Commit graph

2221 commits

Author SHA1 Message Date
Eduardo Arango 40d0af5422
resolve merge conflicts
Signed-off-by: Eduardo Arango <eduardo@sylabs.io>
2019-04-16 17:01:22 -05:00
Eduardo Arango 6934b98313
address @cgbaker comments
Signed-off-by: Eduardo Arango <eduardo@sylabs.io>
2019-04-16 16:59:59 -05:00
Chris Baker a73d7e797b
Update singularity.html.md 2019-04-15 09:49:30 -04:00
Eduardo Arango c9bae637f2
Merge branch 'website_docs_singularity' of github.com:ArangoGutierrez/nomad into website_docs_singularity 2019-04-12 16:27:33 -05:00
Eduardo Arango 7ada6a2c4c
address requestec changes, iteration 1
Signed-off-by: Eduardo Arango <eduardo@sylabs.io>
2019-04-12 16:26:52 -05:00
Chris Baker 32f02793cf
minor typographical changes 2019-04-12 15:05:56 -04:00
Eduardo Arango 6f234382c4
list singularity as a community driver
Signed-off-by: Eduardo Arango <eduardo@sylabs.io>
2019-04-12 12:59:31 -05:00
Omar Khawaja 46bbc4e5e7
add community section under task drivers and sync name with device plugins (#5542)
* add community section under task drivers and sync name with device plugins

* reword heading
2019-04-10 16:56:38 -04:00
Chris Baker a26d4fe1e5
docs: -vault-namespace, VAULT_NAMESPACE, and config
agent: added VAULT_NAMESPACE env-based configuration
2019-04-10 10:34:10 -05:00
Chris Baker 0eaeef872f
config/docs: added namespace to vault config
server/client: process `namespace` config, setting on the instantiated vault client
2019-04-10 10:34:10 -05:00
Michael Schurter e3613046b0
Update website/source/docs/commands/job/revert.html.md.erb
Co-Authored-By: cgbaker <cgbaker@hashicorp.com>
2019-04-10 10:34:10 -05:00
Chris Baker ee3b8f75c4
docs: added vault token documentation to job revert command, documented VaultToken field of api.JobRevertRequest 2019-04-10 10:34:10 -05:00
Omar Khawaja 72a5f3defc
Nomad TLS with Vault (#5454)
* navigation and initial steps of guide

* generate certs with appropriate token

* configure Nomad to use TLS

* add cli keys and certs

* add server gossip encryption section

* fix mislabeled steps

* vault paths formatting

* remove bit about cert revocation

* add clarification in challenge that we will be securing an existing Nomad cluster

* add some comments to consul-template.hcl to help user walk through it

* clarifying comments for CLI certs templates

* reorganize steps, change permissions on certs, and sub pkill command with systemctl reload nomad

* correct step reference

* add rpc upgrade mode instructions

* correct typo
2019-04-09 12:13:37 -04:00
Michael Schurter dd8b704554 website: remove RC note from download page 2019-04-09 09:12:07 -07:00
Preetha Appan 10822ed811
Remove beta tags from 0.9 docs 2019-04-05 14:11:56 -05:00
Michael Schurter 99de5a0043 Bump download page to 0.9.0-rc2 2019-04-03 07:46:28 -07:00
Mahmood Ali accf290d74 document force_pull and :latest tag interaction 2019-04-02 08:48:34 -04:00
Preetha Appan bd2e6b5bf9
minor fixes to spread stanza documentation 2019-03-26 15:01:56 -05:00
Preetha Appan 02e4a590e3
Update release candidate download link on website 2019-03-22 10:46:49 -05:00
Michael Schurter f1ce2fa1ec
Merge pull request #5443 from hashicorp/f-systemd-fixes
docs: sync systemd unit files; update deploy guide
2019-03-20 10:40:53 -07:00
Michael Schurter 3c78271ea2 docs: remove partial sig/checksum verification
Point users to security doc instead. Right now it takes a lot of
explaining to describe to users exactly how to validate the binary and
what the output of the tools used means.

For example, this is the output when validating according to the
instructions in this guide and the linked doc:

```
vagrant@linux:/tmp$ gpg --verify nomad_0.8.7_SHA256SUMS.sig
nomad_0.8.7_SHA256SUMS
gpg: Signature made Fri 11 Jan 2019 09:47:56 PM UTC using RSA key ID
348FFC4C
gpg: Good signature from "HashiCorp Security <security@hashicorp.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the
owner.
Primary key fingerprint: 91A6 E7F8 5D05 C656 30BE  F189 5185 2D87 348F
FC4C
vagrant@linux:/tmp$ shasum -a 256 -c nomad_0.8.7_SHA256SUMS
shasum: ./nomad_0.8.7_darwin_amd64.zip:
./nomad_0.8.7_darwin_amd64.zip: FAILED open or read
shasum: ./nomad_0.8.7_linux_386.zip: No such file or directory
./nomad_0.8.7_linux_386.zip: FAILED open or read
shasum: ./nomad_0.8.7_linux_amd64-lxc.zip: No such file or directory
./nomad_0.8.7_linux_amd64-lxc.zip: FAILED open or read
./nomad_0.8.7_linux_amd64.zip: OK
shasum: ./nomad_0.8.7_linux_arm64.zip: No such file or directory
./nomad_0.8.7_linux_arm64.zip: FAILED open or read
shasum: ./nomad_0.8.7_linux_arm.zip: No such file or directory
./nomad_0.8.7_linux_arm.zip: FAILED open or read
shasum: ./nomad_0.8.7_windows_386.zip: No such file or directory
./nomad_0.8.7_windows_386.zip: FAILED open or read
shasum: ./nomad_0.8.7_windows_amd64.zip: No such file or directory
./nomad_0.8.7_windows_amd64.zip: FAILED open or read
shasum: WARNING: 7 listed files could not be read
```

There are only two lines that matter in all of that output:

```
...
gpg: Good signature from "HashiCorp Security <security@hashicorp.com>"
...
./nomad_0.8.7_linux_amd64.zip: OK
...
```

I feel like trying to teach users how to use and interpret these tools
in our deployment guide may be as likely to reduce confidence as
increase it.
2019-03-20 09:36:29 -07:00
Mahmood Ali d9a3c92610
doc: fix tls_cipher_suites type (#5441)
tls_cipher_suites only accept a comma-separated string, as evident in:

0535dfd414/nomad/structs/config/tls.go (L61)
d37ed5c193/helper/tlsutil/config.go (L405)
2019-03-20 12:17:38 -04:00
Mahmood Ali 4c3dbd2f84
Don't use "datacenter" in a confusing way
Co-Authored-By: schmichael <michael.schurter@gmail.com>
2019-03-20 08:08:37 -07:00
Michael Schurter 30db07cccb docs: sync systemd unit files; update deploy guide
The systemd configs spread across our repo were fairly out of sync. This
should get them on our best practices.

The deployment guide also had some strange things like running Nomad as
a non-root user. It would be fine for servers but completely breaks
clients. For simplicity I simply removed the non-root user references.
2019-03-19 15:18:12 -07:00
Omar Khawaja 5327904f54
Portworx guide (#5399)
* skeleton

* configure portworx

* destroy and redeploy mysql with data intact

* rename all directories and references from persistent storage to stateful workloads

* add considerations and remove references to StorageOS

* update wording and headings

* create portworx volume externally and modify jobfile to reflect that

* fix typo

* Update website/source/guides/stateful-workloads/portworx.html.md

Co-Authored-By: Omar-Khawaja <Omar-Khawaja@users.noreply.github.com>

* Update website/source/guides/stateful-workloads/portworx.html.md

Co-Authored-By: Omar-Khawaja <Omar-Khawaja@users.noreply.github.com>
2019-03-15 11:33:46 -04:00
Chris Baker a64b7651b2
Merge pull request #5373 from hashicorp/docs-artifact-stanza
artifact stanza documentation
2019-03-11 14:09:28 -04:00
Charlie Voiselle 2498ad954a
Merge pull request #5401 from hashicorp/doc-rkt-needs-root
Note rkt driver needs Nomad client run as root
2019-03-11 10:29:45 -04:00
Mahmood Ali 7a6ca67a32 fix typo 2019-03-06 20:24:01 -05:00
Charlie Voiselle de66f04450
Note rkt driver needs Nomad client run as root
The rkt driver requires that the Nomad agent to be running as the root user
2019-03-06 19:53:51 -05:00
Charlie Voiselle 2406b71e02
Tweaked deprecation wording for legacy config (#5394)
Made small adjustment to make it clear that 0.8.7 would require the legacy syntax and that the deprecation notice was more about the legacy syntax becoming unsupported at some point after v0.9.0
2019-03-06 11:07:54 -05:00
Yishan Lin 3f7b12843b
Add missing period to sentence. 2019-03-05 12:38:36 -08:00
Chris Baker bf026fb91e artifact docs: modified the leading example and removed a treacherous (but potentially correct) example 2019-02-28 21:48:01 +00:00
Omar Khawaja 61d7156e61
update formatting and add toJSON function with explanation (#5366)
* update formatting and add toJSON function with explanation

* edit typo

* Update website/source/guides/operations/vault-integration/index.html.md

Co-Authored-By: Omar-Khawaja <Omar-Khawaja@users.noreply.github.com>

* fixing clarification bullet explaining the use of toJSON
2019-02-28 13:00:25 -05:00
Mahmood Ali f6e2fb1711
docs: Update beta release link to 0.9.0-beta3 (#5365) 2019-02-27 09:49:36 -05:00
Omar Khawaja 084230a12b
reformat lxc guide (#5339)
* reformat lxc guide

* reformat lxc guide
2019-02-21 17:40:22 -05:00
Michael Schurter 7dd6259e93 docs: clarify use of toJSON for passwords
Fixes #5347
2019-02-21 09:47:18 -08:00
Omar Khawaja 2bd79d757a
adding dropdown nav to external plugins section (#5338) 2019-02-19 17:00:03 -05:00
Charlie Voiselle 094e2a28d5 Warn that data_dir can't be in the jail (#4618) 2019-02-18 20:40:45 -05:00
Mahmood Ali 24d510290a
Fix device.attr typo (#5331)
Fix https://github.com/hashicorp/nomad/issues/5315
2019-02-16 13:07:02 -05:00
Preetha 412127e13b
Merge pull request #5287 from hashicorp/docs-fix-affinity-examples
docs: fixed some affinity examples
2019-02-12 09:13:27 -06:00
Chris Baker a4df11c4c8 restored previous example (it was correct) 2019-02-06 19:13:40 +00:00
Omar Khawaja b18006fe3f
add some cross-linking for easier reference (#5292) 2019-02-01 13:12:18 -05:00
Matthias Endler 22cca2bbd6
Fix typo in "discovery" 2019-02-01 14:24:02 +01:00
Chris Baker c8cff1106b fixed typo in vault integration documentation 2019-01-31 16:00:54 +00:00
Chris Baker 2e74b1aa98 fixed some affinity examples 2019-01-31 15:15:00 +00:00
Omar Khawaja fe6a95ef63 fix typo 2019-01-30 17:48:08 -05:00
Mahmood Ali 62b48264e9
website: update lxc references to 0.1.0-rc2 (#5283) 2019-01-30 17:05:44 -05:00
Michael Schurter 5ac0511ada Bump to Nomad 0.8.7 and mention 0.9 beta 2019-01-30 13:50:44 -08:00
Alex Dadgar 449e582ffc
Merge pull request #5281 from hashicorp/f-affinity-weight-int
Change types of weights on spread/affinity
2019-01-30 13:25:56 -08:00
Nick Ethier ea9943dea6
website/resources: add recent videos/blogs to resources 2019-01-30 15:44:39 -05:00