Skip to content

Commit 7865f12

Browse files
author
Katie Horne
committed
chore: edit text
1 parent 593865d commit 7865f12

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

admin/workspace-management/cvms/management.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ a site manager must enable CVMs. To do so:
99
1. Go to **Manage > Admin > Infrastructure**.
1010
1. Toggle the **Enable Container-Based Virtual Machines** option to **Enable**.
1111

12-
This section describes the customization features that Coder offers for CVMs as
13-
well:
12+
This section also describes the customization features that Coder offers for
13+
CVMs:
1414

1515
![CVM Settings](../../../assets/admin/cvm-settings.png)
1616

@@ -25,7 +25,7 @@ To improve the startup time for CVM-based workspaces, you can enable caching.
2525
Cached CVMs require the `shiftfs` kernel to be present on the node. Some
2626
distributions (such as Ubuntu) include `shiftfs`. If you're unsure if `shiftfs`
2727
is present on your nodes, you can check by running `modinfo shiftfs`. If no
28-
output is returned, then you do not have `shiftfs` installed.
28+
output is returned, you do not have `shiftfs` installed.
2929

3030
If you don't want to install `shiftfs` yourself, you can have Coder install the
3131
module automatically for you. **It is important that you do not have secure boot
@@ -39,10 +39,10 @@ install `shiftfs` on your behalf.**
3939
> Self-contained workspace builds are currently an **alpha** feature.
4040
4141
By default, Coder initializes workspaces by running commands inside the
42-
container. When you enable [self-contained workspace builds], workspaces control
43-
the initialization sequence instead. This enables operation on clusters that
44-
restrict command execution inside containers using the Kubernetes API, such as
45-
with the `kubectl exec` command.
42+
container. Workspaces, however, control the initialization sequence instead when
43+
you enable [self-contained workspace builds]. This enables cluster operations
44+
that restrict command execution inside containers using the Kubernetes API, such
45+
as the `kubectl exec` command.
4646

4747
[self-contained workspace builds]: ../self-contained-builds.md
4848

@@ -61,39 +61,39 @@ workspace container.
6161
6262
Coder allows the creation of custom network interfaces using the Linux TUN
6363
device. When using the **Enable TUN device** setting, Coder workspaces will have
64-
a `/dev/net/tun` device mounted into the workspace at build time. A TUN device
65-
is often required for VPN usage.
64+
a `/dev/net/tun` device mounted into the workspace at build time. VPN usage
65+
often requires a TUN device.
6666

67-
Users may need root (or `sudo`) access within their workspace to be able to use
68-
the TUN device and start a VPN client.
67+
Users may need root (or `sudo`) access within their workspace to use the TUN
68+
device and start a VPN client.
6969

70-
> At this time, Coder does not support TUN devices for other workspace types
71-
> (such as EC2 or Docker).
70+
> At this time, Coder does not support TUN devices for non-Kubernetes workspace
71+
> types, such as EC2 or Docker.
7272
>
7373
> If you're working with EC2 workspaces, we recommend enabling privileged mode
7474
> in the workspace provider settings, which will allow users to create their own
7575
> TUN device.
7676
7777
We've tested this feature using the [Tailscale](https://tailscale.com/) VPN
78-
within Coder. Keep in mind that you may have to change your VPN settings to keep
79-
any persistent files (such as configuration/identity) files in your home volume,
80-
as any data outside the home volume is cleared when the workspace is rebuilt.
78+
within Coder. Remember that you may have to change your VPN settings to keep any
79+
persistent files (such as configuration/identity) files in your home volume, as
80+
any data outside the home volume is cleared when the workspace is rebuilt.
8181

8282
## FUSE device
8383

84-
> FUSE devices currently an **alpha** feature.
84+
> FUSE devices are currently an **alpha** feature.
8585
8686
Coder allows the creation of custom filesystems using the Linux FUSE userspace
87-
filesystem device. When using the **Enable FUSE device** setting, Coder
87+
filesystem device. By enabling the **Enable FUSE device** setting, Coder
8888
workspaces will have a `/dev/fuse` device mounted into the workspace at build
8989
time. These devices are often used to mount specialized filesystems, such as
9090
Google Cloud Storage buckets, to your workspace.
9191

92-
Users may need root (or `sudo`) access within their workspace to be able to use
93-
the FUSE device and start a FUSE filesystem.
92+
Users may need root (or `sudo`) access within their workspace to use the FUSE
93+
device and start a FUSE filesystem.
9494

95-
> At this time, Coder does not support FUSE devices for other workspace types
96-
> (such as EC2 or Docker).
95+
> At this time, Coder does not support FUSE devices for non-Kubernetes workspace
96+
> types, such as EC2 or Docker.
9797
>
9898
> If you're working with EC2 workspaces, we recommend enabling privileged mode
9999
> in the workspace provider settings, which will allow users to create their own
@@ -106,6 +106,6 @@ mkdir /tmp/mnt
106106
sshfs user@host:/ /tmp/mnt
107107
```
108108

109-
Then in a second terminal run `ls /tmp/mnt` to list the files from the remote
109+
Then, in a second terminal, run `ls /tmp/mnt` to list the files from the remote
110110
host. You should also be able to see a `fuse.sshfs` entry in the output from the
111111
`mount` command.

0 commit comments

Comments
 (0)