You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/kubermatic/main/installation/upgrading/upgrade-from-2.24-to-2.25/_index.en.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ For KKP 2.25 several charts for user cluster MLA (`loki-distributed` and `cortex
34
34
35
35
The default values shipped with KKP have been updated accordingly:
36
36
37
-
-[`values.yaml` for `loki-distributed`](https://github.com/kubermatic/kubermatic/blob/v2.25.0/charts/mla/loki-distributed/values.yaml)
37
+
-[`values.yaml` for `loki-distributed`](https://github.com/kubermatic/kubermatic/blob/v2.25.0/charts/mla/loki-distributed/values.yaml)
38
38
-[`values.yaml` for `cortex`](https://github.com/kubermatic/kubermatic/blob/v2.25.0/charts/mla/cortex/values.yaml)
39
39
40
40
If the `values.yaml` shipped by default in KKP have been copied / modified to be used for passing configuration, the modifications need to be migrated to the new structure before upgrading the user cluster MLA stack. Full upstream values are linked from each default values shipped by KKP.
Copy file name to clipboardExpand all lines: content/kubermatic/main/tutorials-howtos/applications/_index.en.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -7,4 +7,4 @@ weight = 5
7
7
This section provides guides on applications in KKP. For a more details on Applications refer to our [Applications Primer]({{< ref "../../architecture/concept/kkp-concepts/applications/" >}}).
Copy file name to clipboardExpand all lines: content/kubermatic/main/tutorials-howtos/applications/default-enforced-applications/_index.en.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -110,4 +110,4 @@ If `defaultVersion` is specified in the `ApplicationDefinition`, it will be used
110
110
111
111
### Configuring default and enforced applications
112
112
113
-
Applications can be be marked as default and enforced from the admin panel in KKP UI as well as from the APIs directly. For more details refer to the [Applications]({{< ref "../../administration/admin-panel/applications/" >}}) section.
113
+
Applications can be be marked as default and enforced from the admin panel in KKP UI as well as from the APIs directly. For more details refer to the [Applications]({{< ref "../../administration/admin-panel/applications/" >}}) section.
Copy file name to clipboardExpand all lines: content/kubermatic/main/tutorials-howtos/monitoring-logging-alerting/master-seed/installation/_index.en.md
+26-26
Original file line number
Diff line number
Diff line change
@@ -126,32 +126,32 @@ With this file prepared, we can now install all required charts:
Copy file name to clipboardExpand all lines: content/kubermatic/main/tutorials-howtos/storage/disable-csi-driver/_index.en.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -48,4 +48,4 @@ spec:
48
48
disableCsiDriver: true
49
49
```
50
50
51
-
User clusters that already have the CSI driver addon installed can also be updated to disable the CSI driver addon using the `disableCsiDriver: true` option. However, before doing this the cluster admin must ensure that none of the PVCs & PVs that belong to the storage class that has the CSI driver as the provisioner are in use, if there is any PVC that belongs to a storage class that uses the CSI driver KKP will not disable it. If for any reason the admin removes the storage class even if it has PVs that are in use & then disables the CSI driver, it will have an undesired impact on the cluster. Hence, it is expected that the admin is careful while making this change & does not remove the storage class before disabling the CSI driver.
51
+
User clusters that already have the CSI driver addon installed can also be updated to disable the CSI driver addon using the `disableCsiDriver: true` option. However, before doing this the cluster admin must ensure that none of the PVCs & PVs that belong to the storage class that has the CSI driver as the provisioner are in use, if there is any PVC that belongs to a storage class that uses the CSI driver KKP will not disable it. If for any reason the admin removes the storage class even if it has PVs that are in use & then disables the CSI driver, it will have an undesired impact on the cluster. Hence, it is expected that the admin is careful while making this change & does not remove the storage class before disabling the CSI driver.
In case you want to set a custom registry for all addons, you can specify the `-overwrideRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
60
+
In case you want to set a custom registry for all addons, you can specify the `-overwriteRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
61
61
It will set the specified registry on all control plane components & addons.
Copy file name to clipboardExpand all lines: content/kubermatic/v2.12/advanced/oidc_auth/_index.en.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ This is best done by directly changing the entries in the corresponding `values.
78
78
The value for `.Values.kubermatic.auth.issuerCookieKey` can be randomly generated (e.g. `openssl rand -hex 32`) and should have 32 or 64 bytes.
79
79
{{% /notice %}}
80
80
81
-
`kubermatic-controll-manager` must be run with the following flags:
81
+
`kubermatic-controller-manager` must be run with the following flags:
82
82
83
83
```plaintext
84
84
--feature-gates={{ .Values.kubermatic.controller.featureGates }} # must contain "OpenIDAuthPlugin=true"
@@ -96,7 +96,7 @@ You can set it by changing the `kubermatic.ui.config` entry in the `values.yaml`
96
96
97
97
### Root CA Certificates Chain
98
98
99
-
In order to verify OIDC provider's certificate in `kubermatic-controll-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
99
+
In order to verify OIDC provider's certificate in `kubermatic-controller-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
100
100
chain including all intermediary CAs certificates. Note that we expect that all certificates will be PEM encoded.
101
101
102
102
For example if the certificate used by your provider was issued by Let's Encrypt. You can visit [Let's Encrypt](https://letsencrypt.org/certificates) to download the necessary certificates
In case you want to set a custom registry for all addons, you can specify the `-overwrideRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
60
+
In case you want to set a custom registry for all addons, you can specify the `-overwriteRegistry` flag on the `kubermatic-controller-manager` or via the helm setting `kubermatic.controller.overwriteRegistry`.
61
61
It will set the specified registry on all control plane components & addons.
Copy file name to clipboardExpand all lines: content/kubermatic/v2.13/advanced/oidc_auth/_index.en.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ This is best done by directly changing the entries in the corresponding `values.
78
78
The value for `.Values.kubermatic.auth.issuerCookieKey` can be randomly generated (e.g. `openssl rand -hex 32`) and should have 32 or 64 bytes.
79
79
{{% /notice %}}
80
80
81
-
`kubermatic-controll-manager` must be run with the following flags:
81
+
`kubermatic-controller-manager` must be run with the following flags:
82
82
83
83
```plaintext
84
84
--feature-gates={{ .Values.kubermatic.controller.featureGates }} # must contain "OpenIDAuthPlugin=true"
@@ -96,7 +96,7 @@ You can set it by changing the `kubermatic.ui.config` entry in the `values.yaml`
96
96
97
97
### Root CA Certificates Chain
98
98
99
-
In order to verify OIDC provider's certificate in `kubermatic-controll-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
99
+
In order to verify OIDC provider's certificate in `kubermatic-controller-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
100
100
chain including all intermediary CAs certificates. Note that we expect that all certificates will be PEM encoded.
101
101
102
102
For example if the certificate used by your provider was issued by Let's Encrypt. You can visit [Let's Encrypt](https://letsencrypt.org/certificates) to download the necessary certificates
Copy file name to clipboardExpand all lines: content/kubermatic/v2.14/advanced/oidc_auth/_index.en.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ This is best done by directly changing the entries in the corresponding `values.
78
78
The value for `.Values.kubermatic.auth.issuerCookieKey` can be randomly generated (e.g. `openssl rand -hex 32`) and should have 32 or 64 bytes.
79
79
{{% /notice %}}
80
80
81
-
`kubermatic-controll-manager` must be run with the following flags:
81
+
`kubermatic-controller-manager` must be run with the following flags:
82
82
83
83
```plaintext
84
84
--feature-gates={{ .Values.kubermatic.controller.featureGates }} # must contain "OpenIDAuthPlugin=true"
@@ -96,7 +96,7 @@ You can set it by changing the `kubermatic.ui.config` entry in the `values.yaml`
96
96
97
97
### Root CA Certificates Chain
98
98
99
-
In order to verify OIDC provider's certificate in `kubermatic-controll-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
99
+
In order to verify OIDC provider's certificate in `kubermatic-controller-manager` when establishing TLS connection a public root CA certificate is required. Ideally the whole
100
100
chain including all intermediary CAs certificates. Note that we expect that all certificates will be PEM encoded.
101
101
102
102
For example if the certificate used by your provider was issued by Let's Encrypt. You can visit [Let's Encrypt](https://letsencrypt.org/certificates) to download the necessary certificates
You can configure Thanos to store the metrics in any s3 compatible storage as well as many other popular cloud storage solutions.
34
34
35
35
Below yaml snippet uses Azure Blob storage configuration. You can refer to all [supported object storage configurations](https://thanos.io/tip/thanos/storage.md/#supported-clients).
0 commit comments