mirror of https://github.com/knative/docs.git
cherrypick changes from release-0.6 to master (#1422)
* cherry pick pr#1418 * Update README.md to remove dead link (#1397) Removed a dead link on "Picking the Right Solution" which was going to a 404 page. Based off feedback from #1382 for which link to use. * cherry pick pr#1356 * Fix typo (#1360) * pr#1351
This commit is contained in:
parent
15ba346974
commit
7216b39d93
|
@ -121,10 +121,9 @@ the recommended configuration for a cluster is:
|
|||
> [Gloo](./Knative-with-Gloo.md)) will be used, then you can remove the
|
||||
> `--addons` line below.
|
||||
|
||||
> Note: If you want to use [Auto TLS feature](../serving/using-auto-tls.md), you
|
||||
> need to remove the `--addons` line below, and follow the
|
||||
> [instructions](../serving/installing-istio.md) to install Istio with Secret
|
||||
> Discovery Service.
|
||||
> Note: If you want to use [Auto TLS feature](../serving/using-auto-tls.md), you need to remove
|
||||
> the `--addons` line below, and follow the [instructions](installing-istio.md) to install Istio
|
||||
> with Secret Discovery Service.
|
||||
|
||||
```bash
|
||||
gcloud beta container clusters create $CLUSTER_NAME \
|
||||
|
|
|
@ -99,7 +99,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
|
|||
of `knative-ingressgateway`. Then run the following to clean up leftover
|
||||
resources:
|
||||
|
||||
```
|
||||
```shell
|
||||
kubectl delete svc knative-ingressgateway -n istio-system
|
||||
kubectl delete deploy knative-ingressgateway -n istio-system
|
||||
```
|
||||
|
@ -107,7 +107,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
|
|||
If you have the Knative Eventing Sources component installed, you will also
|
||||
need to delete the following resource before upgrading:
|
||||
|
||||
```
|
||||
```shell
|
||||
kubectl delete statefulset/controller-manager -n knative-sources
|
||||
```
|
||||
|
||||
|
@ -119,7 +119,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
|
|||
command once with the `-l knative.dev/crd-install=true` flag. This prevents
|
||||
race conditions during the install, which cause intermittent errors:
|
||||
|
||||
```bash
|
||||
```shell
|
||||
kubectl apply --selector knative.dev/crd-install=true \
|
||||
--filename https://github.com/knative/serving/releases/download/v0.6.0/serving.yaml \
|
||||
--filename https://github.com/knative/build/releases/download/v0.5.0/build.yaml \
|
||||
|
@ -133,7 +133,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
|
|||
`kubectl apply` command again, this time without the `--selector` flag, to
|
||||
complete the install of Knative and its dependencies:
|
||||
|
||||
```bash
|
||||
```shell
|
||||
kubectl apply --filename https://github.com/knative/serving/releases/download/v0.6.0/serving.yaml --selector networking.knative.dev/certificate-provider!=cert-manager \
|
||||
--filename https://github.com/knative/build/releases/download/v0.5.0/build.yaml \
|
||||
--filename https://github.com/knative/eventing/releases/download/v0.5.0/release.yaml \
|
||||
|
@ -143,22 +143,21 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
|
|||
```
|
||||
|
||||
> **Notes**:
|
||||
> - By default, the Knative Serving component installation (`serving.yaml`) includes a controller
|
||||
> for [enabling automatic TLS certificate provisioning](../serving/using-auto-tls.md). If you do
|
||||
> intend on immediately enabling auto certificates in Knative, you can remove the
|
||||
> `--selector networking.knative.dev/certificate-provider!=cert-manager` statement to install the
|
||||
> controller.
|
||||
> Otherwise, you can choose to install the auto certificates feature and controller at a later time.
|
||||
>
|
||||
> - By default, the Knative Serving component installation (`serving.yaml`)
|
||||
> includes a controller for
|
||||
> [enabling automatic TLS certificate provisioning](../serving/using-auto-tls.md).
|
||||
> If you do intend on immediately enabling auto certificates in Knative,
|
||||
> you can remove the
|
||||
> `--selector networking.knative.dev/certificate-provider!=cert-manager`
|
||||
> statement to install the controller. Otherwise, you can choose to install
|
||||
> the auto certificates feature and controller at a later time.
|
||||
>
|
||||
> - For the v0.4.0 release and newer, the `clusterrole.yaml` file is required
|
||||
> to enable the Build and Serving components to interact with each other.
|
||||
> - For the v0.4.0 release and newer, the `clusterrole.yaml` file is
|
||||
> required to enable the Build and Serving components to interact with each
|
||||
> other.
|
||||
|
||||
1. Monitor the Knative components until all of the components show a `STATUS` of
|
||||
`Running`:
|
||||
```bash
|
||||
|
||||
```shell
|
||||
kubectl get pods --namespace knative-serving
|
||||
kubectl get pods --namespace knative-build
|
||||
kubectl get pods --namespace knative-eventing
|
||||
|
|
|
@ -4,7 +4,7 @@ Follow this guide to install Knative components on a platform of your choice.
|
|||
|
||||
To get started with Knative, you need a Kubernetes cluster. If you aren't sure
|
||||
which Kubernetes platform is right for you, see
|
||||
[Picking the Right Solution](https://kubernetes.io/docs/setup/pick-right-solution/).
|
||||
[Picking the Right Solution]( https://kubernetes.io/docs/setup/).
|
||||
|
||||
We provide information for installing Knative on
|
||||
[Google Kubernetes Engine](https://cloud.google.com/kubernetes-engine/docs/),
|
||||
|
|
|
@ -32,7 +32,7 @@ collecting `stdout/stderr` logs from the containers:
|
|||
with the desired output configuration. Knative provides a sample for sending
|
||||
logs to Elasticsearch or Stackdriver. Developers can simply use
|
||||
`100-fluentd-configmap.yaml` or override any with other configuration.
|
||||
2. Replace the `image` field of `fluentd-ds` container of `flunetd-ds` DaemonSet
|
||||
2. Replace the `image` field of `fluentd-ds` container of `fluentd-ds` DaemonSet
|
||||
in
|
||||
[200-fluentd.yaml](https://github.com/knative/serving/blob/master/config/monitoring/logging/elasticsearch/200-fluentd.yaml)
|
||||
with the Fluentd image including the desired Fluentd output plugin. See
|
||||
|
|
|
@ -35,8 +35,7 @@ To enable Knative to automatically provision TLS certificates:
|
|||
kubectl get deployment networking-certmanager -n knative-serving
|
||||
```
|
||||
|
||||
1. If `networking-certmanager` is not found, run the following commands to
|
||||
install it:
|
||||
1. If `networking-certmanager` is not found, run the following commands to install it:
|
||||
|
||||
```shell
|
||||
# KNATIVE_VERSION needs to be 0.6.0 or above.
|
||||
|
@ -52,22 +51,19 @@ To enable Knative to automatically provision TLS certificates:
|
|||
|
||||
1. Create the `ClusterIssuer` file:
|
||||
|
||||
cert-manager reference:
|
||||
Use the cert-manager reference to determine how to configure your `ClusterIssuer` file:
|
||||
|
||||
- See the generic
|
||||
[`ClusterIssuer` example](https://docs.cert-manager.io/en/latest/tasks/issuers/setup-acme.html#creating-a-basic-acme-issuer)
|
||||
- Also see the
|
||||
[`DNS-01` example](https://docs.cert-manager.io/en/latest/tasks/acme/configuring-dns01/index.html)
|
||||
- Also see the [`DNS-01` example](https://docs.cert-manager.io/en/latest/tasks/acme/configuring-dns01/index.html)
|
||||
|
||||
Example Cloud DNS `ClusterIssuer` configuration file:
|
||||
**Example**: Cloud DNS `ClusterIssuer` configuration file:
|
||||
|
||||
If you use the Let's Encrypt CA and Google Cloud DNS, you would create the
|
||||
`letsencrypt-issuer` `ClusterIssuer` file, that includes your Let's
|
||||
Encrypt account info, the required `DNS-01` challenge type, and Cloud DNS
|
||||
provider info.
|
||||
|
||||
See the
|
||||
[complete Google Cloud DNS configuration](./using-cert-manager-on-gcp.md).
|
||||
The following `letsencrypt-issuer` named `ClusterIssuer` file is configured
|
||||
for the Let's Encrypt CA and Google Cloud DNS. Under `spec`, the Let's Encrypt
|
||||
account info, required `DNS-01` challenge type, and Cloud DNS provider
|
||||
info defined. For the complete Google Cloud DNS example, see
|
||||
[Configuring HTTPS with cert-manager and Google Cloud DNS](./using-cert-manager-on-gcp.md).
|
||||
|
||||
```shell
|
||||
apiVersion: certmanager.k8s.io/v1alpha1
|
||||
|
@ -206,16 +202,17 @@ To enable Knative to automatically provision TLS certificates:
|
|||
attribute.
|
||||
|
||||
By default, Knative ingress is configured to serve HTTP traffic
|
||||
(`httpProtocol: Enabled`). Now that your cluster is configured to use TLS
|
||||
certificates and handle HTTPS traffic, you can specify whether or not any
|
||||
HTTP traffic is allowed.
|
||||
(`httpProtocol: Enabled`). Now that your cluster is configured to use
|
||||
TLS certificates and handle HTTPS traffic, you can specify whether or not
|
||||
any HTTP traffic is allowed.
|
||||
|
||||
Supported `httpProtocol` values:
|
||||
|
||||
- `Enabled`: Serve HTTP traffic.
|
||||
- `Disabled`: Rejects all HTTP traffic.
|
||||
- `Redirected`: Responds to HTTP request with a `302` redirect to ask the
|
||||
clients to use HTTPS.
|
||||
- `Redirected`: Responds to HTTP request with a `302` redirect to ask
|
||||
the clients to use HTTPS.
|
||||
|
||||
|
||||
```shell
|
||||
...
|
||||
|
@ -247,6 +244,12 @@ To enable Knative to automatically provision TLS certificates:
|
|||
kubectl get configmap config-network --namespace knative-serving --output yaml
|
||||
```
|
||||
|
||||
1. Ensure that the file was updated successfully:
|
||||
|
||||
```shell
|
||||
kubectl get configmap config-network --namespace knative-serving --output yaml
|
||||
```
|
||||
|
||||
Congratulations! Knative is now configured to obtain and renew TLS certificates.
|
||||
When your TLS certificate is active on your cluster, your Knative services will
|
||||
be able to handle HTTPS traffic.
|
||||
|
|
Loading…
Reference in New Issue