You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/v2.19/howtos/intercepts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Telepresence enables you to create intercepts to a target Kubernetes workload. O
12
12
13
13
## Prerequisites
14
14
15
-
Before you begin, you need to have [Telepresence installed](../install), and either the Kubernetes command-line tool, [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/), or the OpenShift Container Platform command-line interface, [`oc`](https://docs.openshift.com/container-platform/4.2/cli_reference/openshift_cli/getting-started-cli.html#cli-installing-cli_cli-developer-commands). This document uses kubectl in all example commands. OpenShift users can substitute oc [commands instead](https://docs.openshift.com/container-platform/4.1/cli_reference/developer-cli-commands.html).
15
+
Before you begin, you need to have [Telepresence installed](../install/client), and either the Kubernetes command-line tool, [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl/), or the OpenShift Container Platform command-line interface, [`oc`](https://docs.openshift.com/container-platform/4.2/cli_reference/openshift_cli/getting-started-cli.html#cli-installing-cli_cli-developer-commands). This document uses kubectl in all example commands. OpenShift users can substitute oc [commands instead](https://docs.openshift.com/container-platform/4.1/cli_reference/developer-cli-commands.html).
16
16
17
17
This guide assumes you have a Kubernetes deployment and service accessible publicly by an ingress controller, and that you can run a copy of that service on your laptop.
Copy file name to clipboardExpand all lines: docs/v2.19/install/manager.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ Telepresence uses a traffic manager to send/recieve cloud traffic to the user. T
4
4
5
5
## Prerequisites
6
6
7
-
Before you begin, you need to have [Telepresence installed](../install/).
7
+
Before you begin, you need to have [Telepresence installed](../install/client).
8
8
9
9
If you are not the administrator of your cluster, you will need [administrative RBAC permissions](../reference/rbac#administrating-telepresence) to install and use Telepresence in your cluster.
Copy file name to clipboardExpand all lines: docs/v2.19/quick-start.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,12 +16,12 @@ Telepresence is an open source tool that enables you to set up remote developmen
16
16
17
17
## Install Telepresence
18
18
19
-
Follow [Install Client](../install) and [Install Traffic Manager](../install/manager) instructions to install the
19
+
Follow [Install Client](install/client) and [Install Traffic Manager](install/manager) instructions to install the
20
20
telepresence client on your workstation, and the traffic manager in your cluster.
21
21
22
22
## Intercept Your Service
23
23
24
-
With Telepresence, you can create [intercepts](../concepts/intercepts?intercept=global) that intercept all traffic going to a service in your remote cluster and route it to your local environment instead.
24
+
With Telepresence, you can create [intercepts](concepts/intercepts?intercept=global) that intercept all traffic going to a service in your remote cluster and route it to your local environment instead.
25
25
26
26
1. Connect to your cluster with `telepresence connect` and connect to the Kubernetes API server:
27
27
@@ -117,6 +117,6 @@ Now, with Telepresence, you can:
117
117
</Alert>
118
118
119
119
## What’s Next?
120
-
-[Learn about the Telepresence architecture.](../reference/architecture)
120
+
-[Learn about the Telepresence architecture.](reference/architecture)
Copy file name to clipboardExpand all lines: docs/v2.19/troubleshooting.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ description: "Learn how to troubleshoot common issues related to Telepresence, i
6
6
7
7
## Connecting to a cluster via VPN doesn't work.
8
8
9
-
There are a few different issues that could arise when working with a VPN. Please see the [dedicated page](../reference/vpn) on Telepresence and VPNs to learn more on how to fix these.
9
+
There are a few different issues that could arise when working with a VPN. Please see the [dedicated page](reference/vpn) on Telepresence and VPNs to learn more on how to fix these.
10
10
11
11
## Connecting to a cluster hosted in a VM on the workstation doesn't work
12
12
13
13
The cluster probably has access to the host's network and gets confused when it is mapped by Telepresence.
14
-
Please check the [cluster in hosted vm](../howtos/cluster-in-vm) for more details.
14
+
Please check the [cluster in hosted vm](howtos/cluster-in-vm) for more details.
Once that's been done, the traces will be visible via whatever means your usual collector allows. For example, this is what they look like when loaded into Jaeger's [OTLP API](https://www.jaegertracing.io/docs/1.36/apis/#opentelemetry-protocol-stable):
78
78
79
-

79
+

80
80
81
81
**Note:** The host and port provided for the `OTLP_GRPC_ENDPOINT` must accept OTLP formatted spans (instead of e.g. Jaeger or Zipkin specific spans) via a GRPC API (instead of the HTTP API that is also available in some collectors)
82
82
**Note:** Since traces are not automatically shipped to the backend by telepresence, they are stored in memory. Hence, to avoid running telepresence components out of memory, only the last 10MB of trace data are available for export.
@@ -104,7 +104,7 @@ Traffic Manager's webhook injector from the API server.
104
104
To fix this, add a firewall rule allowing your cluster's master nodes to access TCP port `443` in your cluster's pods,
105
105
or change the port number that Telepresence is using for the agent injector by providing the number of an allowed port
106
106
using the Helm chart value `agentInjector.webhook.port`.
107
-
Please refer to the [telepresence install instructions](../install/cloud#gke) or the [GCP docs](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules) for information to resolve this.
107
+
Please refer to the [telepresence install instructions](install/cloud#gke) or the [GCP docs](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#add_firewall_rules) for information to resolve this.
108
108
109
109
## Injected init-container doesn't function properly
110
110
@@ -156,7 +156,7 @@ not get remapped. A headless service will always require the init-container.
156
156
## Error connecting to GKE or EKS cluster
157
157
158
158
GKE and EKS require a plugin that utilizes their resepective IAM providers.
159
-
You will need to install the [gke](../install/cloud#gke-authentication-plugin) or [eks](../install/cloud#eks-authentication-plugin) plugins
159
+
You will need to install the [gke](install/cloud#gke-authentication-plugin) or [eks](install/cloud#eks-authentication-plugin) plugins
160
160
for Telepresence to connect to your cluster.
161
161
162
162
## `too many files open` error when running `telepresence connect` on Linux
0 commit comments