You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/labs/kubernetes-the-hard-way/lab9-bootstrapping-kubernetes-workers.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
author: Wale Soyinka
3
-
contributors: Steven Spencer
3
+
contributors: Steven Spencer, Ganna Zhyrnova
4
4
tags:
5
5
- kubernetes
6
6
- k8s
@@ -13,9 +13,9 @@ tags:
13
13
14
14
# Lab 9: Bootstrapping the Kubernetes Worker Nodes
15
15
16
-
> This is a fork of the original ["Kubernetes the hard way"](https://github.com/kelseyhightower/kubernetes-the-hard-way) originally written by Kelsey Hightower (GitHub: kelseyhightower). Unlike the original that bases itself on Debianlike distributions for the ARM64 architecture, this fork targets Enterprise Linux distributions such as Rocky Linux running on x86_64 architecture.
16
+
> This is a fork of the original ["Kubernetes the hard way"](https://github.com/kelseyhightower/kubernetes-the-hard-way) originally written by Kelsey Hightower (GitHub: kelseyhightower). Unlike the original, which bases itself on Debian-like distributions for the ARM64 architecture, this fork targets Enterprise Linux distributions such as Rocky Linux, which runs on x86_64 architecture.
17
17
18
-
In this lab you will bootstrap two Kubernetes worker nodes. You will install the following components: [runc](https://github.com/opencontainers/runc), [container networking plugins](https://github.com/containernetworking/cni), [containerd](https://github.com/containerd/containerd), [kubelet](https://kubernetes.io/docs/admin/kubelet), and [kube-proxy](https://kubernetes.io/docs/concepts/cluster-administration/proxies).
18
+
In this lab, you will bootstrap two Kubernetes worker nodes. You will install the following components: [runc](https://github.com/opencontainers/runc), [container networking plugins](https://github.com/containernetworking/cni), [containerd](https://github.com/containerd/containerd), [kubelet](https://kubernetes.io/docs/admin/kubelet), and [kube-proxy](https://kubernetes.io/docs/concepts/cluster-administration/proxies).
19
19
20
20
## Prerequisites
21
21
@@ -56,7 +56,7 @@ for host in node-0 node-1; do
56
56
done
57
57
```
58
58
59
-
The commands in this lab must be separately run on each worker instance: `node-0`, `node-1`. The steps for `node-0` are the only ones shown. You will need to repeat the exact steps and commands on `node-1`.
59
+
The commands in this lab must be run separately on each worker instance: `node-0` and `node-1`. The steps for `node-0` are the only ones shown. You must repeat the exact steps and commands on `node-1`.
60
60
61
61
Login to the worker `node-0` instance with the `ssh` command.
62
62
@@ -73,7 +73,7 @@ Install the operating system dependencies:
73
73
dnf -y install socat conntrack ipset tar
74
74
```
75
75
76
-
> The `socat` binary enables support for the `kubectl port-forward` command.
76
+
> The `socat` binary supports the `kubectl port-forward` command.
77
77
78
78
### Disable Swap
79
79
@@ -85,13 +85,13 @@ Verify if swap is on:
85
85
swapon --show
86
86
```
87
87
88
-
If output is empty then swap is not enabled. If the output is not empty, run the following command to disable swap immediately:
88
+
If the output is empty, then the swap is not enabled. If the output is not empty, run the following command to disable swap immediately:
89
89
90
90
```bash
91
91
swapoff -a
92
92
```
93
93
94
-
To ensure swap remains off after reboot comment out the line that automatically mounts the swap volume in the `/etc/fstab` file. Type:
94
+
To ensure swap remains off after reboot, comment out the line that automatically mounts the swap volume in the `/etc/fstab` file. Type:
95
95
96
96
```bash
97
97
sudo sed -i '/swap/s/^/#/' /etc/fstab
@@ -158,7 +158,7 @@ Create the `kubelet-config.yaml` configuration file:
158
158
159
159
!!! Note
160
160
161
-
Although considered bad security form, you might have to temporarily or permanently disable SELinux if you run into any issues starting the needed systemd services. The proper fix is to investigate and create the needed policy files using tools such as ausearch, audit2allow and so on.
161
+
Although this is considered a bad security form, you might have to temporarily or permanently disable SELinux if you run into any issues starting the needed systemd services. The proper fix is to investigate and create the required policy files using tools such as ausearch, audit2allow, etc.
162
162
163
163
The fix for getting SELinux out of the way and disabling it is by running the following:
164
164
@@ -190,7 +190,7 @@ NAME STATUS ROLES AGE VERSION
190
190
node-0 Ready <none> 1m v1.32.0
191
191
```
192
192
193
-
After completing all the previous steps in this lab on both `node-0` and `node-1` the output of the `kubectl get nodes` command should show:
193
+
After completing all the previous steps in this lab on both `node-0` and `node-1`, the output of the `kubectl get nodes` command should show:
0 commit comments