Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions modules/installation-bare-metal-dns-record-type.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
// * installing/installing_bare_metal/upi/installing-bare-metal.adoc
// * installing/installing_bare_metal/upi/installing-restricted-networks-bare-metal.adoc

:_mod-docs-content-type: CONCEPT
:_mod-docs-content-type: PROCEDURE
[id="installation-bare-metal-dns-record-type_{context}"]
= Configuring the dnsRecordsType parameter

Expand All @@ -21,13 +21,13 @@ The `dnsRecordsType` parameter supports the following values:

.Prerequisites

* You created DNS records, such as `api`, `api-int`, or `\*.apps`.
* You created DNS records, such as `api`, `api-int`, or `*.apps`.
* You configured a user-managed load balancer for your cluster.
* If you intend on setting `dnsRecordsType.External` in the `infrastructure.config.openshift.io` CR , you must initially configure cluster nodes to use the specific external server for DNS resolution.

.Procedure

* During cluster installation, specify `TechPreviewNoUpgrade` for the `featureSet` parameter and specify `External` for the `dnsRecordsType` parameter in the `install-config.yaml` file:
* In the `install-config.yaml` file during cluster installation, specify `TechPreviewNoUpgrade` for the `featureSet` parameter and specify `External` for the `dnsRecordsType` parameter:
+
[source,yaml]
----
Expand Down
2 changes: 1 addition & 1 deletion modules/nw-dns-forward.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ A DNS forwarding configuration for the default domain can have both the default

[IMPORTANT]
====
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must recreate the container for changes to take effect.
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must re-create the container for changes to take effect.
====

.Procedure
Expand Down
2 changes: 1 addition & 1 deletion modules/virt-example-nmstate-IP-management.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -141,7 +141,7 @@ The following example shows a default situation that stores DNS values globally:
+
[IMPORTANT]
====
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must recreate the container for changes to take effect.
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must re-create the container for changes to take effect.
====
+
Example of a DNS configuration for a network interface that globally stores DNS values:
Expand Down