You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/os/v1.x/en/about/running-rancher-on-rancherOS/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ rancher:
37
37
```
38
38
<br>
39
39
40
-
> **Note:** You can not name the service `rancher-agent` as this will not allow the rancher/agent container to be launched correctly. Please read more about why [you can't name your container as `rancher-agent`](https://rancher.com/docs/rancher/v1.6/en/faqs/agents/#adding-in-name-rancher-agent).
40
+
> **Note:** You can not name the service `rancher-agent` as this will not allow the rancher/agent container to be launched correctly. Please read more about why [you can't name your container as `rancher-agent`]({{< baseurl >}}/rancher/v1.6/en/faqs/agents/#adding-in-name-rancher-agent).
Copy file name to clipboardExpand all lines: content/rancher/v2.x/en/admin-settings/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,6 @@ For more information how to create and use PSPs, see [Pod Security Policies]({{<
38
38
39
39
## Provisioning Drivers
40
40
41
-
Drivers in Rancher allow you to manage which providers can be used to provision [hosted Kubernetes clusters]({{< baseurl >}}rancher/v2.x/en/cluster-provisioning/hosted-kubernetes-clusters/) or [nodes in an infrastructure provider]({{< baseurl >}}rancher/v2.x/en/cluster-provisioning/rke-clusters/node-pools/) to allow Rancher to deploy and manage Kubernetes.
41
+
Drivers in Rancher allow you to manage which providers can be used to provision [hosted Kubernetes clusters]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/hosted-kubernetes-clusters/) or [nodes in an infrastructure provider]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/rke-clusters/node-pools/) to allow Rancher to deploy and manage Kubernetes.
42
42
43
43
For more information, see [Provisioning Drivers]({{< baseurl >}}/rancher/v2.x/en/admin-settings/drivers/).
Copy file name to clipboardExpand all lines: content/rancher/v2.x/en/admin-settings/authentication/azure-ad/_index.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,12 +122,10 @@ To use Azure AD with Rancher you must whitelist Rancher with Azure. You can comp
122
122
1. From the **Reply URLs** blade, enter the URL of your Rancher Server, appended with the verification path: `<MY_RANCHER_URL>/verify-auth-azure`.
123
123
124
124
>**Tip:** You can find your personalized Azure reply URL in Rancher on the Azure AD Authentication page (Global View > Security Authentication > Azure AD).
>**Note:** It can take up to five minutes for this change to take affect, so don't be alarmed if you can't authenticate immediately after Azure AD configuration.
133
131
@@ -173,19 +171,19 @@ As your final step in Azure, copy the data that you'll use to configure Rancher
173
171
174
172
From the Rancher UI, enter information about your AD instance hosted in Azure to complete configuration.
175
173
176
-
Enter the values that you copied to your [text file](#tip).
174
+
Enter the values that you copied to your [text file]({{< baseurl >}}/rancher/v2.x/en/admin-settings/authentication/azure-ad/#tip).
177
175
178
176
1. Log into Rancher. From the **Global** view, select **Security > Authentication**.
179
177
180
178
1. Select **Azure AD**.
181
179
182
-
1. Complete the **Configure Azure AD Account** form using the information you copied while completing [Copy Azure Application Data](#4-copy-azure-application-data).
180
+
1. Complete the **Configure Azure AD Account** form using the information you copied while completing [Copy Azure Application Data](#5-copy-azure-application-data).
183
181
184
182
>**Important:** When entering your Graph Endpoint, remove the tenant ID from the URL, like below.
Copy file name to clipboardExpand all lines: content/rancher/v2.x/en/cluster-provisioning/custom-clusters/agent-options/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Rancher deploys an agent on each node to communicate with the node. This pages d
36
36
37
37
### Dynamic IP address options
38
38
39
-
For automation purposes, you can't have a specific IP address in a command as it has to be generic to be used for every node. For this, we have dynamic IP address options. They are used as a value to the existing [IP address options](#ip-address-options). This is supported for `--address` and `--internal-address`.
39
+
For automation purposes, you can't have a specific IP address in a command as it has to be generic to be used for every node. For this, we have dynamic IP address options. They are used as a value to the existing IP address options. This is supported for `--address` and `--internal-address`.
Copy file name to clipboardExpand all lines: content/rancher/v2.x/en/cluster-provisioning/hosted-kubernetes-clusters/eks/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Use Rancher to set up and configure your Kubernetes cluster.
24
24
25
25
1. {{< step_create-cluster_member-roles >}}
26
26
27
-
1. Configure **Account Access** for the EKS cluster. Complete each drop-down and field using the information obtained in [2. Create Access Key and Secret Key](#2-create-access-key-and-secret-key).
27
+
1. Configure **Account Access** for the EKS cluster. Complete each drop-down and field using the information obtained in [2. Create Access Key and Secret Key](#prerequisites-in-amazon-web-services).
Copy file name to clipboardExpand all lines: content/rancher/v2.x/en/cluster-provisioning/rke-clusters/node-pools/ec2/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Use {{< product >}} to create a Kubernetes cluster in Amazon EC2.
34
34
35
35
1. Complete each of the following forms using information available from the [EC2 Management Console](https://aws.amazon.com/ec2).
36
36
37
-
- **Account Access** is where you configure the region of the nodes, and the credentials (Access Key and Secret Key) used to create the machine. See [Prerequisistes](#prerequisistes) how to create the Access Key and Secret Key and the needed permissions.
37
+
- **Account Access** is where you configure the region of the nodes, and the credentials (Access Key and Secret Key) used to create the machine. See [Prerequisistes](#prerequisites) how to create the Access Key and Secret Key and the needed permissions.
Copy file name to clipboardExpand all lines: content/rancher/v2.x/en/cluster-provisioning/rke-clusters/windows-clusters/_index.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ This guide walks you through create of a custom cluster that includes 3 nodes: a
15
15
16
16
>**Notes:**
17
17
>
18
-
>- For a summary of Kubernetes features supported in Windows, see [Using Windows Server Containers in Kubernetes](https://kubernetes.io/docs/getting-started-guides/windows/#supported-features).
18
+
>- For a summary of Kubernetes features supported in Windows, see [Using Windows in Kubernetes](https://kubernetes.io/docs/setup/windows/intro-windows-in-kubernetes/).
19
19
>- Windows containers must run on Windows Server 1803 nodes. Windows Server 1709 and earlier versions do not support Kubernetes properly.
20
20
>- Containers built for Windows Server 1709 or earlier do not run on Windows Server 1803. You must build containers on Windows Server 1803 to run these containers on Windows Server 1803.
21
21
@@ -28,12 +28,11 @@ When setting up a custom cluster with support for Windows nodes and containers,
28
28
<!-- TOC -->
29
29
30
30
-[1. Provision Hosts](#1-provision-hosts)
31
-
-[2. Cloud-host VM Networking Configuration](#2-cloud-host-vm-networking-configuration)
31
+
-[2. Cloud-host VM Networking Configuration](#2-cloud-hosted-vm-networking-configuration)
32
32
-[3. Create the Custom Cluster](#3-create-the-custom-cluster)
33
33
-[4. Add Linux Host for Ingress Support](#4-add-linux-host-for-ingress-support)
34
34
-[5. Adding Windows Workers](#5-adding-windows-workers)
35
-
-[6. Cloud-host VM Routes Configuration](#6-cloud-host-vm-routes-configuration)
36
-
-[Troubleshooting](#troubleshooting)
35
+
-[6. Cloud-host VM Routes Configuration](#6-cloud-hosted-vm-routes-configuration)
37
36
38
37
<!-- /TOC -->
39
38
@@ -43,14 +42,14 @@ To begin provisioning a custom cluster with Windows support, prepare your host s
43
42
44
43
- Cloud-hosted VMs
45
44
- VMs from virtualization clusters
46
-
- Bare-metal servers
45
+
- Bare-metal servers
47
46
48
47
The table below lists the [Kubernetes roles]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/#kubernetes-cluster-node-components) you'll assign to each host, although you won't enable these roles until further along in the configuration process—we're just informing you of each node's purpose. The first node, a Linux host, is primarily responsible for managing the Kubernetes control plane, although, in this use case, we're installing all three roles on this node. Node 2 is also a Linux worker, which is responsible for Ingress support. Finally, the third node is your Windows worker, which will run your Windows applications.
49
48
50
49
Node | Operating System | Future Cluster Role(s)
51
50
--------|------------------|------
52
51
Node 1 | Linux (Ubuntu Server 16.04 recommended) | [Control Plane]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/#control-plane-nodes), [etcd]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/#etcd), [Worker]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/#worker-nodes)
53
-
Node 2 | Linux (Ubuntu Server 16.04 recommended) | [Worker]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/#worker-nodes) (This node is used for Ingress support)
52
+
Node 2 | Linux (Ubuntu Server 16.04 recommended) | [Worker]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/#worker-nodes) (This node is used for Ingress support)
54
53
Node 3 | Windows (*Windows Server 1803 required*) | [Worker]({{< baseurl >}}/rancher/v2.x/en/cluster-provisioning/#worker-nodes)
55
54
56
55
### Requirements
@@ -115,7 +114,7 @@ After the initial provisioning of your custom cluster, your cluster only has a s
115
114
116
115
1. Using the content menu, open the custom cluster your created in [2. Create the Custom Cluster](#2-create-the-custom-cluster).
117
116
118
-
1. From the main menu, select **Nodes**.
117
+
1. From the main menu, select **Nodes**.
119
118
120
119
1. Click **Edit Cluster**.
121
120
@@ -127,15 +126,15 @@ After the initial provisioning of your custom cluster, your cluster only has a s
127
126
128
127
1. Log in to your Linux host using a remote Terminal connection. Run the command copied to your clipboard.
129
128
130
-
1. From **Rancher**, click **Save**.
129
+
1. From **Rancher**, click **Save**.
131
130
132
131
**Result:** The worker role is installed on your Linux host, and the node registers with Rancher.
133
132
134
133
## 5. Adding Windows Workers
135
134
136
135
You can add Windows hosts to a custom cluster by editing the cluster and choosing the **Windows** option.
137
136
138
-
1. From the main menu, select **Nodes**.
137
+
1. From the main menu, select **Nodes**.
139
138
140
139
1. Click **Edit Cluster**.
141
140
@@ -147,7 +146,7 @@ You can add Windows hosts to a custom cluster by editing the cluster and choosin
147
146
148
147
1. Log in to your Windows host using your preferred tool, such as [Microsoft Remote Desktop](https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/remote-desktop-clients). Run the command copied to your clipboard in the **Command Prompt (CMD)**.
149
148
150
-
1. From Rancher, click **Save**.
149
+
1. From Rancher, click **Save**.
151
150
152
151
1.**Optional:** Repeat these instruction if you want to add more Windows nodes to your cluster.
153
152
@@ -157,11 +156,11 @@ You can add Windows hosts to a custom cluster by editing the cluster and choosin
157
156
158
157
In Windows clusters, containers communicate with each other using the `host-gw` mode of Flannel. In `host-gw` mode, all containers on the same node belong to a private subnet, and traffic routes from a subnet on one node to a subnet on another node through the host network.
159
158
160
-
- When worker nodes are provisioned on AWS, virtualization clusters, or bare metal servers, make sure they belong to the same layer 2 subnet. If the nodes don't belong to the same layer 2 subnet, `host-gw` networking will not work. Please contact [Rancher support](https://rancher.com/support/) if your worker nodes on AWS, virtualization clusters, or bare metal servers don't belong to the same layer 2 network.
159
+
- When worker nodes are provisioned on AWS, virtualization clusters, or bare metal servers, make sure they belong to the same layer 2 subnet. If the nodes don't belong to the same layer 2 subnet, `host-gw` networking will not work.
161
160
162
161
- When worker nodes are provisioned on GCE or Azure, they are not on the same layer 2 subnet. Nodes on GCE and Azure belong to a routable layer 3 network. Follow the instructions below to configure GCE and Azure so that the cloud network knows how to route the host subnets on each node.
163
162
164
-
To configure host subnet routing on GCE or Azure, first run the following command to find out the host subnets on each worker node:
163
+
To configure host subnet routing on GCE or Azure, first run the following command to find out the host subnets on each worker node:
165
164
166
165
```bash
167
166
kubectl get nodes -o custom-columns=nodeName:.metadata.name,nodeIP:status.addresses[0].address,routeDestination:.spec.podCIDR
@@ -176,4 +175,3 @@ Azure VM | For Azure, create a routing table: [Custom Routes: User-defined](http
0 commit comments