custom resources |
| 28 | + |
| 29 | +* xref:../post_installation_configuration/cluster-tasks.adoc#post-install-cluster-tasks[Configure cluster features]: |
| 30 | +As a cluster administrator, you can modify the configuration resources of the major features of an {product-title} cluster. These features include: |
| 31 | + |
| 32 | +** Image registry |
| 33 | +** Networking configuration |
| 34 | +** Image build behavior |
| 35 | +** Identity provider |
| 36 | +** The etcd configuration |
| 37 | +** Machine set creation to handle the workloads |
| 38 | +** Cloud provider credential management |
| 39 | + |
| 40 | +* xref:../post_installation_configuration/configuring-private-cluster.adoc#configuring-private-cluster[Configure cluster components to be private]: |
| 41 | +By default, the installation program provisions {product-title} by using a publicly accessible DNS and endpoints. If you want your cluster to be accessible from within an internal network only, configure the following components to be private: |
| 42 | + |
| 43 | +** DNS |
| 44 | +** Ingress Controller |
| 45 | +** API server |
| 46 | + |
| 47 | +* xref:../post_installation_configuration/node-tasks.adoc#post-install-node-tasks[Perform node operations]: |
| 48 | +By default, {product-title} uses {op-system-first} compute machines. |
| 49 | +As a cluster administrator, you can perform the following operations with the machines in your {product-title} cluster: |
| 50 | + |
| 51 | +** Add and remove compute machines |
| 52 | +** Add and remove taints and tolerations to the nodes |
| 53 | +** Configure the maximum number of pods per node |
| 54 | +** Enable Device Manager |
| 55 | + |
| 56 | +* xref:../post_installation_configuration/network-configuration.adoc#post-install-network-configuration[Configure network]: |
| 57 | +After installing {product-title}, as a cluster administrator, you can configure the following: |
| 58 | + |
| 59 | +** Ingress cluster traffic |
| 60 | +** Node port service range |
| 61 | +** Network policy |
| 62 | +** Enabling the cluster-wide proxy |
| 63 | + |
| 64 | +* xref:../post_installation_configuration/storage-configuration.adoc#post-install-storage-configuration[Configure storage]: |
| 65 | +By default, containers operate using ephemeral storage or transient local storage. The ephemeral storage has a lifetime limitation, so you must configure persistent storage to store the data for a long time. |
| 66 | +You can configure storage by using one of the following methods: |
| 67 | + |
| 68 | +** *Dynamic provisioning*: You can dynamically provision storage on demand by defining and creating storage classes that control different levels of storage, including storage access. |
| 69 | + |
| 70 | +** *Static provisioning*: Cluster administrators can use Kubernetes persistent volumes to make existing storage available to a cluster by supporting various device configurations and mount options. |
| 71 | + |
| 72 | +* xref:../post_installation_configuration/preparing-for-users.adoc#post-install-preparing-for-users[Configure users]: |
| 73 | +OAuth access tokens allow users to authenticate themselves to the API. As a cluster administrator, you can configure OAuth to specify an identity provider, use role-based access control to define and apply permissions to users, and install an Operator from OperatorHub. |
| 74 | + |
| 75 | +* xref:../post_installation_configuration/configuring-alert-notifications.adoc#configuring-alert-notifications[Manage alerts and notifications]: |
| 76 | +As a cluster administrator, you can view firing alerts by default from the Alerting UI of the web console. You can also configure {product-title} to send alert notifications to external systems so that you learn about important issues with your cluster. |
0 commit comments