Chapter 2. Configuring a private cluster