You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Feb 12, 2021. It is now read-only.
Copy file name to clipboardexpand all lines: etcd/etcd-live-cluster-reconfiguration.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ This document describes the reconfiguration or recovery of an etcd cluster runni
6
6
7
7
When [a Container Linux Config][cl-configs] is used to configure an etcd member on a Container Linux node, it compiles a special `/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf`[drop-in unit file][drop-in]. That is, the Container Linux Config below:
@@ -76,7 +76,7 @@ This section provides instructions on how to recover a failed etcd member. It is
76
76
77
77
In this example, we use a 3-member etcd cluster with one failed node, that is still running and has maintained [quorum][majority]. An etcd member node might fail for several reasons: out of disk space, an incorrect reboot, or issues on the underlying system. Note that this example assumes you used [a Container Linux Config][cl-configs] with an etcd [discovery URL][etcd-discovery] to bootstrap your cluster, with the following default options:
Copy file name to clipboardexpand all lines: etcd/tls-etcd-clients.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ This document assumes three Container Linux nodes will be booted and will be run
14
14
15
15
Flannel options can be specified in a Container Linux Config. For an example, this is a config that sets the etcd endpoints flannel will use and specifies tls resources to encrypt the connection:
Due to the [deprecation of fleet][fleet-deprecation], Container Linux Configs don't have a convenient syntax for configuring fleet like for flannel. Fleet can still be easily configured however with the use of a systemd drop-in.
49
49
50
-
```container-linux-config
50
+
```yaml container-linux-config
51
51
systemd:
52
52
units:
53
53
- name: fleet.service
@@ -67,7 +67,7 @@ systemd:
67
67
68
68
Example Container Linux Config excerpt for Locksmith configuration:
You can put this into a drop-in for flanneld.service via a Container Linux Config:
28
28
29
-
```container-linux-config
29
+
```yamlcontainer-linux-config
30
30
systemd:
31
31
units:
32
32
- name: flanneld.service
@@ -47,7 +47,7 @@ flannel uses UDP port 8285 for sending encapsulated IP packets. Make sure to ena
47
47
48
48
The last step is to enable `flanneld.service` by creating the `flannel` section in our Container Linux Config. Options for flannel can be specified in this section.
49
49
50
-
```container-linux-config
50
+
```yaml container-linux-config
51
51
flannel:
52
52
```
53
53
@@ -57,7 +57,7 @@ flannel:
57
57
58
58
Flannel requires SSL certificates to communicate with a secure etcd cluster. By default, flannel looks for these certificates in `/etc/ssl/etcd`. To use different certificates, add `Environment=ETCD_SSL_DIR` to a drop-in file for `flanneld.service`. Use the following configuration snippet to achieve this:
Copy file name to clipboardexpand all lines: fleet/launching-containers-fleet.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -297,7 +297,7 @@ MachineMetadata=region=east
297
297
298
298
On Container Linux, only fleet 0.11.x is available under /usr/bin. That one might be obsolete for users who want to try out more recent versions. In that case, users should define their own custom Container Linux Config to be able to run any version of fleet as they want. For example:
Copy file name to clipboardexpand all lines: os/adding-users.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ You can create user accounts on a CoreOS Container Linux machine manually with `
6
6
7
7
In your Container Linux Config, you can specify many [different parameters](https://github.com/coreos/container-linux-config-transpiler/blob/master/doc/configuration.md) for each user. Here's an example:
Copy file name to clipboardexpand all lines: os/booting-on-ec2.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -122,7 +122,7 @@ You can provide a raw Ignition config to Container Linux via the Amazon web cons
122
122
123
123
As an example, this Container Linux Config will configure and start etcd:
124
124
125
-
```container-linux-config:ec2
125
+
```yamlcontainer-linux-config:ec2
126
126
etcd:
127
127
# All options get passed as command line flags to etcd.
128
128
# Any information inside curly braces comes from the machine at boot time.
@@ -146,7 +146,7 @@ etcd:
146
146
147
147
Ephemeral disks and additional EBS volumes attached to instances can be mounted with a `.mount` unit. Amazon's block storage devices are attached differently [depending on the instance type](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html#InstanceStoreDeviceNames). Here's the Container Linux Config to format and mount the first ephemeral disk, `xvdb`, on most instance types:
148
148
149
-
```container-linux-config:ec2
149
+
```yaml container-linux-config:ec2
150
150
storage:
151
151
filesystems:
152
152
- mount:
@@ -258,7 +258,7 @@ First we need to create a security group to allow Container Linux instances to c
258
258
</li>
259
259
<li>
260
260
Use <a href="provisioning.md">ct</a> to convert the following configuration into an Ignition config, and back in the EC2 dashboard, paste it into the "User Data" field.
261
-
```container-linux-config:ec2
261
+
```yaml container-linux-config:ec2
262
262
etcd:
263
263
# All options get passed as command line flags to etcd.
264
264
# Any information inside curly braces comes from the machine at boot time.
@@ -332,7 +332,7 @@ First we need to create a security group to allow Container Linux instances to c
332
332
</li>
333
333
<li>
334
334
Use <a href="provisioning.md">ct</a> to convert the following configuration into an Ignition config, and back in the EC2 dashboard, paste it into the "User Data" field.
335
-
```container-linux-config:ec2
335
+
```yaml container-linux-config:ec2
336
336
etcd:
337
337
# All options get passed as command line flags to etcd.
338
338
# Any information inside curly braces comes from the machine at boot time.
@@ -406,7 +406,7 @@ First we need to create a security group to allow Container Linux instances to c
406
406
</li>
407
407
<li>
408
408
Use <a href="provisioning.md">ct</a> to convert the following configuration into an Ignition config, and back in the EC2 dashboard, paste it into the "User Data" field.
409
-
```container-linux-config:ec2
409
+
```yaml container-linux-config:ec2
410
410
etcd:
411
411
# All options get passed as command line flags to etcd.
412
412
# Any information inside curly braces comes from the machine at boot time.
Copy file name to clipboardexpand all lines: os/booting-on-google-compute-engine.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ You can provide a raw Ignition config to Container Linux via the Google Cloud co
16
16
17
17
As an example, this config will configure and start etcd:
18
18
19
-
```container-linux-config:gce
19
+
```yamlcontainer-linux-config:gce
20
20
etcd:
21
21
# All options get passed as command line flags to etcd.
22
22
# Any information inside curly braces comes from the machine at boot time.
@@ -67,7 +67,7 @@ Create 3 instances from the image above using our Ignition from `example.ign`:
67
67
68
68
Additional disks attached to instances can be mounted with a `.mount` unit. Each disk can be accessed via `/dev/disk/by-id/google-<disk-name>`. Here's the Container Linux Config to format and mount a disk called `database-backup`:
To enable the remote API on every Container Linux machine in a cluster, use a [Container Linux Config][cl-configs]. We need to provide the new socket file and Docker's socket activation support will automatically start using the socket:
40
40
41
-
```container-linux-config
41
+
```yamlcontainer-linux-config
42
42
systemd:
43
43
units:
44
44
- name: docker-tcp.socket
@@ -162,7 +162,7 @@ docker images
162
162
163
163
A Container Linux Config for Docker TLS authentication will look like:
164
164
165
-
```container-linux-config
165
+
```yaml container-linux-config
166
166
storage:
167
167
files:
168
168
- path: /etc/docker/ca.pem
@@ -249,7 +249,7 @@ journalctl -u docker
249
249
250
250
If you need to modify a flag across many machines, you can add the flag with a Container Linux Config:
251
251
252
-
```container-linux-config
252
+
```yaml container-linux-config
253
253
docker:
254
254
flags:
255
255
- --debug
@@ -283,7 +283,7 @@ Proxy environment variables can also be set [system-wide][systemd-env-vars].
283
283
284
284
The easiest way to use this proxy on all of your machines is via a Container Linux Config:
285
285
286
-
```container-linux-config
286
+
```yaml container-linux-config
287
287
systemd:
288
288
units:
289
289
- name: docker.service
@@ -321,7 +321,7 @@ systemctl restart docker
321
321
322
322
The easiest way to use these new ulimits on all of your machines is via a Container Linux Config:
0 commit comments