Skip to content

Commit d66eb37

Browse files
lab9-bootstrapping-kubernetes-workers.md (#2639)
Grammar check
1 parent 24e475a commit d66eb37

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

docs/labs/kubernetes-the-hard-way/lab9-bootstrapping-kubernetes-workers.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
author: Wale Soyinka
3-
contributors: Steven Spencer
3+
contributors: Steven Spencer, Ganna Zhyrnova
44
tags:
55
- kubernetes
66
- k8s
@@ -13,9 +13,9 @@ tags:
1313

1414
# Lab 9: Bootstrapping the Kubernetes Worker Nodes
1515

16-
> This is a fork of the original ["Kubernetes the hard way"](https://github.com/kelseyhightower/kubernetes-the-hard-way) originally written by Kelsey Hightower (GitHub: kelseyhightower). Unlike the original that bases itself on Debian like distributions for the ARM64 architecture, this fork targets Enterprise Linux distributions such as Rocky Linux running on x86_64 architecture.
16+
> This is a fork of the original ["Kubernetes the hard way"](https://github.com/kelseyhightower/kubernetes-the-hard-way) originally written by Kelsey Hightower (GitHub: kelseyhightower). Unlike the original, which bases itself on Debian-like distributions for the ARM64 architecture, this fork targets Enterprise Linux distributions such as Rocky Linux, which runs on x86_64 architecture.
1717
18-
In this lab you will bootstrap two Kubernetes worker nodes. You will install the following components: [runc](https://github.com/opencontainers/runc), [container networking plugins](https://github.com/containernetworking/cni), [containerd](https://github.com/containerd/containerd), [kubelet](https://kubernetes.io/docs/admin/kubelet), and [kube-proxy](https://kubernetes.io/docs/concepts/cluster-administration/proxies).
18+
In this lab, you will bootstrap two Kubernetes worker nodes. You will install the following components: [runc](https://github.com/opencontainers/runc), [container networking plugins](https://github.com/containernetworking/cni), [containerd](https://github.com/containerd/containerd), [kubelet](https://kubernetes.io/docs/admin/kubelet), and [kube-proxy](https://kubernetes.io/docs/concepts/cluster-administration/proxies).
1919

2020
## Prerequisites
2121

@@ -56,7 +56,7 @@ for host in node-0 node-1; do
5656
done
5757
```
5858

59-
The commands in this lab must be separately run on each worker instance: `node-0`, `node-1`. The steps for `node-0` are the only ones shown. You will need to repeat the exact steps and commands on `node-1`.
59+
The commands in this lab must be run separately on each worker instance: `node-0` and `node-1`. The steps for `node-0` are the only ones shown. You must repeat the exact steps and commands on `node-1`.
6060

6161
Login to the worker `node-0` instance with the `ssh` command.
6262

@@ -73,7 +73,7 @@ Install the operating system dependencies:
7373
dnf -y install socat conntrack ipset tar
7474
```
7575

76-
> The `socat` binary enables support for the `kubectl port-forward` command.
76+
> The `socat` binary supports the `kubectl port-forward` command.
7777
7878
### Disable Swap
7979

@@ -85,13 +85,13 @@ Verify if swap is on:
8585
swapon --show
8686
```
8787

88-
If output is empty then swap is not enabled. If the output is not empty, run the following command to disable swap immediately:
88+
If the output is empty, then the swap is not enabled. If the output is not empty, run the following command to disable swap immediately:
8989

9090
```bash
9191
swapoff -a
9292
```
9393

94-
To ensure swap remains off after reboot comment out the line that automatically mounts the swap volume in the `/etc/fstab` file. Type:
94+
To ensure swap remains off after reboot, comment out the line that automatically mounts the swap volume in the `/etc/fstab` file. Type:
9595

9696
```bash
9797
sudo sed -i '/swap/s/^/#/' /etc/fstab
@@ -158,7 +158,7 @@ Create the `kubelet-config.yaml` configuration file:
158158

159159
!!! Note
160160

161-
Although considered bad security form, you might have to temporarily or permanently disable SELinux if you run into any issues starting the needed systemd services. The proper fix is to investigate and create the needed policy files using tools such as ausearch, audit2allow and so on.
161+
Although this is considered a bad security form, you might have to temporarily or permanently disable SELinux if you run into any issues starting the needed systemd services. The proper fix is to investigate and create the required policy files using tools such as ausearch, audit2allow, etc.
162162

163163
The fix for getting SELinux out of the way and disabling it is by running the following:
164164

@@ -190,7 +190,7 @@ NAME STATUS ROLES AGE VERSION
190190
node-0 Ready <none> 1m v1.32.0
191191
```
192192

193-
After completing all the previous steps in this lab on both `node-0` and `node-1` the output of the `kubectl get nodes` command should show:
193+
After completing all the previous steps in this lab on both `node-0` and `node-1`, the output of the `kubectl get nodes` command should show:
194194

195195
```text
196196
NAME STATUS ROLES AGE VERSION

0 commit comments

Comments
 (0)