Commit Graph

43334 Commits

Author SHA1 Message Date
Mary Anthony 7d98b5aa24 Adding an identifier
Updating with the docs fixes
Updating with fixes from docs CI
Fixes missing space, close #904

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:27 -07:00
Mary Anthony 45126882cc Adding an identifier
Updating with the docs fixes
Updating with fixes from docs CI: SVENNNNNNNNN!!!

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:27 -07:00
Joao Fernandes d18a990f1a Add release notes for 0.9 and 1.0
Structured the release notes to make them look cleaner, and
included new release notes for v0.9 and v1.0.

Signed-off-by: Joao Fernandes <joao.fernandes@docker.com>
2016-11-01 17:18:27 -07:00
Mary Anthony 01000d438d * Manage and Monitor Users
* LDAP Settings material
* Closes #651
* Combining work into single branch
* Updating index
* Fixing code examples
* Adding in note from Johnny's feedabck
* Menu positions, HA terms
* Copy edit of users
* Adding deploy an application
* Updating the overview page to include more  text
* Updating with comments from review page
* Updating the constraints and port
* Layout check/fix

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:26 -07:00
Mary Anthony a72a429fc3 Updating with information learned yesterday
Remove image-version flag from install and join
Adding example to uninstall

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:26 -07:00
Joao Fernandes f888cf1260 Document how to monitor and troubleshoot UCP
This closes #650
Signed-off-by: Joao Fernandes <joao.fernandes@docker.com>
2016-11-01 17:18:26 -07:00
Joao Fernandes e97e7ffbea Document UCP architecture and install plan
Documented install plan, included feedback from team.
Signed-off-by: Joao Fernandes <joao.fernandes@docker.com>
2016-11-01 17:18:26 -07:00
Joao Fernandes 23629a4073 Document how to install UCP in production
During the UCP beta we had created a quickstart guide
that included installation prerequisites (like ports that
need to be open), and the installation procedure.

Now we're breaking that information in two different documents.
This makes the information more accessible to someone who just
wants to prepare the installation.
2016-11-01 17:18:26 -07:00
Mary Anthony 6f1c1fc18a Checking build and produce placement
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:26 -07:00
Mary Anthony 32c1b7eec5 Evaluation Quickstart
Fixing merge
Repeating test and updating with NGinx material
Updating with comments

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:26 -07:00
Mary Anthony 552f9c0a7a Closes #430
Few tweaks on check
Update with comments from Dan
Last comments;fix some build breaks
Tighten language add reconfigure info

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:26 -07:00
Mary Anthony ac31f3a3bf Adding draft to non-GA docs
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:26 -07:00
Vivek Saraswat b54ea917be Update release_notes.md 2016-11-01 17:18:25 -07:00
Vivek Saraswat 6b75a69eeb Update release_notes.md 2016-11-01 17:18:25 -07:00
Vivek Saraswat ca787a9bba Update release_notes.md 2016-11-01 17:18:25 -07:00
Vivek Saraswat f5c79ffd5b Update release_notes.md 2016-11-01 17:18:25 -07:00
Daniel Hiltgen 55436e4818 Support BYO server certs AND user bundles
The original implementation assumed that if you brought your own server
cert, then users certs would be signed by the same CA, but this will
make it quite challenging for large enterprises who would be forced to
manage certs for users, or worse, buy them from the same external CA.
Since the UCP controller already trusts multiple root, there's no reason
we can't add another.

Prior to this change the CA stored next to the server cert was the
"full" trust chain including the root CAs.  With this change, we flip
that around and use the swarm cert CA for the controller.  This is a
tiny bit messy, because we have to be careful not to accidentally wind
up with that CA on the cluster components other than the controller,
so I've enhanced our integration tests to cover this case specifically
and make sure we don't mistakenly open the system up.  In doing so,
I had to refine the integration test so all the servers were signed by
the same CA (the prior code was sloppy and used a fresh CA for each HA
node, which meant the bundles broke on the replica controllers.)

In the future, we'll likely have intermediaries with differnet
privileges/scopes, and may revisit the multiple root CA model, so this
seems like a reasonable compromise to keep the code churn down for now.
2016-11-01 17:18:25 -07:00
Mary Anthony ccf931018d Block out initial organization for GA docs
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:25 -07:00
Patrick Devine 15688ade1c Fix X-Access-Token to Authorization header in the docs 2016-11-01 17:18:25 -07:00
Daniel Hiltgen 0463bb367a 0.8 release notes 2016-11-01 17:18:25 -07:00
kizbitz bb56a6a777 Fix link
Signed-off-by: kizbitz <jerry.baker@docker.com>
2016-11-01 17:18:25 -07:00
kizbitz 9cf7fa25c7 Fix documentation links
Signed-off-by: kizbitz <jerry.baker@docker.com>
2016-11-01 17:18:25 -07:00
Mary Anthony e44f5d8796 Updates for 0.7.0 Release
- Close #194 and fix
- Fix and close #425
- Fix and close #417
- Fix and close #420
- Fix and close #422
- Adding in documentation build scripts
- Fix and close #431
- Fix and close #438, and Fix and close #429
- Work on 441
- Adding in commands reference
- Updating all the options to tables
- Updating per Vivek #498
- Adding vivek's last suggestions

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:24 -07:00
Daniel Hiltgen 7db22de609 Add some more troubleshooting notes for etcd 2016-11-01 17:18:24 -07:00
Daniel Hiltgen 12bc149e6d Update release notes for 0.7
We'll probably have some more to add, but lets get this started with what
we alreaddy know is in the release.
2016-11-01 17:18:24 -07:00
Daniel Hiltgen f18fb912d7 Clean up the internal docs
There was some confusion on where we were going to store internal
docs.  Final decision was ./project so lets move all these over.
2016-11-01 17:18:24 -07:00
Daniel Hiltgen e4c20529ef Add support dump UI
This adds an option in the user pull down to generate a support dump.
While not totally ideal from a UE perspective, we don't really have
a page to do admin tasks, so this'll have to do for now.  With this
we can remove the rather ugly docs we have explaining how to get
support dumps via curl.

Non admin users will get the standard permission denied page, as with
all the other admin-only tasks we have.
2016-11-01 17:18:24 -07:00
Daniel Hiltgen ce3aa538a4 Switch to the docker org
In preparation for 0.7, we'll be switching to
the docker org with open images.  CI builds will
continue to publish to dockerorcadev.
2016-11-01 17:18:24 -07:00
Banjot S Chanana 42b3349a73 Update installation.md
Banjot added some changes to the language around use of SANs. We have to be clear that the SAN can be either a private or public IP, it all depends on what URL they type in their browser to connect to their UCP controller. In most cases, I will expect customers will use private IP addresses or a private IP network they create on AWS. Most will not expose UCP to public IP addresses since UCP is likely not a public-facing service, it's an internal Ops service. Pubic IPs are what allows AWS instances to talk to each other but it's not how most users will configure their IP networking on AWS for a UCP deployment that's internal to their organization.
Enter Evan's comments

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:24 -07:00
Tom Barlow f29322ad53 Allow user to add their own public keys to client bundles
This allows a user to add an existing public key to client bundles, this
is used where the CA is externally managed (e.g. verisign) and we do not
have the authority to sign certs.

Fixes #367

Signed-off-by: Tom Barlow <tomwbarlow@gmail.com>
2016-11-01 17:18:24 -07:00
Matt Bentley f04d21fe3d Update CS engine install instructions; fixes #374
Signed-off-by: Matt Bentley <matt.bentley@docker.com>
2016-11-01 17:18:24 -07:00
Mary Anthony 7532b7adf2 Updating with Vivek's tweaks
Adding in DTR and example fix

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:24 -07:00
Mary Anthony a0a3f93971 Updating with fixes from web release
Updating with comments
Clarifying installation instructions
Entering second round of Dan's comments

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:23 -07:00
Evan Hazlett d7896b4aea updated release notes for 0.6
Signed-off-by: Evan Hazlett <ejhazlett@gmail.com>
2016-11-01 17:18:23 -07:00
Mary Anthony 95151d5755 Updating with metadata for website
Closes #371: Added metadata for web build
Updating with Dan's comments

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:15 -07:00
Mary Anthony adddedb78c Updating with Hugo metadata
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:17:16 -07:00
Mary Anthony 8d31b1b8a1 Updating install; Initial docs rearrangement
Creating specs directory; may be moved later
Adding fix for Issue #348
Adding in updates for networking
Updating with Dan's comments: removing old -beta
Updating networking after talking to Madhu
Updated install with HA as optional
Moved HA spec into specs
Did "customer-facing" HA page
Renamed server > controller in docs
Entering comments from reviewers

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:17:07 -07:00
Daniel Hiltgen 0ea66a3990 Clean up auditing/logging
This refines our logging and auditing a bit to make
things easier to search for within kibana (or similar external systems)

See ./docs/logging.md for more details.
2016-11-01 17:16:17 -07:00
Daniel Hiltgen 986c22da72 Expose generalized configuration API
This exposes a generalized configuration API base on dividing the
configuration space up into subsystems.  Within a given subsystem,
the configuration is read/written in one json blob.

This also does some slight tweaks to the logging subsystem based on this
new API structure.
2016-11-01 17:16:07 -07:00
Daniel Hiltgen c056c2a7e5 Add support for remote logging
This wires Orca up to support remote syslog endpoints.
The configuration is driven through the KV store, and
requires manually running curl commands (we can add UI/API
for this later.)

This also lays the foundation for a general watching facility for
configuration.  In a subsequent change I'll update this to address other
global configuration for the daemon.
2016-11-01 17:15:46 -07:00
Daniel Hiltgen 7289052648 Product/image rename
This revamps the product and image names.  After merging this change,
the bootstrapper image will be known as "dockerorca/ucp" since it is the
primary image customers interact with.  The controller will be known as
"dockerorca/ucp-controller" and the corresponding container names are
"ucp" and "ucp-controller".  Once we get closer to GA, we'll move the
images under the "docker" org, so the product name will flow nicely from
that "docker/ucp" for the bootstrapping tool, and "docker/ucp-controller"
for the server image.
2016-11-01 17:15:33 -07:00
Daniel Hiltgen 1d99c6a248 Enable High Availability for Orca
This makes the necessary changes in the Orca server to enable
HA deployments.
2016-11-01 17:15:24 -07:00
Daniel Hiltgen 3410d56fdd Lockdown CA (CFSSL) with mutual TLS
This change re-wires the way we have CFSSL hooked up so
that it requires mutual TLS to access the service.

Instead of using command line arguments, and thus relying on environment
variables from linking, this change also switches to registering the
CAs via KV store entries.

The current CFSSL implementation does not support mutual TLS natively,
so I've leveraged socat and a proxy container (much like we do for
docker) in the interest of expediency.  (so under the covers it's still
a link between cfss and the proxy.) Once upstream supports mutual TLS
(or if we decide to fork/patch it) we can drop the proxy and eliminate
all the links.
2016-11-01 17:15:24 -07:00
Daniel Hiltgen 186cdc2c3e Show how to access the KV store
We may have scenarios where we need to show users how to mitigate problems
by accessing the KV store directly.  This short doc shows how they can
do it with admin bundles.
2016-11-01 17:15:10 -07:00
Mary Anthony 30025d3753 Fixing XXX ref
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Daniel Hiltgen 8ff095c394 Cross-host networking docs
This is still theoretical as the required PRs have not yet merged,
but this is how it *should* work once everything gets merged in.
2016-11-01 17:15:10 -07:00
Mary Anthony 4635c210fe Fixing #193 references to swarm port
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Mary Anthony 40c5be136a Updating with Mixpanel material
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Mary Anthony 5a347c1cf9 First draft of beta install
Updating with comments. Adding in the graphics
Tweaking image links

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Daniel Hiltgen b6168691bf Remove stale DB volume reference 2016-11-01 17:15:09 -07:00