Commit Graph

43322 Commits

Author SHA1 Message Date
Mary Anthony ac31f3a3bf Adding draft to non-GA docs
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:26 -07:00
Vivek Saraswat b54ea917be Update release_notes.md 2016-11-01 17:18:25 -07:00
Vivek Saraswat 6b75a69eeb Update release_notes.md 2016-11-01 17:18:25 -07:00
Vivek Saraswat ca787a9bba Update release_notes.md 2016-11-01 17:18:25 -07:00
Vivek Saraswat f5c79ffd5b Update release_notes.md 2016-11-01 17:18:25 -07:00
Daniel Hiltgen 55436e4818 Support BYO server certs AND user bundles
The original implementation assumed that if you brought your own server
cert, then users certs would be signed by the same CA, but this will
make it quite challenging for large enterprises who would be forced to
manage certs for users, or worse, buy them from the same external CA.
Since the UCP controller already trusts multiple root, there's no reason
we can't add another.

Prior to this change the CA stored next to the server cert was the
"full" trust chain including the root CAs.  With this change, we flip
that around and use the swarm cert CA for the controller.  This is a
tiny bit messy, because we have to be careful not to accidentally wind
up with that CA on the cluster components other than the controller,
so I've enhanced our integration tests to cover this case specifically
and make sure we don't mistakenly open the system up.  In doing so,
I had to refine the integration test so all the servers were signed by
the same CA (the prior code was sloppy and used a fresh CA for each HA
node, which meant the bundles broke on the replica controllers.)

In the future, we'll likely have intermediaries with differnet
privileges/scopes, and may revisit the multiple root CA model, so this
seems like a reasonable compromise to keep the code churn down for now.
2016-11-01 17:18:25 -07:00
Mary Anthony ccf931018d Block out initial organization for GA docs
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:25 -07:00
Patrick Devine 15688ade1c Fix X-Access-Token to Authorization header in the docs 2016-11-01 17:18:25 -07:00
Daniel Hiltgen 0463bb367a 0.8 release notes 2016-11-01 17:18:25 -07:00
kizbitz bb56a6a777 Fix link
Signed-off-by: kizbitz <jerry.baker@docker.com>
2016-11-01 17:18:25 -07:00
kizbitz 9cf7fa25c7 Fix documentation links
Signed-off-by: kizbitz <jerry.baker@docker.com>
2016-11-01 17:18:25 -07:00
Mary Anthony e44f5d8796 Updates for 0.7.0 Release
- Close #194 and fix
- Fix and close #425
- Fix and close #417
- Fix and close #420
- Fix and close #422
- Adding in documentation build scripts
- Fix and close #431
- Fix and close #438, and Fix and close #429
- Work on 441
- Adding in commands reference
- Updating all the options to tables
- Updating per Vivek #498
- Adding vivek's last suggestions

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:24 -07:00
Daniel Hiltgen 7db22de609 Add some more troubleshooting notes for etcd 2016-11-01 17:18:24 -07:00
Daniel Hiltgen 12bc149e6d Update release notes for 0.7
We'll probably have some more to add, but lets get this started with what
we alreaddy know is in the release.
2016-11-01 17:18:24 -07:00
Daniel Hiltgen f18fb912d7 Clean up the internal docs
There was some confusion on where we were going to store internal
docs.  Final decision was ./project so lets move all these over.
2016-11-01 17:18:24 -07:00
Daniel Hiltgen e4c20529ef Add support dump UI
This adds an option in the user pull down to generate a support dump.
While not totally ideal from a UE perspective, we don't really have
a page to do admin tasks, so this'll have to do for now.  With this
we can remove the rather ugly docs we have explaining how to get
support dumps via curl.

Non admin users will get the standard permission denied page, as with
all the other admin-only tasks we have.
2016-11-01 17:18:24 -07:00
Daniel Hiltgen ce3aa538a4 Switch to the docker org
In preparation for 0.7, we'll be switching to
the docker org with open images.  CI builds will
continue to publish to dockerorcadev.
2016-11-01 17:18:24 -07:00
Banjot S Chanana 42b3349a73 Update installation.md
Banjot added some changes to the language around use of SANs. We have to be clear that the SAN can be either a private or public IP, it all depends on what URL they type in their browser to connect to their UCP controller. In most cases, I will expect customers will use private IP addresses or a private IP network they create on AWS. Most will not expose UCP to public IP addresses since UCP is likely not a public-facing service, it's an internal Ops service. Pubic IPs are what allows AWS instances to talk to each other but it's not how most users will configure their IP networking on AWS for a UCP deployment that's internal to their organization.
Enter Evan's comments

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:24 -07:00
Tom Barlow f29322ad53 Allow user to add their own public keys to client bundles
This allows a user to add an existing public key to client bundles, this
is used where the CA is externally managed (e.g. verisign) and we do not
have the authority to sign certs.

Fixes #367

Signed-off-by: Tom Barlow <tomwbarlow@gmail.com>
2016-11-01 17:18:24 -07:00
Matt Bentley f04d21fe3d Update CS engine install instructions; fixes #374
Signed-off-by: Matt Bentley <matt.bentley@docker.com>
2016-11-01 17:18:24 -07:00
Mary Anthony 7532b7adf2 Updating with Vivek's tweaks
Adding in DTR and example fix

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:24 -07:00
Mary Anthony a0a3f93971 Updating with fixes from web release
Updating with comments
Clarifying installation instructions
Entering second round of Dan's comments

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:23 -07:00
Evan Hazlett d7896b4aea updated release notes for 0.6
Signed-off-by: Evan Hazlett <ejhazlett@gmail.com>
2016-11-01 17:18:23 -07:00
Mary Anthony 95151d5755 Updating with metadata for website
Closes #371: Added metadata for web build
Updating with Dan's comments

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:18:15 -07:00
Mary Anthony adddedb78c Updating with Hugo metadata
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:17:16 -07:00
Mary Anthony 8d31b1b8a1 Updating install; Initial docs rearrangement
Creating specs directory; may be moved later
Adding fix for Issue #348
Adding in updates for networking
Updating with Dan's comments: removing old -beta
Updating networking after talking to Madhu
Updated install with HA as optional
Moved HA spec into specs
Did "customer-facing" HA page
Renamed server > controller in docs
Entering comments from reviewers

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:17:07 -07:00
Daniel Hiltgen 0ea66a3990 Clean up auditing/logging
This refines our logging and auditing a bit to make
things easier to search for within kibana (or similar external systems)

See ./docs/logging.md for more details.
2016-11-01 17:16:17 -07:00
Daniel Hiltgen 986c22da72 Expose generalized configuration API
This exposes a generalized configuration API base on dividing the
configuration space up into subsystems.  Within a given subsystem,
the configuration is read/written in one json blob.

This also does some slight tweaks to the logging subsystem based on this
new API structure.
2016-11-01 17:16:07 -07:00
Daniel Hiltgen c056c2a7e5 Add support for remote logging
This wires Orca up to support remote syslog endpoints.
The configuration is driven through the KV store, and
requires manually running curl commands (we can add UI/API
for this later.)

This also lays the foundation for a general watching facility for
configuration.  In a subsequent change I'll update this to address other
global configuration for the daemon.
2016-11-01 17:15:46 -07:00
Daniel Hiltgen 7289052648 Product/image rename
This revamps the product and image names.  After merging this change,
the bootstrapper image will be known as "dockerorca/ucp" since it is the
primary image customers interact with.  The controller will be known as
"dockerorca/ucp-controller" and the corresponding container names are
"ucp" and "ucp-controller".  Once we get closer to GA, we'll move the
images under the "docker" org, so the product name will flow nicely from
that "docker/ucp" for the bootstrapping tool, and "docker/ucp-controller"
for the server image.
2016-11-01 17:15:33 -07:00
Daniel Hiltgen 1d99c6a248 Enable High Availability for Orca
This makes the necessary changes in the Orca server to enable
HA deployments.
2016-11-01 17:15:24 -07:00
Daniel Hiltgen 3410d56fdd Lockdown CA (CFSSL) with mutual TLS
This change re-wires the way we have CFSSL hooked up so
that it requires mutual TLS to access the service.

Instead of using command line arguments, and thus relying on environment
variables from linking, this change also switches to registering the
CAs via KV store entries.

The current CFSSL implementation does not support mutual TLS natively,
so I've leveraged socat and a proxy container (much like we do for
docker) in the interest of expediency.  (so under the covers it's still
a link between cfss and the proxy.) Once upstream supports mutual TLS
(or if we decide to fork/patch it) we can drop the proxy and eliminate
all the links.
2016-11-01 17:15:24 -07:00
Daniel Hiltgen 186cdc2c3e Show how to access the KV store
We may have scenarios where we need to show users how to mitigate problems
by accessing the KV store directly.  This short doc shows how they can
do it with admin bundles.
2016-11-01 17:15:10 -07:00
Mary Anthony 30025d3753 Fixing XXX ref
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Daniel Hiltgen 8ff095c394 Cross-host networking docs
This is still theoretical as the required PRs have not yet merged,
but this is how it *should* work once everything gets merged in.
2016-11-01 17:15:10 -07:00
Mary Anthony 4635c210fe Fixing #193 references to swarm port
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Mary Anthony 40c5be136a Updating with Mixpanel material
Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Mary Anthony 5a347c1cf9 First draft of beta install
Updating with comments. Adding in the graphics
Tweaking image links

Signed-off-by: Mary Anthony <mary@docker.com>
2016-11-01 17:15:10 -07:00
Daniel Hiltgen b6168691bf Remove stale DB volume reference 2016-11-01 17:15:09 -07:00
Daniel Hiltgen c7c03659e9 Use the right slack channel 2016-11-01 17:15:09 -07:00
Daniel Hiltgen f9c6e82749 Document port usage for firewall configuration 2016-11-01 17:15:09 -07:00
Daniel Hiltgen 038144c167 Fix up the integration tests for volumes
This adds an env flag to toggle behavior on copying vs pulling
standard images, as well as fixing paths for volume based deployments.
2016-11-01 17:15:02 -07:00
Daniel Hiltgen 81f0fd6d80 Revamp support dump to be synchronous
It turns out that our support dump logic is *really* fast and compact.
Even on a large node (hundreds of containers and thousands of images)
it runs in ~10 seconds and weighs in at a few hundred K.  Since we're
running all the dumps in parallel, there's really no need for the added
complexity of saving them to a DB.

This change revamps and simplifies the support dump API.  Now you simply
POST to the API endpoint, and it will stream the full zip file containing
all the nodes payloads within.  If a node is unreachable, times out,
or has some other catastrophic problem, the contents for that node will
be an error message instead of the normal tar.gz bundle.

I've tested this with a swarm of multiple nodes, confirmed the dumps
match up to the hosts, and the system handles offline nodes, reporting
an error message within the bundle.  (it does take a long time in the
failure cases due to a bug in swarm that's slated to be fixed in 1.9,
but curl doesn't give up so this still works fine.)
2016-11-01 17:14:15 -07:00
Daniel Hiltgen eaf5211928 Add support for pprof
This likely still needs some tuning/tweaking, but may be helpful
as we start to do more scale/performance testing of the system.
2016-11-01 17:14:14 -07:00
Daniel Hiltgen a717b57327 Add instructions for external certificates 2016-11-01 17:14:14 -07:00
Daniel Hiltgen 7791ef30c1 Add a new quickstart guide 2016-11-01 17:14:14 -07:00
Daniel Hiltgen 2ebc87c3ba Freshen up the install spec
Bring it more-or-less back in sync with the current bootstrapper code.
2016-11-01 17:14:14 -07:00
Daniel Hiltgen 282fe38623 Switch to new cert model
We'll use two isolated root certificates to allow access
control between orca and swarm.
2016-11-01 17:14:14 -07:00
Daniel Hiltgen fbfb3c5a6e Revamp install flow based on conatiner 2016-11-01 17:14:14 -07:00
Daniel Hiltgen 510cd2a74c Remove support for external swarms 2016-11-01 17:14:14 -07:00