Skip to content

Commit

Permalink
docs(cluster operator): Reduces the prereq description for cluster op…
Browse files Browse the repository at this point in the history
…erator deployment (#7281)

Signed-off-by: prmellor <pmellor@redhat.com>

Signed-off-by: prmellor <pmellor@redhat.com>
  • Loading branch information
PaulRMellor authored and scholzj committed Sep 6, 2022
1 parent 54c996a commit 0898485
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -10,8 +10,7 @@ This procedure shows how to deploy the Cluster Operator to watch Strimzi resourc

.Prerequisites

* This procedure requires use of a Kubernetes user account which is able to create `CustomResourceDefinitions`, `ClusterRoles` and `ClusterRoleBindings`.
Use of Role Base Access Control (RBAC) in the Kubernetes cluster usually means that permission to create, edit, and delete these resources is limited to Kubernetes cluster administrators, such as `system:admin`.
* You need an account with permission to create and manage `CustomResourceDefinition` and RBAC (`ClusterRole`, and `RoleBinding`) resources.

.Procedure

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,8 +10,7 @@ This procedure shows how to deploy the Cluster Operator to watch Strimzi resourc

.Prerequisites

* This procedure requires use of a Kubernetes user account which is able to create `CustomResourceDefinitions`, `ClusterRoles` and `ClusterRoleBindings`.
Use of Role Base Access Control (RBAC) in the Kubernetes cluster usually means that permission to create, edit, and delete these resources is limited to Kubernetes cluster administrators, such as `system:admin`.
* You need an account with permission to create and manage `CustomResourceDefinition` and RBAC (`ClusterRole`, and `RoleBinding`) resources.

.Procedure

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,7 @@ When running in this mode, the Cluster Operator automatically manages clusters i

.Prerequisites

* This procedure requires use of a Kubernetes user account which is able to create `CustomResourceDefinitions`, `ClusterRoles` and `ClusterRoleBindings`.
Use of Role Base Access Control (RBAC) in the Kubernetes cluster usually means that permission to create, edit, and delete these resources is limited to Kubernetes cluster administrators, such as `system:admin`.
* You need an account with permission to create and manage `CustomResourceDefinition` and RBAC (`ClusterRole`, and `RoleBinding`) resources.

.Procedure

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,9 +19,7 @@ To set up a proxy with a name and password, the format is _\http://USERNAME:PASS

.Prerequisites

This procedure requires use of a Kubernetes user account which is able to create `CustomResourceDefinitions`, `ClusterRoles` and `ClusterRoleBindings`.
Use of Role Base Access Control (RBAC) in the Kubernetes cluster usually means that permission to create, edit,
and delete these resources is limited to Kubernetes cluster administrators, such as `system:admin`.
* You need an account with permission to create and manage `CustomResourceDefinition` and RBAC (`ClusterRole`, and `RoleBinding`) resources.

.Procedure

Expand Down

0 comments on commit 0898485

Please sign in to comment.