You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While `etcd` is being monitored, Prometheus is not yet able to authenticate against `etcd`, and so cannot gather metrics. To configure Prometheus authentication against `etcd`:
120
120
121
-
. Copy the `/etc/etcd/ca/ca.crt` and `/etc/etcd/ca/ca.key` credentials files from the master node to the local machine:
121
+
. Copy the `/etc/etcd/ca/ca.crt` and `/etc/etcd/ca/ca.key` credentials files from the control plane node (also known as the master node) to the local machine:
Copy file name to clipboardExpand all lines: backup_and_restore/backing-up-etcd.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,13 +19,13 @@ Be sure to take an etcd backup after you upgrade your cluster. This is important
19
19
20
20
[IMPORTANT]
21
21
====
22
-
Back up your cluster's etcd data by performing a single invocation of the backup script on a master host. Do not take a backup for each master host.
22
+
Back up your cluster's etcd data by performing a single invocation of the backup script on a control plane host (also known as the master host). Do not take a backup for each control plane host.
23
23
====
24
24
25
25
After you have an etcd backup, you can xref:../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[restore to a previous cluster state].
26
26
27
27
You can perform the xref:../backup_and_restore/backing-up-etcd.adoc#backing-up-etcd-data_backup-etcd[etcd data backup process]
28
-
on any master host that has a running etcd instance.
28
+
on any control plane host that has a running etcd instance.
Copy file name to clipboardExpand all lines: backup_and_restore/disaster_recovery/about-disaster-recovery.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,13 +13,13 @@ state.
13
13
14
14
[IMPORTANT]
15
15
====
16
-
Disaster recovery requires you to have at least one healthy master host.
16
+
Disaster recovery requires you to have at least one healthy control plane host (also known as the master host).
17
17
====
18
18
19
19
xref:../../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[Restoring to a previous cluster state]::
20
20
This solution handles situations where you want to restore your cluster to
21
21
a previous state, for example, if an administrator deletes something critical.
22
-
This also includes situations where you have lost the majority of your master hosts, leading to etcd quorum loss and the cluster going offline. As long as you have taken an etcd backup, you can follow this procedure to restore your cluster to a previous state.
22
+
This also includes situations where you have lost the majority of your control plane hosts, leading to etcd quorum loss and the cluster going offline. As long as you have taken an etcd backup, you can follow this procedure to restore your cluster to a previous state.
23
23
+
24
24
If applicable, you might also need to xref:../../backup_and_restore/disaster_recovery/scenario-3-expired-certs.adoc#dr-recovering-expired-certs[recover from expired control plane certificates].
Copy file name to clipboardExpand all lines: backup_and_restore/replacing-unhealthy-etcd-member.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,11 @@ This process depends on whether the etcd member is unhealthy because the machine
11
11
12
12
[NOTE]
13
13
====
14
-
If you have lost the majority of your master hosts, leading to etcd quorum loss, then you must follow the disaster recovery procedure to xref:../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[restore to a previous cluster state] instead of this procedure.
14
+
If you have lost the majority of your control plane hosts (also known as the master hosts), leading to etcd quorum loss, then you must follow the disaster recovery procedure to xref:../backup_and_restore/disaster_recovery/scenario-2-restoring-cluster-state.adoc#dr-restoring-cluster-state[restore to a previous cluster state] instead of this procedure.
15
15
16
16
If the control plane certificates are not valid on the member being replaced, then you must follow the procedure to xref:../backup_and_restore/disaster_recovery/scenario-3-expired-certs.adoc#dr-recovering-expired-certs[recover from expired control plane certificates] instead of this procedure.
17
17
18
-
If a master node is lost and a new one is created, the etcd cluster Operator handles generating the new TLS certificates and adding the node as an etcd member.
18
+
If a control plane node is lost and a new one is created, the etcd cluster Operator handles generating the new TLS certificates and adding the node as an etcd member.
The file that Ignition uses to configure Red Hat Enterprise Linux CoreOS (RHCOS) during
288
288
operating system initialization. The installation program generates different
289
-
Ignition config files to initialize bootstrap, master, and worker nodes.
289
+
Ignition config files to initialize bootstrap, control plane, and worker nodes.
290
290
291
291
''''
292
292
@@ -332,17 +332,16 @@ Usage: kubelet(s)
332
332
333
333
The agent that controls a Kubernetes node. Each node runs a kubelet, which
334
334
handles starting and stopping containers on a node, based on the desired state
335
-
defined by the master.
335
+
defined by the control plane (also known as master).
336
336
337
337
''''
338
-
=== Kubernetes master
338
+
=== Kubernetes control plane
339
339
340
-
Usage: Kubernetes master(s)
340
+
Usage: Kubernetes control plane
341
341
342
-
The Kubernetes-native equivalent to the link:#project[OpenShift master].
343
-
An OpenShift system runs OpenShift masters, not Kubernetes masters, and
344
-
an OpenShift master provides a superset of the functionality of a Kubernetes
345
-
master, so it is generally preferred to use the term OpenShift master.
342
+
The Kubernetes-native equivalent to the link:#project[OpenShift control plane].
343
+
An OpenShift system runs OpenShift control planes (also known as masters), not Kubernetes control planes, and
344
+
an OpenShift control plane provides a superset of the functionality of a Kubernetes control plane, so it is generally preferred to use the term OpenShift control plane.
346
345
347
346
''''
348
347
=== Kubernetes API server
@@ -415,16 +414,16 @@ When referencing as a prerequisite for a procedure module, use the following
415
414
construction: Install the OpenShift CLI (`oc`).
416
415
417
416
''''
418
-
=== OpenShift master
417
+
=== OpenShift control plane (also known as master)
419
418
420
-
Usage: OpenShift master(s)
419
+
Usage: OpenShift control plane
421
420
422
421
Provides a REST endpoint for interacting with the system and manages the state
423
422
of the system, ensuring that all containers expected to be running are actually
424
423
running and that other requests such as builds and deployments are serviced.
425
424
New deployments and configurations are created with the REST API, and the state
426
425
of the system can be interrogated through this endpoint as well. An OpenShift
427
-
master comprises the API server, scheduler, and SkyDNS.
426
+
control plane comprises the API server, scheduler, and SkyDNS.
428
427
429
428
''''
430
429
=== Operator
@@ -561,7 +560,7 @@ caching, or traffic controls on the service content.
561
560
562
561
Usage: scheduler(s)
563
562
564
-
Component of the Kubernetes master or OpenShift master that manages the state of
563
+
Component of the Kubernetes control plane or OpenShift control plane that manages the state of
565
564
the system, places pods on nodes, and ensures that all containers that are
566
565
expected to be running are actually running.
567
566
@@ -620,7 +619,7 @@ A service account binds together:
620
619
621
620
Usage: SkyDNS
622
621
623
-
Component of the Kubernetes master or OpenShift master that provides
622
+
Component of the Kubernetes control plane or OpenShift control plane that provides
624
623
cluster-wide DNS resolution of internal host names for services and pods.
Copy file name to clipboardExpand all lines: machine_management/creating-infrastructure-machinesets.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ You can create a machine set to host only infrastructure components. You apply s
9
9
10
10
[IMPORTANT]
11
11
====
12
-
Unlike earlier versions of {product-title}, you cannot move the infrastructure components to the master machines. To move the components, you must create a new machine set.
12
+
Unlike earlier versions of {product-title}, you cannot move the infrastructure components to the control plane machines (also known as the master machines). To move the components, you must create a new machine set.
0 commit comments