mirror of https://github.com/docker/docs.git
DTR bootstrapper reference pages for 2.7 and 2.6 (#1124)
This commit is contained in:
parent
fac42994ec
commit
4695a8d020
|
@ -1058,25 +1058,25 @@ reference:
|
|||
nosync: true
|
||||
- sectiontitle: DTR CLI
|
||||
section:
|
||||
- path: /reference/dtr/2.6/cli/
|
||||
- path: /reference/dtr/2.7/cli/
|
||||
title: Overview
|
||||
- path: /reference/dtr/2.6/cli/backup/
|
||||
- path: /reference/dtr/2.7/cli/backup/
|
||||
title: backup
|
||||
- path: /reference/dtr/2.6/cli/destroy/
|
||||
- path: /reference/dtr/2.7/cli/destroy/
|
||||
title: destroy
|
||||
- path: /reference/dtr/2.6/cli/emergency-repair/
|
||||
title: emergency-repair
|
||||
- path: /reference/dtr/2.6/cli/install/
|
||||
- path: /reference/dtr/2.7/cli/emergency-repair/
|
||||
title: emergency-repair7
|
||||
- path: /reference/dtr/2.7/cli/install/
|
||||
title: install
|
||||
- path: /reference/dtr/2.6/cli/join/
|
||||
- path: /reference/dtr/2.7/cli/join/
|
||||
title: join
|
||||
- path: /reference/dtr/2.6/cli/reconfigure/
|
||||
- path: /reference/dtr/2.7/cli/reconfigure/
|
||||
title: reconfigure
|
||||
- path: /reference/dtr/2.6/cli/remove/
|
||||
- path: /reference/dtr/2.7/cli/remove/
|
||||
title: remove
|
||||
- path: /reference/dtr/2.6/cli/restore/
|
||||
- path: /reference/dtr/2.7/cli/restore/
|
||||
title: restore
|
||||
- path: /reference/dtr/2.6/cli/upgrade/
|
||||
- path: /reference/dtr/2.7/cli/upgrade/
|
||||
title: upgrade
|
||||
- sectiontitle: UCP CLI
|
||||
section:
|
||||
|
@ -1164,7 +1164,7 @@ reference:
|
|||
- path: /engine/api/v1.18/
|
||||
title: v1.18 reference
|
||||
- title: DTR API
|
||||
path: /reference/dtr/2.6/api/
|
||||
path: /reference/dtr/2.7/api/
|
||||
- title: UCP API
|
||||
path: /reference/ucp/3.1/api/
|
||||
- title: Registry API
|
||||
|
@ -2445,7 +2445,7 @@ manuals:
|
|||
- title: Restore from a backup
|
||||
path: /ee/dtr/admin/disaster-recovery/restore-from-backup/
|
||||
- title: CLI reference
|
||||
path: /reference/dtr/2.6/cli/
|
||||
path: /reference/dtr/2.7/cli/
|
||||
nosync: true
|
||||
- sectiontitle: User guides
|
||||
section:
|
||||
|
|
|
@ -26,6 +26,7 @@ This command upgrades DTR 2.5.x to the current version of this image.
|
|||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--existing-replica-id` | $DTR_REPLICA_ID | The ID of an existing DTR replica. To add, remove or modify DTR, you must connect to an existing healthy replica's database. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--no-image-check` | $NO_IMAGE_CHECK | Disable the check for manifest v1 images during the upgrade. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
|
|
|
@ -0,0 +1,92 @@
|
|||
---
|
||||
title: docker/dtr backup
|
||||
description: Create a backup of DTR
|
||||
keywords: dtr, cli, backup
|
||||
redirect_from:
|
||||
- /reference/dtr/2.5/cli/backup/
|
||||
---
|
||||
|
||||
Create a backup of DTR
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -i --rm docker/dtr \
|
||||
backup [command options] > backup.tar
|
||||
```
|
||||
|
||||
### Example Commands
|
||||
|
||||
#### Basic
|
||||
|
||||
```bash
|
||||
docker run -i --rm --log-driver none docker/dtr:2.6.5 \
|
||||
backup --ucp-ca "$(cat ca.pem)" --existing-replica-id 5eb9459a7832 > backup.tar
|
||||
```
|
||||
|
||||
#### Advanced (with chained commands)
|
||||
|
||||
The following command has been tested on Linux:
|
||||
|
||||
{% raw %}
|
||||
```none
|
||||
DTR_VERSION=$(docker container inspect $(docker container ps -f \
|
||||
name=dtr-registry -q) | grep -m1 -Po '(?<=DTR_VERSION=)\d.\d.\d'); \
|
||||
REPLICA_ID=$(docker inspect -f '{{.Name}}' $(docker ps -q -f name=dtr-rethink) | cut -f 3 -d '-')); \
|
||||
read -p 'ucp-url (The UCP URL including domain and port): ' UCP_URL; \
|
||||
read -p 'ucp-username (The UCP administrator username): ' UCP_ADMIN; \
|
||||
read -sp 'ucp password: ' UCP_PASSWORD; \
|
||||
docker run --log-driver none -i --rm \
|
||||
--env UCP_PASSWORD=$UCP_PASSWORD \
|
||||
docker/dtr:$DTR_VERSION backup \
|
||||
--ucp-username $UCP_ADMIN \
|
||||
--ucp-url $UCP_URL \
|
||||
--ucp-ca "$(curl https://${UCP_URL}/ca)" \
|
||||
--existing-replica-id $REPLICA_ID > \
|
||||
dtr-metadata-${DTR_VERSION}-backup-$(date +%Y%m%d-%H_%M_%S).tar
|
||||
```
|
||||
{% endraw %}
|
||||
|
||||
For a detailed explanation on the advanced example, see
|
||||
[Back up your DTR metadata](/ee/dtr/admin/disaster-recovery/create-a-backup/#back-up-dtr-metadata).
|
||||
To learn more about the `--log-driver` option for `docker run`, see [docker run reference](/engine/reference/run/#logging-drivers---log-driver).
|
||||
|
||||
## Description
|
||||
|
||||
This command creates a `tar` file with the contents of the volumes used by
|
||||
DTR, and prints it. You can then use `docker/dtr restore` to restore the data
|
||||
from an existing backup.
|
||||
|
||||
|
||||
Note:
|
||||
|
||||
* This command only creates backups of configurations, and image metadata.
|
||||
It does not back up users and organizations. Users and organizations can be
|
||||
backed up during a UCP backup.
|
||||
|
||||
It also does not back up Docker images stored in your registry.
|
||||
You should implement a separate backup policy for the Docker images stored
|
||||
in your registry, taking into consideration whether your DTR installation is
|
||||
configured to store images on the filesystem or is using a cloud provider.
|
||||
|
||||
* This backup contains sensitive information and should be
|
||||
stored securely.
|
||||
|
||||
* Using the `--offline-backup` flag temporarily shuts down the RethinkDB container.
|
||||
Take the replica out of your load balancer to avoid downtime.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--existing-replica-id` | $DTR_REPLICA_ID | The ID of an existing DTR replica. To add, remove or modify a DTR replica, you must connect to an existing healthy replica's database. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--offline-backup` | $DTR_OFFLINE_BACKUP | This flag takes RethinkDB down during backup and takes a more reliable backup. If you back up DTR with this flag, RethinkDB will go down during backup. However, offline backups are guaranteed to be more consistent than online backups. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
|
|
@ -0,0 +1,38 @@
|
|||
---
|
||||
title: docker/dtr destroy
|
||||
description: Destroy a DTR replica's data
|
||||
keywords: dtr, cli, destroy
|
||||
---
|
||||
|
||||
Destroy a DTR replica's data
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
destroy [command options]
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command forcefully removes all containers and volumes associated with
|
||||
a DTR replica without notifying the rest of the cluster. Use this command
|
||||
on all replicas uninstall DTR.
|
||||
|
||||
Use the 'remove' command to gracefully scale down your DTR cluster.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--replica-id` | $DTR_DESTROY_REPLICA_ID | The ID of the replica to destroy. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP.The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to man-in-the-middle attacks. For production deployments, use --ucp-ca "$(cat ca.pem)" instead. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP.Download the UCP TLS CA certificate from https://<ucp-url>/ca, and use --ucp-ca "$(cat ca.pem)". |
|
||||
|
|
@ -0,0 +1,55 @@
|
|||
---
|
||||
title: docker/dtr emergency-repair
|
||||
description: Recover DTR from loss of quorum
|
||||
keywords: dtr, cli, emergency-repair
|
||||
---
|
||||
|
||||
Recover DTR from loss of quorum
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
emergency-repair [command options]
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command repairs a DTR cluster that has lost quorum by reverting your
|
||||
cluster to a single DTR replica.
|
||||
|
||||
There are three steps you can take to recover an unhealthy DTR cluster:
|
||||
|
||||
1. If the majority of replicas are healthy, remove the unhealthy nodes from
|
||||
the cluster, and join new ones for high availability.
|
||||
2. If the majority of replicas are unhealthy, use this command to revert your
|
||||
cluster to a single DTR replica.
|
||||
3. If you can't repair your cluster to a single replica, you'll have to
|
||||
restore from an existing backup, using the `restore` command.
|
||||
|
||||
When you run this command, a DTR replica of your choice is repaired and
|
||||
turned into the only replica in the whole DTR cluster.
|
||||
The containers for all the other DTR replicas are stopped and removed. When
|
||||
using the `force` option, the volumes for these replicas are also deleted.
|
||||
|
||||
After repairing the cluster, you should use the `join` command to add more
|
||||
DTR replicas for high availability.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--existing-replica-id` | $DTR_REPLICA_ID | The ID of an existing DTR replica. To add, remove or modify DTR, you must connect to an existing healthy replica's database. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--overlay-subnet` | $DTR_OVERLAY_SUBNET | The subnet used by the dtr-ol overlay network. Example: `10.0.0.0/24`. For high-availability, DTR creates an overlay network between UCP nodes. This flag allows you to choose the subnet for that network. Make sure the subnet you choose is not used on any machine where DTR replicas are deployed. |
|
||||
| `--prune` | $PRUNE | Delete the data volumes of all unhealthy replicas. With this option, the volume of the DTR replica you're restoring is preserved but the volumes for all other replicas are deleted. This has the same result as completely uninstalling DTR from those replicas. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from https://<ucp-url>/ca, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
| `--y, yes` | $YES | Answer yes to any prompts. |
|
||||
|
|
@ -0,0 +1,22 @@
|
|||
---
|
||||
title: docker/dtr images
|
||||
description: List all the images necessary to install DTR
|
||||
keywords: dtr, cli, images
|
||||
---
|
||||
|
||||
List all the images necessary to install DTR
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
images [command options]
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command lists all the images necessary to install DTR.
|
||||
|
||||
|
||||
|
|
@ -0,0 +1,39 @@
|
|||
---
|
||||
title: docker/dtr overview
|
||||
description: Learn about the commands available in the docker/dtr image.
|
||||
keywords: dtr, install, uninstall, configure
|
||||
---
|
||||
|
||||
This tool has commands to install, configure, and backup Docker
|
||||
Trusted Registry (DTR). It also allows uninstalling DTR.
|
||||
By default the tool runs in interactive mode. It prompts you for
|
||||
the values needed.
|
||||
|
||||
Additional help is available for each command with the '--help' option.
|
||||
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
command [command options]
|
||||
```
|
||||
|
||||
|
||||
If not specified, `docker/dtr` uses the `latest` tag by default. To work with a different version, specify it in the command. For example, `docker run -it --rm docker/dtr:2.6.0`.
|
||||
|
||||
|
||||
## Commands
|
||||
|
||||
| Option | Description |
|
||||
|:-------------------------------------|:------------------------------------------------|
|
||||
| [install](install/) | Install Docker Trusted Registry |
|
||||
| [join](join/) | Add a new replica to an existing DTR cluster |
|
||||
| [reconfigure](reconfigure/) | Change DTR configurations |
|
||||
| [remove](remove/) | Remove a DTR replica from a cluster |
|
||||
| [destroy](destroy/) | Destroy a DTR replica's data |
|
||||
| [restore](restore/) | Install and restore DTR from an existing backup |
|
||||
| [backup](backup/) | Create a backup of DTR |
|
||||
| [upgrade](upgrade/) | Upgrade DTR 2.4.x cluster to this version |
|
||||
| [images](images/) | List all the images necessary to install DTR |
|
||||
| [emergency-repair](emergency-repair/) | Recover DTR from loss of quorum |
|
|
@ -0,0 +1,68 @@
|
|||
---
|
||||
title: docker/dtr install
|
||||
description: Install Docker Trusted Registry
|
||||
keywords: dtr, cli, install
|
||||
---
|
||||
|
||||
Install Docker Trusted Registry
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
install [command options]
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command installs Docker Trusted Registry (DTR) on a node managed by
|
||||
Docker Universal Control Plane (UCP).
|
||||
|
||||
After installing DTR, you can join additional DTR replicas using `docker/dtr join`.
|
||||
|
||||
## Example Usage
|
||||
|
||||
```bash
|
||||
$ docker run -it --rm docker/dtr:{{ site.dtr_version }}.0 install \
|
||||
--ucp-node <UCP_NODE_HOSTNAME> \
|
||||
--ucp-insecure-tls
|
||||
```
|
||||
|
||||
> **Note**: Use `--ucp-ca "$(cat ca.pem)"` instead of `--ucp-insecure-tls` for a production deployment.
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--async-nfs` | $ASYNC_NFS | Use async NFS volume options on the replica specified in the `--existing-replica-id` option. The NFS configuration must be set with `--nfs-storage-url` explicitly to use this option. Using `--async-nfs` will bring down any containers on the replica that use the NFS volume, delete the NFS volume, bring it back up with the appropriate configuration, and restart any containers that were brought down. |
|
||||
| `--client-cert-auth-ca ` | $CLIENT_CA | Specify root CA certificates for client authentication with `--client-cert-auth-ca "$(cat ca.pem)"`. |
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--dtr-ca` | $DTR_CA | Use a PEM-encoded TLS CA certificate for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own root CA public certificate with `--dtr-ca "$(cat ca.pem)"`. |
|
||||
| `--dtr-cert` | $DTR_CERT | Use a PEM-encoded TLS certificate for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own public key certificate with `--dtr-cert "$(cat cert.pem)"`. If the certificate has been signed by an intermediate certificate authority, append its public key certificate at the end of the file to establish a chain of trust. |
|
||||
| `--dtr-external-url` | $DTR_EXTERNAL_URL | URL of the host or load balancer clients use to reach DTR. When you use this flag, users are redirected to UCP for logging in. Once authenticated they are redirected to the URL you specify in this flag. If you don't use this flag, DTR is deployed without single sign-on with UCP. Users and teams are shared but users log in separately into the two applications. You can enable and disable single sign-on within your DTR system settings. Format `https://host[:port]`, where port is the value you used with `--replica-https-port`. Since [HSTS (HTTP Strict-Transport-Security) header](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) is included in all API responses, make sure to specify the FQDN (Fully Qualified Domain Name) of your DTR, or your browser may refuse to load the web interface. |
|
||||
| `--dtr-key` | $DTR_KEY | Use a PEM-encoded TLS private key for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own TLS private key with `--dtr-key "$(cat key.pem)"`. |
|
||||
| `--dtr-storage-volume` | $DTR_STORAGE_VOLUME | Customize the volume to store Docker images. By default DTR creates a volume to store the Docker images in the local filesystem of the node where DTR is running, without high-availability. Use this flag to specify a full path or volume name for DTR to store images. For high-availability, make sure all DTR replicas can read and write data on this volume. If you're using NFS, use `--nfs-storage-url` instead. |
|
||||
| `--enable-client-cert-auth` | $ENABLE_CLIENT_CERT_AUTH | Enables TLS client certificate authentication; use `--enable-client-cert-auth=false` to disable it. If enabled, DTR will additionally authenticate users via TLS client certificates. You must also specify the root certificate authorities (CAs) that issued the certificates with `--client-cert-auth-ca`. |
|
||||
| `--enable-pprof` | $DTR_PPROF | Enables pprof profiling of the server. Use `--enable-pprof=false` to disable it. Once DTR is deployed with this flag, you can access the `pprof` endpoint for the api server at `/debug/pprof`, and the registry endpoint at `/registry_debug_pprof/debug/pprof`. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--http-proxy` | $DTR_HTTP_PROXY | The HTTP proxy used for outgoing requests. |
|
||||
| `--https-proxy` | $DTR_HTTPS_PROXY | The HTTPS proxy used for outgoing requests. |
|
||||
| `--log-host` | $LOG_HOST | The syslog system to send logs to.The endpoint to send logs to. Use this flag if you set `--log-protocol` to `tcp` or `udp`. |
|
||||
| `--log-level` | $LOG_LEVEL | Log level for all container logs when logging to syslog. Default: INFO. The supported log levels are debug, info, warn, error, or fatal. |
|
||||
| `--log-protocol` | $LOG_PROTOCOL | The protocol for sending logs. Default is internal. By default, DTR internal components log information using the logger specified in the Docker daemon in the node where the DTR replica is deployed. Use this option to send DTR logs to an external syslog system. The supported values are `tcp`, `udp`, or `internal`. Internal is the default option, stopping DTR from sending logs to an external system. Use this flag with `--log-host`. |
|
||||
| `--nfs-storage-url` | $NFS_STORAGE_URL | Use NFS to store Docker images following this format: `nfs://<ip|hostname>/<mountpoint>`. By default, DTR creates a volume to store the Docker images in the local filesystem of the node where DTR is running, without high availability. To use this flag, you need to install an NFS client library like ***nfs-common*** in the node where you're deploying DTR. You can test this by running `showmount -e <nfs-server>`. When you join new replicas, they will start using NFS so there is no need to specify this flag. To reconfigure DTR to stop using NFS, leave this option empty: `--nfs-storage-url ""`. See [USE NFS](/ee/dtr/admin/configure/external-storage/nfs/) for more details. |
|
||||
| `--nfs-options` | $NFS_OPTIONS | Pass in NFS volume options verbatim for the replica specified in the `--existing-replica-id` option. The NFS configuration must be set with `--nfs-storage-url` explicitly to use this option. Specifying `--nfs-options` will pass in character-for-character the options specified in the argument when creating or recreating the NFS volume. For instance, to use NFS v4 with async, pass in "rw,nfsvers=4,async" as the argument. |
|
||||
| `--no-proxy` | $DTR_NO_PROXY | List of domains the proxy should not be used for. When using `--http-proxy` you can use this flag to specify a list of domains that you don't want to route through the proxy. Format `acme.com[, acme.org]`. |
|
||||
| `--overlay-subnet` | $DTR_OVERLAY_SUBNET | The subnet used by the dtr-ol overlay network. Example: `10.0.0.0/24`. For high-availability, DTR creates an overlay network between UCP nodes. This flag allows you to choose the subnet for that network. Make sure the subnet you choose is not used on any machine where DTR replicas are deployed. |
|
||||
| `--replica-http-port` | $REPLICA_HTTP_PORT | The public HTTP port for the DTR replica. Default is `80`. This allows you to customize the HTTP port where users can reach DTR. Once users access the HTTP port, they are redirected to use an HTTPS connection, using the port specified with `--replica-https-port`. This port can also be used for unencrypted health checks. |
|
||||
| `--replica-https-port` | $REPLICA_HTTPS_PORT | The public HTTPS port for the DTR replica. Default is `443`. This allows you to customize the HTTPS port where users can reach DTR. Each replica can use a different port. |
|
||||
| `--replica-id` | $DTR_INSTALL_REPLICA_ID | Assign a 12-character hexadecimal ID to the DTR replica. Random by default. |
|
||||
| `--replica-rethinkdb-cache-mb` | $RETHINKDB_CACHE_MB | The maximum amount of space in MB for RethinkDB in-memory cache used by the given replica. Default is auto. Auto is `(available_memory - 1024) / 2`. This config allows changing the RethinkDB cache usage per replica. You need to run it once per replica to change each one. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-node` | $UCP_NODE | The hostname of the UCP node to deploy DTR. Random by default. You can find the hostnames of the nodes in the cluster in the UCP web interface, or by running `docker node ls` on a UCP manager node. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
|
|
@ -0,0 +1,45 @@
|
|||
---
|
||||
title: docker/dtr join
|
||||
description: Add a new replica to an existing DTR cluster
|
||||
keywords: dtr, cli, join
|
||||
---
|
||||
|
||||
Add a new replica to an existing DTR cluster. Use SSH to log into any node that is already part of UCP.
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm \
|
||||
docker/dtr:2.6.0 join \
|
||||
--ucp-node <ucp-node-name> \
|
||||
--ucp-insecure-tls
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
This command creates a replica of an existing DTR on a node managed by
|
||||
Docker Universal Control Plane (UCP).
|
||||
|
||||
For setting DTR for high-availability, create 3, 5, or 7 replicas of DTR.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--existing-replica-id` | $DTR_REPLICA_ID | The ID of an existing DTR replica. To add, remove or modify DTR, you must connect to an existing healthy replica's database. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--replica-http-port` | $REPLICA_HTTP_PORT | The public HTTP port for the DTR replica. Default is `80`. This allows you to customize the HTTP port where users can reach DTR. Once users access the HTTP port, they are redirected to use an HTTPS connection, using the port specified with --replica-https-port. This port can also be used for unencrypted health checks. |
|
||||
| `--replica-https-port` | $REPLICA_HTTPS_PORT | The public HTTPS port for the DTR replica. Default is `443`. This allows you to customize the HTTPS port where users can reach DTR. Each replica can use a different port. |
|
||||
| `--replica-id` | $DTR_INSTALL_REPLICA_ID | Assign a 12-character hexadecimal ID to the DTR replica. Random by default. |
|
||||
| `--replica-rethinkdb-cache-mb` | $RETHINKDB_CACHE_MB | The maximum amount of space in MB for RethinkDB in-memory cache used by the given replica. Default is auto. Auto is `(available_memory - 1024) / 2`. This config allows changing the RethinkDB cache usage per replica. You need to run it once per replica to change each one. |
|
||||
| `--skip-network-test` | $DTR_SKIP_NETWORK_TEST | Don't test if overlay networks are working correctly between UCP nodes. For high-availability, DTR creates an overlay network between UCP nodes and tests that it is working when joining replicas. Don't use this option for production deployments. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP.Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-node` | $UCP_NODE | The hostname of the UCP node to deploy DTR. Random by default.You can find the hostnames of the nodes in the cluster in the UCP web interface, or by running `docker node ls` on a UCP manager node. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
| `--unsafe-join` | $DTR_UNSAFE_JOIN | Join a new replica even if the cluster is unhealthy.Joining replicas to an unhealthy DTR cluster leads to split-brain scenarios, and data loss. Don't use this option for production deployments. |
|
||||
|
|
@ -0,0 +1,58 @@
|
|||
---
|
||||
title: docker/dtr reconfigure
|
||||
description: Change DTR configurations
|
||||
keywords: dtr, cli, reconfigure
|
||||
---
|
||||
|
||||
Change DTR configurations.
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
reconfigure [command options]
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command changes DTR configuration settings. If you are using NFS as a storage volume, see [Use NFS](/ee/dtr/admin/configure/external-storage/nfs/) for details on changes to the reconfiguration process.
|
||||
|
||||
DTR is restarted for the new configurations to take effect. To have no down
|
||||
time, configure your DTR for high availability.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--async-nfs` | $ASYNC_NFS | Use async NFS volume options on the replica specified in the `--existing-replica-id` option. The NFS configuration must be set with `--nfs-storage-url` explicitly to use this option. Using `--async-nfs` will bring down any containers on the replica that use the NFS volume, delete the NFS volume, bring it back up with the appropriate configuration, and restart any containers that were brought down. |
|
||||
| `--client-cert-auth-ca ` | $CLIENT_CA | Specify root CA certificates for client authentication with `--client-cert-auth-ca "$(cat ca.pem)"`. |
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs of this bootstrap container (the log level of downstream DTR containers can be set with `--log-level`). |
|
||||
| `--dtr-ca` | $DTR_CA | Use a PEM-encoded TLS CA certificate for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own root CA public certificate with `--dtr-ca "$(cat ca.pem)"`. |
|
||||
| `--dtr-cert` | $DTR_CERT | Use a PEM-encoded TLS certificate for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own public key certificate with `--dtr-cert "$(cat cert.pem)"`. If the certificate has been signed by an intermediate certificate authority, append its public key certificate at the end of the file to establish a chain of trust. |
|
||||
| `--dtr-external-url` | $DTR_EXTERNAL_URL | URL of the host or load balancer clients use to reach DTR. When you use this flag, users are redirected to UCP for logging in. Once authenticated they are redirected to the url you specify in this flag. If you don't use this flag, DTR is deployed without single sign-on with UCP. Users and teams are shared but users login separately into the two applications. You can enable and disable single sign-on in the DTR settings. Format `https://host[:port]`, where port is the value you used with `--replica-https-port`. Since [HSTS (HTTP Strict-Transport-Security) header](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) is included in all API responses, make sure to specify the FQDN (Fully Qualified Domain Name) of your DTR, or your browser may refuse to load the web interface. |
|
||||
| `--dtr-key` | $DTR_KEY | Use a PEM-encoded TLS private key for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own TLS private key with `--dtr-key "$(cat key.pem)"`. |
|
||||
| `--dtr-storage-volume` | $DTR_STORAGE_VOLUME | Customize the volume to store Docker images. By default DTR creates a volume to store the Docker images in the local filesystem of the node where DTR is running, without high-availability. Use this flag to specify a full path or volume name for DTR to store images. For high-availability, make sure all DTR replicas can read and write data on this volume. If you're using NFS, use `--nfs-storage-url` instead. |
|
||||
| `--enable-client-cert-auth` | $ENABLE_CLIENT_CERT_AUTH | Enables TLS client certificate authentication; use `--enable-client-cert-auth=false` to disable it. If enabled, DTR will additionally authenticate users via TLS client certificates. You must also specify the root certificate authorities (CAs) that issued the certificates with `--client-cert-auth-ca`. |
|
||||
| `--enable-pprof` | $DTR_PPROF | Enables pprof profiling of the server. Use `--enable-pprof=false` to disable it. Once DTR is deployed with this flag, you can access the pprof endpoint for the api server at `/debug/pprof`, and the registry endpoint at `/registry_debug_pprof/debug/pprof`. |
|
||||
| `--existing-replica-id` | $DTR_REPLICA_ID | The ID of an existing DTR replica. To add, remove or modify DTR, you must connect to an existing healthy replica's database. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--http-proxy` | $DTR_HTTP_PROXY | The HTTP proxy used for outgoing requests. |
|
||||
| `--https-proxy` | $DTR_HTTPS_PROXY | The HTTPS proxy used for outgoing requests. |
|
||||
| `--log-host` | $LOG_HOST | The syslog system to send logs to. The endpoint to send logs to. Use this flag if you set `--log-protocol` to `tcp` or `udp`. |
|
||||
| `--log-level` | $LOG_LEVEL | Log level for all container logs when logging to syslog. Default: INFO. The supported log levels are `debug`, `info`, `warn`, `error`, or `fatal`. |
|
||||
| `--log-protocol` | $LOG_PROTOCOL | The protocol for sending logs. Default is internal. By default, DTR internal components log information using the logger specified in the Docker daemon in the node where the DTR replica is deployed. Use this option to send DTR logs to an external syslog system. The supported values are `tcp`, `udp`, and `internal`. Internal is the default option, stopping DTR from sending logs to an external system. Use this flag with `--log-host`. |
|
||||
| `--nfs-storage-url` | $NFS_STORAGE_URL | When running DTR 2.5 (with experimental online garbage collection) and 2.6.0-2.6.3, there is an issue with [reconfiguring and restoring DTR with `--nfs-storage-url`](/ee/dtr/release-notes#version-26) which leads to erased tags. Make sure to [back up your DTR metadata](/ee/dtr/admin/disaster-recovery/create-a-backup/#back-up-dtr-metadata) before you proceed. To work around the issue, manually create a storage volume on each DTR node and reconfigure DTR with `--dtr-storage-volume` and your newly-created volume instead. See [Reconfigure Using a Local NFS Volume](https://success.docker.com/article/dtr-26-lost-tags-after-reconfiguring-storage#reconfigureusingalocalnfsvolume) for more details. To reconfigure DTR to stop using NFS, leave this option empty: `--nfs-storage-url ""`. See [USE NFS](/ee/dtr/admin/configure/external-storage/nfs/) for more details. [Upgrade to 2.6.4](/reference/dtr/2.6/cli/upgrade/) and follow [Best practice for data migration in 2.6.4](/ee/dtr/admin/configure/external-storage/storage-backend-migration/#best-practice-for-data-migration) when switching storage backends. |
|
||||
| `--nfs-options` | $NFS_OPTIONS | Pass in NFS volume options verbatim for the replica specified in the `--existing-replica-id` option. The NFS configuration must be set with `--nfs-storage-url` explicitly to use this option. Specifying `--nfs-options` will pass in character-for-character the options specified in the argument when creating or recreating the NFS volume. For instance, to use NFS v4 with async, pass in "rw,nfsvers=4,async" as the argument. |
|
||||
| `--no-proxy` | $DTR_NO_PROXY | List of domains the proxy should not be used for. When using `--http-proxy` you can use this flag to specify a list of domains that you don't want to route through the proxy. Format `acme.com[, acme.org]`. |
|
||||
| `--replica-http-port` | $REPLICA_HTTP_PORT | The public HTTP port for the DTR replica. Default is `80`. This allows you to customize the HTTP port where users can reach DTR. Once users access the HTTP port, they are redirected to use an HTTPS connection, using the port specified with --replica-https-port. This port can also be used for unencrypted health checks. |
|
||||
| `--replica-https-port` | $REPLICA_HTTPS_PORT | The public HTTPS port for the DTR replica. Default is `443`. This allows you to customize the HTTPS port where users can reach DTR. Each replica can use a different port. |
|
||||
| `--replica-rethinkdb-cache-mb` | $RETHINKDB_CACHE_MB | The maximum amount of space in MB for RethinkDB in-memory cache used by the given replica. Default is auto. Auto is `(available_memory - 1024) / 2`. This config allows changing the RethinkDB cache usage per replica. You need to run it once per replica to change each one. |
|
||||
| `--storage-migrated` | $STORAGE_MIGRATED | A flag added in 2.6.4 which lets you indicate the migration status of your storage data. Specify this flag if you are migrating to a new storage backend and have already moved all contents from your old backend to your new one. If not specified, DTR will assume the new backend is empty during a backend storage switch, and consequently destroy your existing tags and related image metadata. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
|
|
@ -0,0 +1,38 @@
|
|||
---
|
||||
title: docker/dtr remove
|
||||
description: Remove a DTR replica from a cluster
|
||||
keywords: dtr, cli, remove
|
||||
---
|
||||
|
||||
Remove a DTR replica from a cluster
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
remove [command options]
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command gracefully scales down your DTR cluster by removing exactly
|
||||
one replica. All other replicas must be healthy and will remain healthy after
|
||||
this operation.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--existing-replica-id` | $DTR_REPLICA_ID | The ID of an existing DTR replica. To add, remove or modify DTR, you must connect to an existing healthy replica's database. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--replica-id` | $DTR_REMOVE_REPLICA_ID | DEPRECATED Alias for `--replica-ids`. |
|
||||
| `--replica-ids` | $DTR_REMOVE_REPLICA_IDS | A comma separated list of IDs of replicas to remove from the cluster. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
|
|
@ -0,0 +1,73 @@
|
|||
---
|
||||
title: docker/dtr restore
|
||||
description: Install and restore DTR from an existing backup
|
||||
keywords: dtr, cli, restore
|
||||
---
|
||||
|
||||
Install and restore DTR from an existing backup
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -i --rm docker/dtr \
|
||||
restore [command options] < backup.tar
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command performs a fresh installation of DTR, and reconfigures it
|
||||
with configuration data from a `tar` file generated by [`docker/dtr backup`](backup.md).
|
||||
If you are restoring DTR after a failure, please make sure you have destroyed the old DTR fully. See
|
||||
[DTR disastery recovery](/ee/dtr/admin/disaster-recovery/) for Docker's recommended recovery strategies
|
||||
based on your setup.
|
||||
|
||||
There are three steps you can take to recover an unhealthy DTR cluster:
|
||||
|
||||
1. If the majority of replicas are healthy, remove the unhealthy nodes from
|
||||
the cluster, and join new nodes for high availability.
|
||||
2. If the majority of replicas are unhealthy, use this command to revert your
|
||||
cluster to a single DTR replica.
|
||||
3. If you can't repair your cluster to a single replica, you'll have to
|
||||
restore from an existing backup, using the `restore` command.
|
||||
|
||||
This command does not restore Docker images. You should implement a separate
|
||||
restore procedure for the Docker images stored in your registry, taking in
|
||||
consideration whether your DTR installation is configured to store images on
|
||||
the local filesystem or using a cloud provider.
|
||||
|
||||
After restoring the cluster, you should use the `join` command to add more
|
||||
DTR replicas for high availability.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--dtr-ca` | $DTR_CA | Use a PEM-encoded TLS CA certificate for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own TLS CA certificate with `--dtr-ca "$(cat ca.pem)"`. |
|
||||
| `--dtr-cert` | $DTR_CERT | Use a PEM-encoded TLS certificate for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own TLS certificate with `--dtr-cert "$(cat ca.pem)"`. |
|
||||
| `--dtr-external-url` | $DTR_EXTERNAL_URL | URL of the host or load balancer clients use to reach DTR. When you use this flag, users are redirected to UCP for logging in. Once authenticated they are redirected to the URL you specify in this flag. If you don't use this flag, DTR is deployed without single sign-on with UCP. Users and teams are shared but users log in separately into the two applications. You can enable and disable single sign-on within your DTR system settings. Format `https://host[:port]`, where port is the value you used with `--replica-https-port`. |
|
||||
| `--dtr-key` | $DTR_KEY | Use a PEM-encoded TLS private key for DTR. By default DTR generates a self-signed TLS certificate during deployment. You can use your own TLS private key with `--dtr-key "$(cat ca.pem)"`. |
|
||||
| `--dtr-storage-volume` | $DTR_STORAGE_VOLUME | Mandatory flag to allow for DTR to fall back to your configured storage setting at the time of backup. If you have previously configured DTR to use a full path or volume name for storage, specify this flag to use the same setting on restore. See [docker/dtr install](install.md) and [docker/dtr reconfigure](reconfigure.md) for usage details. |
|
||||
| `--dtr-use-default-storage` | $DTR_DEFAULT_STORAGE | Mandatory flag to allow for DTR to fall back to your configured storage backend at the time of backup. If cloud storage was configured, then the default storage on restore is cloud storage. Otherwise, local storage is used. With DTR 2.5 (with experimental online garbage collection) and 2.6.0-2.6.3, this flag must be specified in order to keep your DTR metadata. If you encounter an issue with lost tags, see [Restore to Cloud Storage](https://success.docker.com/article/dtr-26-lost-tags-after-reconfiguring-storage#restoretocloudstorage) for Docker's recommended recovery strategy. [Upgrade to 2.6.4](/reference/dtr/2.6/cli/upgrade/) and follow [Best practice for data migration in 2.6.4](/ee/dtr/admin/configure/external-storage/storage-backend-migration/#best-practice-for-data-migration) when switching storage backends. |
|
||||
| `--nfs-storage-url` | $NFS_STORAGE_URL | Mandatory flag to allow for DTR to fall back to your configured storage setting at the time of backup. When running DTR 2.5 (with experimental online garbage collection) and 2.6.0-2.6.3, there is an issue with [reconfiguring and restoring DTR with `--nfs-storage-url`](/ee/dtr/release-notes#version-26) which leads to erased tags. Make sure to [back up your DTR metadata](/ee/dtr/admin/disaster-recovery/create-a-backup/#back-up-dtr-metadata) before you proceed. If NFS was previously configured, you have to manually create a storage volume on each DTR node and specify `--dtr-storage-volume` with the newly-created volume instead. See [Restore to a Local NFS Volume](https://success.docker.com/article/dtr-26-lost-tags-after-reconfiguring-storage#restoretoalocalnfsvolume) for more details. For additional NFS configuration options to support **NFS v4**, see [docker/dtr install](install.md) and [docker/dtr reconfigure](reconfigure.md). [Upgrade to 2.6.4](/reference/dtr/2.6/cli/upgrade/) and follow [Best practice for data migration in 2.6.4](/ee/dtr/admin/configure/external-storage/storage-backend-migration/#best-practice-for-data-migration) when switching storage backends. |
|
||||
| `--enable-pprof` | $DTR_PPROF | Enables pprof profiling of the server. Use `--enable-pprof=false` to disable it. Once DTR is deployed with this flag, you can access the `pprof` endpoint for the api server at `/debug/pprof`, and the registry endpoint at `/registry_debug_pprof/debug/pprof`. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--http-proxy` | $DTR_HTTP_PROXY | The HTTP proxy used for outgoing requests. |
|
||||
| `--https-proxy` | $DTR_HTTPS_PROXY | The HTTPS proxy used for outgoing requests. |
|
||||
| `--log-host` | $LOG_HOST | The syslog system to send logs to.The endpoint to send logs to. Use this flag if you set --log-protocol to tcp or udp. |
|
||||
| `--log-level` | $LOG_LEVEL | Log level for all container logs when logging to syslog. Default: `INFO`. The supported log levels are `debug`, `info`, `warn`, `error`, or `fatal`. |
|
||||
| `--log-protocol` | $LOG_PROTOCOL | The protocol for sending logs. Default is internal.By default, DTR internal components log information using the logger specified in the Docker daemon in the node where the DTR replica is deployed. Use this option to send DTR logs to an external syslog system. The supported values are tcp, udp, and internal. Internal is the default option, stopping DTR from sending logs to an external system. Use this flag with --log-host. |
|
||||
| `--no-proxy` | $DTR_NO_PROXY | List of domains the proxy should not be used for.When using --http-proxy you can use this flag to specify a list of domains that you don't want to route through the proxy. Format acme.com[, acme.org]. |
|
||||
| `--replica-http-port` | $REPLICA_HTTP_PORT | The public HTTP port for the DTR replica. Default is `80`. This allows you to customize the HTTP port where users can reach DTR. Once users access the HTTP port, they are redirected to use an HTTPS connection, using the port specified with `--replica-https-port`. This port can also be used for unencrypted health checks. |
|
||||
| `--replica-https-port` | $REPLICA_HTTPS_PORT | The public HTTPS port for the DTR replica. Default is `443`. This allows you to customize the HTTPS port where users can reach DTR. Each replica can use a different port. |
|
||||
| `--replica-id` | $DTR_INSTALL_REPLICA_ID | Assign a 12-character hexadecimal ID to the DTR replica. Random by default. |
|
||||
| `--replica-rethinkdb-cache-mb` | $RETHINKDB_CACHE_MB | The maximum amount of space in MB for RethinkDB in-memory cache used by the given replica. Default is auto. Auto is `(available_memory - 1024) / 2`. This config allows changing the RethinkDB cache usage per replica. You need to run it once per replica to change each one. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-node` | $UCP_NODE | The hostname of the UCP node to deploy DTR. Random by default. You can find the hostnames of the nodes in the cluster in the UCP web interface, or by running `docker node ls` on a UCP manager node. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
|
|
@ -0,0 +1,34 @@
|
|||
---
|
||||
title: docker/dtr upgrade
|
||||
description: Upgrade DTR 2.5.x cluster to this version
|
||||
keywords: dtr, cli, upgrade
|
||||
---
|
||||
|
||||
Upgrade DTR 2.5.x cluster to this version
|
||||
|
||||
## Usage
|
||||
|
||||
```bash
|
||||
docker run -it --rm docker/dtr \
|
||||
upgrade [command options]
|
||||
```
|
||||
|
||||
## Description
|
||||
|
||||
|
||||
This command upgrades DTR 2.5.x to the current version of this image.
|
||||
|
||||
|
||||
## Options
|
||||
|
||||
| Option | Environment Variable | Description |
|
||||
|:------------------------------|:--------------------------|:-------------------------------------------------------------------------------------|
|
||||
| `--debug` | $DEBUG | Enable debug mode for additional logs. |
|
||||
| `--existing-replica-id` | $DTR_REPLICA_ID | The ID of an existing DTR replica. To add, remove or modify DTR, you must connect to an existing healthy replica's database. |
|
||||
| `--help-extended` | $DTR_EXTENDED_HELP | Display extended help text for a given command. |
|
||||
| `--ucp-ca` | $UCP_CA | Use a PEM-encoded TLS CA certificate for UCP. Download the UCP TLS CA certificate from `https://<ucp-url>/ca`, and use `--ucp-ca "$(cat ca.pem)"`. |
|
||||
| `--ucp-insecure-tls` | $UCP_INSECURE_TLS | Disable TLS verification for UCP. The installation uses TLS but always trusts the TLS certificate used by UCP, which can lead to MITM (man-in-the-middle) attacks. For production deployments, use `--ucp-ca "$(cat ca.pem)"` instead. |
|
||||
| `--ucp-password` | $UCP_PASSWORD | The UCP administrator password. |
|
||||
| `--ucp-url` | $UCP_URL | The UCP URL including domain and port. |
|
||||
| `--ucp-username` | $UCP_USERNAME | The UCP administrator username. |
|
||||
|
Loading…
Reference in New Issue