You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/enterprise/installing-general-requirements.mdx
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -266,7 +266,9 @@ KOTS has been tested for compatibility with the following registries:
266
266
267
267
<DockerCompatibility/>
268
268
269
-
## Firewall Openings for Online Installations with KOTS in an Existing Cluster {#firewall}
269
+
## Network Requirements for Online Installations
270
+
271
+
### Firewall Openings {#firewall}
270
272
271
273
<FirewallOpeningsIntro/>
272
274
@@ -304,3 +306,7 @@ KOTS has been tested for compatibility with the following registries:
304
306
* Required only if the application uses the [Replicated proxy registry](/vendor/private-images-about).
305
307
306
308
** Required only if the application uses the [Replicated registry](/vendor/private-images-replicated).
309
+
310
+
### IPv4 or IPv4/IPv6 Dual-Stack Only
311
+
312
+
KOTS does not support online installations in single-stack IPv6-only environments. Environments that use IPv4 or dual-stack IPv4/IPv6 networking are supported.
Copy file name to clipboardExpand all lines: docs/enterprise/installing-kurl-requirements.mdx
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,9 @@ You must meet the additional kURL system requirements when applicable:
36
36
37
37
-**Cloud Disk Performance**: For a list of cloud VM instance and disk combinations that are known to provide sufficient performance for etcd and pass the write latency preflight, see [Cloud Disk Performance](https://kurl.sh/docs/install-with-kurl/system-requirements#cloud-disk-performance) in the kURL documentation.
38
38
39
-
## Firewall Openings for Online Installations with kURL {#firewall}
39
+
## Network Requirements for Online Installations
40
+
41
+
### Firewall Openings {#firewall}
40
42
41
43
<FirewallOpeningsIntro/>
42
44
@@ -73,4 +75,8 @@ You must meet the additional kURL system requirements when applicable:
73
75
74
76
* Required only if the application uses the [Replicated proxy registry](/vendor/private-images-about).
75
77
76
-
** Required only if the application uses the [Replicated registry](/vendor/private-images-replicated).
78
+
** Required only if the application uses the [Replicated registry](/vendor/private-images-replicated).
79
+
80
+
### IPv4 or IPv4/IPv6 Dual-Stack Only
81
+
82
+
kURL does not support online installations in single-stack IPv6-only environments. Environments that use IPv4 or dual-stack IPv4/IPv6 networking are supported.
Copy file name to clipboardExpand all lines: docs/vendor/custom-domains-using.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,10 @@ To add and verify a custom domain:
14
14
15
15
1. In the **Add custom domain** dropdown, select the target Replicated endpoint.
16
16
17
+
:::note
18
+
There is a known issue when using a custom domain for the Enterprise Portal if any of your customers use link transformers such as Microsoft Defender Safe Links. For more information, see [Known Issue](custom-domains#known-issue) in _About Custom Domains_.
Copy file name to clipboardExpand all lines: docs/vendor/custom-domains.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,4 +38,8 @@ Using custom domains has the following limitations:
38
38
39
39
- Each custom domain can only be used by one team.
40
40
41
-
- For [Replicated Embedded Cluster](/vendor/embedded-overview) installations, any Helm [`extensions`](/reference/embedded-config) that you add in the Embedded Cluster Config do not use custom domains. During deployment, Embedded Cluster pulls both the repo for the given chart and any images in the chart as written. Embedded Cluster does not rewrite image names to use custom domains.
41
+
- For [Replicated Embedded Cluster](/vendor/embedded-overview) installations, any Helm [`extensions`](/reference/embedded-config) that you add in the Embedded Cluster Config do not use custom domains. During deployment, Embedded Cluster pulls both the repo for the given chart and any images in the chart as written. Embedded Cluster does not rewrite image names to use custom domains.
42
+
43
+
## Known Issue
44
+
45
+
If you use a custom domain for the Replicated [Enterprise Portal](/vendor/enterprise-portal-about) and any of your customers use link transformers such as Microsoft Defender Safe Links, then there is a known issue where legitimate URLs in emails generated by the Enterprise Portal can break due to rewrapping. To avoid this issue, request a "Do not rewrite the following URLs" exclusion policy for your custom Enterprise Portal domain.
Copy file name to clipboardExpand all lines: docs/vendor/embedded-overview.mdx
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,3 +137,5 @@ Embedded Cluster has the following limitations:
137
137
***Policy enforcement on Embedded Cluster workloads is not supported**: The Embedded Cluster runs workloads that require higher levels of privilege. If your application installs a policy enforcement engine such as Gatekeeper or Kyverno, ensure that its policies are not enforced in the namespaces used by Embedded Cluster.
138
138
139
139
***Installing on STIG- and CIS-hardened OS images is not supported**: Embedded Cluster isn't tested on these images, and issues have arisen when trying to install on them. Embedded Cluster version 2.8.0 and later will install in standard SELinux environments by setting appropriate SELinux file contexts on the bin directory and restoring SELinux contexts for the data directory after creation.
140
+
141
+
***Single-stack IPv6 not supported**: Embedded Cluster does not support installations in single-stack IPv6-only environments. Environments that use IPv4 or dual-stack IPv4/IPv6 networking are supported.
Copy file name to clipboardExpand all lines: docs/vendor/enterprise-portal-about.mdx
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,15 +27,19 @@ The following diagram shows how customers can use the Enterprise Portal to acces
27
27
28
28
As shown in the diagram above, your licensed customers can access the installation and update instructions for one or more application releases by logging in to the Enterprise Portal. The Enterprise Portal tracks the customer's installation attempts and progress, and shares those insights back to the Vendor Portal. After installing, customers can also upload support bundles in the Enterprise Portal. Support bundles uploaded to the Enterprise Portal are automatically made available to you in the Vendor Portal.
29
29
30
+
You can enable and disable access to the Enterprise Portal for all customers, or on a per-customer basis. For more information about how to enable access, see [Manage Customer Access](/vendor/enterprise-portal-invite#manage-ep-access).
31
+
30
32
For information about using the Enterprise Portal, see [Access and Use the Enterprise Portal](enterprise-portal-use).
31
33
32
34
## Limitations
33
35
34
36
* The Enterprise Portal is Beta. The features and functionality of the Enterprise Portal are subject to change.
35
37
38
+
* Installation and upgrade instructions are available only for Embedded Cluster and Helm installations. The Enterprise Portal does not provide instructions for installing and upgrading with KOTS in existing clusters.
39
+
36
40
* Air gap instance records do not appear in the Enterprise Portal until the end customer creates an air gap instance record by either uploading a support bundle for that instance or manually entering instance information. For more information, see [View Active and Inactive Instances](/vendor/enterprise-portal-use#view-active-and-inactive-instances) in _Access and Use the Enterprise Portal_.
37
41
38
-
*Installation and upgrade instructions are available only for Embedded Cluster and Helm installations. The Enterprise Portal does not provide instructions for installing and upgrading with KOTS in existing clusters.
42
+
*There is a known issue when using a custom domain for the Enterprise Portal if any of your customers use link transformers such as Microsoft Defender Safe Links. For more information, see [Known Issue](custom-domains#known-issue)in _About Custom Domains_.
39
43
40
44
## Comparison to the Download Portal
41
45
@@ -51,9 +55,7 @@ You can configure the Enterprise Portal to use a custom domain, add links and co
51
55
52
56
For more information about customizing the Enterprise Portal, see [Customize the Enterprise Portal](enterprise-portal-configure).
53
57
54
-
For information about how to set a custom domain for the Enterprise Portal, see [Use Custom Domains](/vendor/custom-domains-using).
55
-
56
-
You can enable and disable access to the Enterprise Portal for all customers, or on a per-customer basis. For more information about how to enable access, see [Manage Customer Access](/vendor/enterprise-portal-invite#manage-ep-access).
58
+
For information about how to set a custom domain for the Enterprise Portal, see [Use Custom Domains](/vendor/custom-domains-using).
57
59
58
60
## About Instance Reporting with the Enterprise Portal
0 commit comments