cherrypick changes from release-0.6 to master (#1422)

* cherry pick pr#1418

* Update README.md to remove dead link (#1397)

Removed a dead link on "Picking the Right Solution" which was going to a 404 page. Based off feedback from #1382 for which link to use.

* cherry pick pr#1356

* Fix typo (#1360)

* pr#1351
This commit is contained in:
RichieEscarez 2019-06-05 20:30:39 -07:00 committed by Knative Prow Robot
parent 15ba346974
commit 7216b39d93
5 changed files with 211 additions and 210 deletions

View File

@ -121,10 +121,9 @@ the recommended configuration for a cluster is:
> [Gloo](./Knative-with-Gloo.md)) will be used, then you can remove the
> `--addons` line below.
> Note: If you want to use [Auto TLS feature](../serving/using-auto-tls.md), you
> need to remove the `--addons` line below, and follow the
> [instructions](../serving/installing-istio.md) to install Istio with Secret
> Discovery Service.
> Note: If you want to use [Auto TLS feature](../serving/using-auto-tls.md), you need to remove
> the `--addons` line below, and follow the [instructions](installing-istio.md) to install Istio
> with Secret Discovery Service.
```bash
gcloud beta container clusters create $CLUSTER_NAME \

View File

@ -99,7 +99,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
of `knative-ingressgateway`. Then run the following to clean up leftover
resources:
```
```shell
kubectl delete svc knative-ingressgateway -n istio-system
kubectl delete deploy knative-ingressgateway -n istio-system
```
@ -107,7 +107,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
If you have the Knative Eventing Sources component installed, you will also
need to delete the following resource before upgrading:
```
```shell
kubectl delete statefulset/controller-manager -n knative-sources
```
@ -119,7 +119,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
command once with the `-l knative.dev/crd-install=true` flag. This prevents
race conditions during the install, which cause intermittent errors:
```bash
```shell
kubectl apply --selector knative.dev/crd-install=true \
--filename https://github.com/knative/serving/releases/download/v0.6.0/serving.yaml \
--filename https://github.com/knative/build/releases/download/v0.5.0/build.yaml \
@ -133,7 +133,7 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
`kubectl apply` command again, this time without the `--selector` flag, to
complete the install of Knative and its dependencies:
```bash
```shell
kubectl apply --filename https://github.com/knative/serving/releases/download/v0.6.0/serving.yaml --selector networking.knative.dev/certificate-provider!=cert-manager \
--filename https://github.com/knative/build/releases/download/v0.5.0/build.yaml \
--filename https://github.com/knative/eventing/releases/download/v0.5.0/release.yaml \
@ -143,22 +143,21 @@ see [Performing a Custom Knative Installation](./Knative-custom-install.md).
```
> **Notes**:
> - By default, the Knative Serving component installation (`serving.yaml`) includes a controller
> for [enabling automatic TLS certificate provisioning](../serving/using-auto-tls.md). If you do
> intend on immediately enabling auto certificates in Knative, you can remove the
> `--selector networking.knative.dev/certificate-provider!=cert-manager` statement to install the
> controller.
> Otherwise, you can choose to install the auto certificates feature and controller at a later time.
>
> - By default, the Knative Serving component installation (`serving.yaml`)
> includes a controller for
> [enabling automatic TLS certificate provisioning](../serving/using-auto-tls.md).
> If you do intend on immediately enabling auto certificates in Knative,
> you can remove the
> `--selector networking.knative.dev/certificate-provider!=cert-manager`
> statement to install the controller. Otherwise, you can choose to install
> the auto certificates feature and controller at a later time.
>
> - For the v0.4.0 release and newer, the `clusterrole.yaml` file is required
> to enable the Build and Serving components to interact with each other.
> - For the v0.4.0 release and newer, the `clusterrole.yaml` file is
> required to enable the Build and Serving components to interact with each
> other.
1. Monitor the Knative components until all of the components show a `STATUS` of
`Running`:
```bash
```shell
kubectl get pods --namespace knative-serving
kubectl get pods --namespace knative-build
kubectl get pods --namespace knative-eventing

View File

@ -4,7 +4,7 @@ Follow this guide to install Knative components on a platform of your choice.
To get started with Knative, you need a Kubernetes cluster. If you aren't sure
which Kubernetes platform is right for you, see
[Picking the Right Solution](https://kubernetes.io/docs/setup/pick-right-solution/).
[Picking the Right Solution]( https://kubernetes.io/docs/setup/).
We provide information for installing Knative on
[Google Kubernetes Engine](https://cloud.google.com/kubernetes-engine/docs/),

View File

@ -32,7 +32,7 @@ collecting `stdout/stderr` logs from the containers:
with the desired output configuration. Knative provides a sample for sending
logs to Elasticsearch or Stackdriver. Developers can simply use
`100-fluentd-configmap.yaml` or override any with other configuration.
2. Replace the `image` field of `fluentd-ds` container of `flunetd-ds` DaemonSet
2. Replace the `image` field of `fluentd-ds` container of `fluentd-ds` DaemonSet
in
[200-fluentd.yaml](https://github.com/knative/serving/blob/master/config/monitoring/logging/elasticsearch/200-fluentd.yaml)
with the Fluentd image including the desired Fluentd output plugin. See

View File

@ -35,8 +35,7 @@ To enable Knative to automatically provision TLS certificates:
kubectl get deployment networking-certmanager -n knative-serving
```
1. If `networking-certmanager` is not found, run the following commands to
install it:
1. If `networking-certmanager` is not found, run the following commands to install it:
```shell
# KNATIVE_VERSION needs to be 0.6.0 or above.
@ -52,22 +51,19 @@ To enable Knative to automatically provision TLS certificates:
1. Create the `ClusterIssuer` file:
cert-manager reference:
Use the cert-manager reference to determine how to configure your `ClusterIssuer` file:
- See the generic
[`ClusterIssuer` example](https://docs.cert-manager.io/en/latest/tasks/issuers/setup-acme.html#creating-a-basic-acme-issuer)
- Also see the
[`DNS-01` example](https://docs.cert-manager.io/en/latest/tasks/acme/configuring-dns01/index.html)
- Also see the [`DNS-01` example](https://docs.cert-manager.io/en/latest/tasks/acme/configuring-dns01/index.html)
Example Cloud DNS `ClusterIssuer` configuration file:
**Example**: Cloud DNS `ClusterIssuer` configuration file:
If you use the Let's Encrypt CA and Google Cloud DNS, you would create the
`letsencrypt-issuer` `ClusterIssuer` file, that includes your Let's
Encrypt account info, the required `DNS-01` challenge type, and Cloud DNS
provider info.
See the
[complete Google Cloud DNS configuration](./using-cert-manager-on-gcp.md).
The following `letsencrypt-issuer` named `ClusterIssuer` file is configured
for the Let's Encrypt CA and Google Cloud DNS. Under `spec`, the Let's Encrypt
account info, required `DNS-01` challenge type, and Cloud DNS provider
info defined. For the complete Google Cloud DNS example, see
[Configuring HTTPS with cert-manager and Google Cloud DNS](./using-cert-manager-on-gcp.md).
```shell
apiVersion: certmanager.k8s.io/v1alpha1
@ -206,16 +202,17 @@ To enable Knative to automatically provision TLS certificates:
attribute.
By default, Knative ingress is configured to serve HTTP traffic
(`httpProtocol: Enabled`). Now that your cluster is configured to use TLS
certificates and handle HTTPS traffic, you can specify whether or not any
HTTP traffic is allowed.
(`httpProtocol: Enabled`). Now that your cluster is configured to use
TLS certificates and handle HTTPS traffic, you can specify whether or not
any HTTP traffic is allowed.
Supported `httpProtocol` values:
- `Enabled`: Serve HTTP traffic.
- `Disabled`: Rejects all HTTP traffic.
- `Redirected`: Responds to HTTP request with a `302` redirect to ask the
clients to use HTTPS.
- `Redirected`: Responds to HTTP request with a `302` redirect to ask
the clients to use HTTPS.
```shell
...
@ -247,6 +244,12 @@ To enable Knative to automatically provision TLS certificates:
kubectl get configmap config-network --namespace knative-serving --output yaml
```
1. Ensure that the file was updated successfully:
```shell
kubectl get configmap config-network --namespace knative-serving --output yaml
```
Congratulations! Knative is now configured to obtain and renew TLS certificates.
When your TLS certificate is active on your cluster, your Knative services will
be able to handle HTTPS traffic.