Skip to content

Commit 5a175e9

Browse files
authored
Merge branch 'main' into 114634
2 parents 8d5212a + c74a968 commit 5a175e9

File tree

138 files changed

+2435
-1738
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

138 files changed

+2435
-1738
lines changed

docs/enterprise/cluster-management-add-nodes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# Adding Nodes to kURL Clusters
22

3-
This topic describes how to add primary and secondary nodes to an embedded cluster provisioned with Replicated kURL.
3+
This topic describes how to add primary and secondary nodes to a Replicated kURL cluster.
44

55
## Overview
66

7-
You can generate commands in the Replicated KOTS Admin Console to join additional primary and secondary nodes to embedded kURL clusters. Primary nodes run services that control the cluster. Secondary nodes run services that control the pods that host the application containers. Adding nodes can help manage resources to ensure that the application runs smoothly.
7+
You can generate commands in the Replicated KOTS Admin Console to join additional primary and secondary nodes to kURL clusters. Primary nodes run services that control the cluster. Secondary nodes run services that control the pods that host the application containers. Adding nodes can help manage resources to ensure that the application runs smoothly.
88

99
For high availability clusters, Kubernetes recommends using at least three primary nodes, and that you use an odd number of nodes to help with leader selection if machine or zone failure occurs. For more information, see [Creating Highly Available Clusters with kubeadm](https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/high-availability/) in the Kubernetes documentation.
1010

Lines changed: 23 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,20 @@
11
# Deleting the Admin Console and Removing Applications
22

3-
This topic describes how to remove installed applications and delete the Replicated Admin Console from a cluster. See the following sections:
4-
* [Remove an Application](#remove-an-application)
5-
* [Delete the Admin Console](#delete-the-admin-console)
3+
This topic describes how to remove installed applications and delete the Replicated Admin Console from a cluster.
64

75
## Remove an Application
86

7+
This section describes how to remove an application instance that was installed with KOTS in an existing cluster.
8+
9+
### About Removing an Installed Application Instance
10+
911
The Replicated KOTS CLI `kots remove` command removes the reference to an installed application from the Admin Console. When you use `kots remove`, the Admin Console no longer manages the application because the record of that application’s installation is removed. This means that you can no longer manage the application through the Admin Console or through the KOTS CLI.
1012

1113
By default, `kots remove` does not delete any of the installed Kubernetes resources for the application from the cluster. To remove both the reference to an application from the Admin Console and remove any resources for the application from the cluster, you can run `kots remove` with the `--undeploy` flag.
1214

1315
It can be useful to remove only the reference to an application from the Admin Console if you want to reinstall the application, but you do not want to recreate the namespace or other Kubernetes resources. For example, if you installed an application using an incorrect license file and need to reinstall with the correct license.
16+
17+
### Procedure
1418

1519
To remove an application:
1620

@@ -46,43 +50,39 @@ To remove an application:
4650
4751
## Delete the Admin Console
4852
49-
When you install an application with the Admin Console, Replicated KOTS also creates the Kubernetes resources for the Admin Console itself on the cluster. The Admin Console includes Deployments and Services, Secrets, and other resources such as StatefulSets and PersistentVolumeClaims.
50-
51-
By default, KOTS also creates Kubernetes ClusterRole and ClusterRoleBinding resources that grant permissions to the Admin Console on the cluster level. These `kotsadm-role` and `kotsadm-rolebinding` resources are managed outside of the namespace where the Admin Console is installed. Alternatively, when the Admin Console is installed with namespace-scoped access, KOTS creates Role and RoleBinding resources inside the namespace where the Admin Console is installed.
52-
53-
If you need to completely delete the Admin Console and an application installation, such as during testing, follow one of these procedures depending on the type of cluster where you installed the Admin Console:
54-
55-
* **Existing cluster**: Manually delete the Admin Console Kubernetes objects and resources from the cluster. See [Delete from an Existing Cluster](#existing) below.
56-
* **Embedded cluster**: Remove Kubernetes from the VM where the cluster is installed. See [Delete from an Embedded Cluster](#embedded) below.
53+
This section describes how to remove the KOTS Admin Console from an existing cluster.
5754
58-
:::note
59-
These procedures do not uninstall the KOTS CLI. To uninstall the KOTS CLI, see [Uninstall](https://docs.replicated.com/reference/kots-cli-getting-started#uninstall) in _Installing the KOTS CLI_.
60-
:::
55+
### About Deleting the Admin Console from an Existing Cluster
6156
62-
### Delete from an Existing Cluster {#existing}
57+
When you install an application, KOTS creates the Kubernetes resources for the Admin Console itself on the cluster. The Admin Console includes Deployments and Services, Secrets, and other resources such as StatefulSets and PersistentVolumeClaims.
6358
64-
In existing cluster installations, if the Admin Console is not installed in the `default` namespace, then you delete the Admin Console by deleting the namespace where it is installed.
59+
By default, KOTS also creates Kubernetes ClusterRole and ClusterRoleBinding resources that grant permissions to the Admin Console on the cluster level. These `kotsadm-role` and `kotsadm-rolebinding` resources are managed outside of the namespace where the Admin Console is installed. Alternatively, when the Admin Console is installed with namespace-scoped access, KOTS creates Role and RoleBinding resources inside the namespace where the Admin Console is installed.
6560
66-
If you installed the Admin Console with namespace-scoped access, then the Admin Console Role and RoleBinding RBAC resources are also deleted when you delete the namespace. Alternatively, if you installed with the default cluster-scoped access, then you manually delete the Admin Console ClusterRole and ClusterRoleBindings resources from the cluster.
61+
In existing cluster installations, if the Admin Console is not installed in the `default` namespace, then you delete the Admin Console by deleting the namespace where it is installed.
6762
68-
The application vendor can require, support, or not support namespace-scoped installations. For more information, see [supportMinimalRBACPrivileges](/reference/custom-resource-application#supportminimalrbacprivileges) and [requireMinimalRBACPrivileges](/reference/custom-resource-application#requireminimalrbacprivileges) in _Application_.
63+
If you installed the Admin Console with namespace-scoped access, then the Admin Console Role and RoleBinding RBAC resources are also deleted when you delete the namespace. Alternatively, if you installed with the default cluster-scoped access, then you manually delete the Admin Console ClusterRole and ClusterRoleBindings resources from the cluster. For more information, see [supportMinimalRBACPrivileges](/reference/custom-resource-application#supportminimalrbacprivileges) and [requireMinimalRBACPrivileges](/reference/custom-resource-application#requireminimalrbacprivileges) in _Application_.
6964
7065
For more information about installing with cluster- or namespace-scoped access, see [RBAC Requirements](/enterprise/installing-general-requirements#rbac-requirements) in _Installation Requirements_.
7166
72-
To delete the Admin Console from an existing cluster:
67+
### Procedure
68+
69+
To completely delete the Admin Console from an existing cluster:
7370
7471
1. Run the following command to delete the namespace where the Admin Console is installed:
7572
76-
:::note
77-
* You cannot delete the `default` namespace.
78-
* This command deletes everything inside the specified namespace, including the Admin Console Role and RoleBinding resources if you installed with namespace-scoped access.
73+
:::important
74+
This command deletes everything inside the specified namespace, including the Admin Console Role and RoleBinding resources if you installed with namespace-scoped access.
7975
:::
8076
8177
```
8278
kubectl delete ns NAMESPACE
8379
```
8480
Replace `NAMESPACE` with the name of the namespace where the Admin Console is installed.
8581
82+
:::note
83+
You cannot delete the `default` namespace.
84+
:::
85+
8686
1. (Cluster-scoped Access Only) If you installed the Admin Console with the default cluster-scoped access, run the following commands to delete the Admin Console ClusterRole and ClusterRoleBinding from the cluster:
8787
8888
```
@@ -93,28 +93,4 @@ To delete the Admin Console from an existing cluster:
9393
kubectl delete clusterrolebinding kotsadm-rolebinding
9494
```
9595
96-
### Delete from an Embedded Cluster {#embedded}
97-
98-
If you installed on a cluster created by Replicated kURL, KOTS installs the Admin Console in the `default` namespace. Kubernetes does not allow the `default` namespace to be deleted.
99-
100-
To delete the Admin Console from an embedded cluster, use the kURL `tasks.sh` `reset` command to remove Kubernetes from the system.
101-
102-
:::important
103-
The `reset` command is intended to be used only on development servers. It has the potential to leave your machine in an unrecoverable state. It is not recommended unless you are able to discard this server and provision a new one.
104-
:::
105-
106-
Instead of using the `reset` command, you can also discard your current VM (if you are using one) and recreate the VM with a new OS to reinstall the Admin Console and an application.
107-
108-
For more information about the `reset` command, see [Resetting a Node](https://kurl.sh/docs/install-with-kurl/managing-nodes#reset-a-node) in the kURL documentation.
109-
110-
To delete the Admin Console from an embedded cluster:
111-
112-
1. Run the following command to remove Kubernetes from the system:
113-
114-
```
115-
curl -sSL https://k8s.kurl.sh/latest/tasks.sh | sudo bash -s reset
116-
```
117-
118-
1. Follow the instructions in the output of the command to manually remove any files that the `reset` command does not remove.
119-
120-
If the `reset` command is unsuccessful, discard your current VM, and recreate the VM with a new OS to reinstall the Admin Console and an application.
96+
1. (Optional) To uninstall the KOTS CLI, see [Uninstall](https://docs.replicated.com/reference/kots-cli-getting-started#uninstall) in _Installing the KOTS CLI_.

docs/enterprise/image-registry-kurl.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Image Registry for kURL Clusters
1+
# Working with the kURL Image Registry
22

33
This topic describes the Replicated kURL registry for kURL clusters.
44

@@ -26,7 +26,7 @@ For more information, see [admin-console garbage-collect-images](/reference/kots
2626

2727
## Disable Image Garbage Collection
2828

29-
Image garbage collection is enabled by default for embedded kURL clusters that use the kURL registry.
29+
Image garbage collection is enabled by default for kURL clusters that use the kURL registry.
3030

3131
To disable image garbage collection:
3232

@@ -56,8 +56,8 @@ The kURL registry image garbage collection feature has following limitations:
5656

5757
To prevent this from happening, include the optional images in the `additionalImages` list of the Application custom resource. For more information, see [`additionalImages`](/reference/custom-resource-application#additionalimages) in _Application_.
5858

59-
* **Shared Image Registries**: The image garbage collection process assumes that the registry is not shared with any other instances of Replicated KOTS, nor shared with any external applications. If the embedded kURL registry is used by another external application, disable garbage collection to prevent image loss.
59+
* **Shared Image Registries**: The image garbage collection process assumes that the registry is not shared with any other instances of Replicated KOTS, nor shared with any external applications. If the built-in kURL registry is used by another external application, disable garbage collection to prevent image loss.
6060

61-
* **Customer Supplied Registries**: Image garbage collection is supported only when used with the embedded kURL registry. If the KOTS instance is configured to use a different registry, disable garbage collection to prevent image loss.
61+
* **Customer Supplied Registries**: Image garbage collection is supported only when used with the built-in kURL registry. If the KOTS instance is configured to use a different registry, disable garbage collection to prevent image loss.
6262

6363
* **Application Rollbacks**: Image garbage collection has no effect when the `allowRollback` field in the KOTS Application custom resource is set to `true`. For more information, see [Application](/reference/custom-resource-application) in _KOTS Custom Resources_.

docs/enterprise/image-registry-settings.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ This topic describes how to configure private registry settings in the Replicate
88

99
Using a private registry lets you create a custom image pipeline. Any proprietary configurations that you make to the application are shared only with the groups that you allow access, such as your team or organization. You also have control over the storage location, logging messages, load balancing requests, and other configuration options.
1010

11-
Private registries can be used with online or air gap clusters. For embedded kURL clusters, if the Replicated kURL installer spec includes the kURL Registry add-on, then the embedded registry is used to host the application images. For more information about the kURL Registry add-on, see [Image Registry for kURL Clusters](image-registry-kurl).
11+
Private registries can be used with online or air gap clusters. For kURL clusters, if the Replicated kURL installer spec includes the kURL Registry add-on, then the built-in kURL registry is used to host the application images. For more information, see [Working with the kURL Image Registry](image-registry-kurl).
1212

1313
## Prerequisites
1414

15-
Your domain must support a Docker V2 protocol. For more information, see [Private Registry Requirements](installing-general-requirements#private-registry-requirements) in _Installation Requirements_.
15+
Your domain must support a Docker V2 protocol. For more information, see [Compatible Image Registries](installing-general-requirements#registries) in _KOTS Installation Requirements_.
1616

1717
## Configure Private Registries in Online Clusters
1818

docs/enterprise/installing-embedded-air-gap.mdx

Lines changed: 23 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -94,30 +94,30 @@ To install with Embedded Cluster in an air gap environment:
9494

9595
The installation command takes a few minutes to complete. During installation, Embedded Cluster completes tasks to prepare the cluster and install KOTS in the cluster. Embedded Cluster also automatically runs a default set of [_host preflight checks_](/vendor/embedded-overview#about-host-preflight-checks) which verify that the environment meets the requirements for the installer.
9696

97-
1. When the installation command completes, go to the URL provided in the output to access the Admin Console.
98-
99-
**Example output:**
97+
**Example output:**
10098

101-
```bash
102-
✔ Host files materialized
103-
? Enter an Admin Console password: ********
104-
? Confirm password: ********
105-
✔ Host files materialized!
106-
✔ Host preflights succeeded!
107-
✔ Node installation finished!
108-
✔ Storage is ready!
109-
✔ Embedded Cluster Operator is ready!
110-
✔ Admin Console is ready!
111-
✔ Additional components are ready!
112-
Visit the admin console to configure and install gitea-kite: http://104.155.145.60:30000
113-
```
114-
At this point, the cluster is provisioned and the KOTS Admin Console is deployed, but the application is not yet installed.
99+
```bash
100+
? Enter an Admin Console password: ********
101+
? Confirm password: ********
102+
✔ Host files materialized!
103+
✔ Running host preflights
104+
✔ Node installation finished!
105+
✔ Storage is ready!
106+
✔ Embedded Cluster Operator is ready!
107+
✔ Admin Console is ready!
108+
✔ Additional components are ready!
109+
Visit the Admin Console to configure and install gitea-kite: http://104.155.145.60:30000
110+
```
111+
112+
At this point, the cluster is provisioned and the Admin Console is deployed, but the application is not yet installed.
113+
114+
1. Go to the URL provided in the output to access to the Admin Console.
115115

116-
1. Bypass the browser TLS warning by clicking **Continue to Setup**.
116+
1. On the Admin Console landing page, click **Start**.
117117

118-
1. Click **Advanced > Proceed**.
118+
1. On the **Secure the Admin Console** screen, review the instructions and click **Continue**. In your browser, follow the instructions that were provided on the **Secure the Admin Console** screen to bypass the warning.
119119

120-
1. On the HTTPS page, upload your own private key and certificacte or select **Self-signed**.
120+
1. On the **Certificate type** screen, either select **Self-signed** to continue using the self-signed Admin Console certificate or click **Upload your own** to upload your own private key and certificacte.
121121

122122
By default, a self-signed TLS certificate is used to secure communication between your browser and the Admin Console. You will see a warning in your browser every time you access the Admin Console unless you upload your own certificate.
123123

@@ -127,17 +127,11 @@ To install with Embedded Cluster in an air gap environment:
127127

128128
Optionally, add nodes to the cluster before deploying the application. For more information about joining nodes, see [Adding and Managing Nodes with Embedded Cluster](/enterprise/embedded-manage-nodes). Click **Continue**.
129129

130-
1. On the config screen, complete the fields for the application configuration options and then click **Continue**.
130+
1. On the **Configure [App Name]** screen, complete the fields for the application configuration options. Click **Continue**.
131131

132-
1. On the **Preflight checks** page, the application-specific preflight checks run automatically. Preflight checks are conformance tests that run against the target namespace and cluster to ensure that the environment meets the minimum requirements to support the application. Click **Deploy**.
132+
1. On the **Validate the environment & deploy [App Name]** screen, address any warnings or failures identified by the preflight checks and then click **Deploy**.
133133

134-
:::note
135-
Replicated recommends that you address any warnings or failures, rather than dismissing them. Preflight checks help ensure that your environment meets the requirements for application deployment.
136-
:::
137-
138-
:::note
139-
If the application does not include preflight checks, you need to click **Deploy** then **Yes, Deploy** next to the target version on the Admin Console dashboard to install.
140-
:::
134+
Preflight checks are conformance tests that run against the target namespace and cluster to ensure that the environment meets the minimum requirements to support the application.
141135

142136
The Admin Console dashboard opens.
143137

0 commit comments

Comments
 (0)