You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Makes more sense than suggesting people 'upgrade' to an ancient release that doesn't have downgrade protection
Signed-off-by: Brad Davidson <[email protected]>
Copy file name to clipboardExpand all lines: docs/upgrades/automated.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ For this reason, it is recommended you create at least two plans: a plan for upg
49
49
You can create additional plans as needed to control the rollout of the upgrade across nodes.
50
50
Once the plans are created, the controller will pick them up and begin to upgrade your cluster.
51
51
52
-
The following two example plans will upgrade your cluster to K3s v1.24.6+k3s1:
52
+
The following two example plans will continuously keep your your cluster upgraded to the current stable release, by targeting the stable [release channel](manual.md#release-channels):
There are a few important things to call out regarding these plans:
100
100
101
101
1. The plans must be created in the same namespace where the controller was deployed.
102
102
2. The `concurrency` field indicates how many nodes can be upgraded at the same time.
103
103
3. The server-plan targets server nodes by specifying a label selector that selects nodes with the `node-role.kubernetes.io/control-plane` label. The agent-plan targets agent nodes by specifying a label selector that select nodes without that label.
104
-
4. The `prepare` step in the agent-plan will cause upgrade jobs for that plan to wait for the server-plan to complete before they execute. This logic is built into the image run for the prepare step, and is not part of system-upgrade-controller itself.
105
-
5. Both plans have the `version` field set to v1.24.6+k3s1. Alternatively, you can omit the `version` field and set the `channel` field to a URL that resolves to a release of K3s. This will cause the controller to monitor that URL and upgrade the cluster any time it resolves to a new release. This works well with the [release channels](manual.md#release-channels). Thus, you can configure your plans with the following channel to ensure your cluster is always automatically upgraded to the newest stable release of K3s:
104
+
4. The `prepare` step in the agent-plan will cause upgrade jobs for that plan to wait for the server-plan to complete before they execute. This logic is built into the image used for the prepare step, and is not part of system-upgrade-controller itself.
105
+
5. Both plans have the `channel` field set to the stable release channelURL. This will cause the controller to monitor that URL and upgrade the cluster any time it resolves to a new release. This works well with the [release channels](manual.md#release-channels). Thus, you can configure your plans with the following channel to ensure your cluster is always automatically upgraded to the newest stable release of K3s. Alternatively, you can omit the `channel` field and set the `version` field to a specific release of K3s:
The upgrade will begin as soon as the controller detects the target version for a plan has been resolved, either from the version field, or by polling the channel server.
Copy file name to clipboardExpand all lines: docs/upgrades/manual.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ Upgrades performed via the installation script or using our [automated upgrades]
14
14
15
15
| Channel | Description |
16
16
|----------------|---------|
17
-
| stable | (Default) Stable is recommended for production environments. These releases have been through a period of community hardening. |
18
-
| latest | Latest is recommended for trying out the latest features. These releases have not yet been through a period of community hardening. |
19
-
| v1.26 (example)| There is a release channel tied to each Kubernetes minor version, including versions that are end-of-life. These channels will select the latest patch available, not necessarily a stable release. |
17
+
| stable | (Default) Stable is recommended for production environments. These releases have been through a period of community testing. |
18
+
| latest | Latest always points at the highest non-prerelease version available, as determined by semver ordering rules. These releases have not yet been through a period of community testing. |
19
+
| v1.33 (example)| There is a release channel tied to each Kubernetes minor version, including versions that are end-of-life. These channels will select the latest release available for that minor version, not necessarily a stable release. |
20
20
21
21
For an exhaustive and up-to-date list of channels, you can visit the [k3s channel service API](https://update.k3s.io/v1-release/channels). For more technical details on how channels work, you see the [channelserver project](https://github.com/rancher/channelserver).
0 commit comments