Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Edit three Setup guides for Cloud users #10759

Merged
merged 3 commits into from
Apr 13, 2022
Merged

Conversation

ptgott
Copy link
Contributor

@ptgott ptgott commented Mar 2, 2022

Teleport Daemon

  • Use a Notice for a warning re: the Auth Service scoped to
    self-hosted users
  • Misc grammar/style/clarity tweaks

Move the Enterprise License File page

The page does not belong in the Setup section, since it does not
apply to Cloud and OSS users. I have moved the page into the
Enterprise section.

Networking guide

  • Add tabbed instructions so users who have selected a given scope
    don't see content for other scopes.

  • Mention auth_service.proxy_listener_mode instead of
    tls_routing_enabled for self-hosted readers

  • Misc grammar, style, and clarity edits

Scaling

We already added an edition warning in a Details box, but I thought
a Notice would be more prominent. I've also added some minor grammar,
style, and clarity tweaks.

@github-actions github-actions bot requested review from r0mant, xinding33 and zmb3 March 2, 2022 19:37
@ptgott ptgott changed the title Edit four Setup guides for Cloud users Edit three Setup guides for Cloud users Mar 2, 2022
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch from a3235f6 to ec5f9d4 Compare March 2, 2022 19:38
<Tabs>
<TabItem scope={["oss", "enterprise"]} label="Self-Hosted">

All Teleport services (the Proxy Service, Auth Service, and Nodes) have an
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

app service, db service, windows desktop service all have public_addr as well.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At some point, I started conflating the term "Node" with "all Teleport services that aren't the Auth/Proxy." As you point out, this is incorrect, and our architecture overview guide says as much. I still think we need some catch-all term for services that aren't the auth/proxy. I'll create a separate issue for this and fix my usage here.

</TabItem>
<TabItem scope={["cloud"]} label="Teleport Cloud">

Teleport Nodes have an optional `public_addr` property that you can modify in
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cloud customers likely want to know about the public_addr property for app, db, and desktop access.

supports HTTP CONNECT tunneling.

To use HTTP CONNECT tunneling, simply set either the `HTTPS_PROXY` or
`HTTP_PROXY` variables of the `teleport` daemon's shell environment. When the
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
`HTTP_PROXY` variables of the `teleport` daemon's shell environment. When the
`HTTP_PROXY` variables of the `teleport` daemon's environment. When the

Remove shell as there is no requirement to run the Teleport daemon via a shell.


To use HTTP CONNECT tunneling, simply set either the `HTTPS_PROXY` or `HTTP_PROXY` environment variables and when Teleport builds and establishes the reverse tunnel to the main cluster, it will funnel all traffic through the proxy. Specifically, if using the default configuration, Teleport will tunnel ports `3024` (SSH, reverse tunnel) and `3080` (HTTPS, establishing trust) through the proxy.
If using the default configuration, Teleport will tunnel ports `3024` (SSH,
reverse tunnel) and `3080` (HTTPS, establishing trust) through the proxy.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure what we're trying to say about port 3080 here. It is not "tunneled through the proxy" - it's just the listen port on the proxy. There is no tunneling taking place on port 3080.

@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch from ec5f9d4 to 6acfded Compare March 8, 2022 22:52
@ptgott ptgott requested a review from zmb3 March 8, 2022 22:52
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch from 6acfded to a3b6582 Compare March 10, 2022 20:55
@russjones russjones added the cloud Cloud label Mar 11, 2022
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch from a3b6582 to 019daee Compare March 14, 2022 21:22
@ptgott ptgott requested a review from ulysseskan March 16, 2022 19:18
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch from e5b3721 to e2ef7b0 Compare March 16, 2022 19:18
Copy link
Contributor

@ulysseskan ulysseskan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch from e2ef7b0 to 01a75cf Compare March 18, 2022 21:01
@russjones russjones added cloud-docs and removed cloud Cloud labels Mar 18, 2022
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch 2 times, most recently from d036bca to 42c5e22 Compare March 28, 2022 19:48
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch 2 times, most recently from 9130038 to 3ff9e7e Compare April 5, 2022 19:24
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch 2 times, most recently from 6c46b0e to 5ad4dd6 Compare April 11, 2022 20:26
ptgott added 3 commits April 13, 2022 12:41
Teleport Daemon

- Use a Notice for a warning re: the Auth Service scoped to
  self-hosted users
- Misc grammar/style/clarity tweaks

Move the Enterprise License File page

The page does not belong in the Setup section, since it does not
apply to Cloud and OSS users. I have moved the page into the
Enterprise section.

Networking guide

- Add tabbed instructions so users who have selected a given scope
  don't see content for other scopes.

- Mention auth_service.proxy_listener_mode instead of
  tls_routing_enabled for self-hosted readers

- Misc grammar, style, and clarity edits

Scaling

  We already added an edition warning in a Details box, but I thought
  a Notice would be more prominent. I've also added some minor grammar,
  style, and clarity tweaks.
- Imply that there are non-Auth/Proxy services beside Nodes
- Remove "shell" where it is unnecessary
- Revert the "HTTP CONNECT" section to where it was before this
  change. The copy-edits were inaccurate, but I don't have time
  to perform the edits agin more carefully.
Simplify the HTTP CONNECT section by bringing the example closer
to the explanation of this functionality and removing some
ambiguity over whether one or both of HTTPS_PROXY and HTTP_PROXY are
required. The original text suggested that either is required, then
that both are required. The new text says to assign both, then
explains why.
@ptgott ptgott force-pushed the paul.gottschling/10633-4 branch from 5ad4dd6 to 73ad63b Compare April 13, 2022 16:41
@ptgott ptgott enabled auto-merge (squash) April 13, 2022 16:42
@ptgott ptgott merged commit 0842ac6 into master Apr 13, 2022
@ptgott ptgott deleted the paul.gottschling/10633-4 branch April 13, 2022 16:47
ptgott added a commit that referenced this pull request Apr 15, 2022
* Edit three Setup guides for Cloud users

Teleport Daemon

- Use a Notice for a warning re: the Auth Service scoped to
  self-hosted users
- Misc grammar/style/clarity tweaks

Move the Enterprise License File page

The page does not belong in the Setup section, since it does not
apply to Cloud and OSS users. I have moved the page into the
Enterprise section.

Networking guide

- Add tabbed instructions so users who have selected a given scope
  don't see content for other scopes.

- Mention auth_service.proxy_listener_mode instead of
  tls_routing_enabled for self-hosted readers

- Misc grammar, style, and clarity edits

Scaling

  We already added an edition warning in a Details box, but I thought
  a Notice would be more prominent. I've also added some minor grammar,
  style, and clarity tweaks.

* Address PR feedback

- Imply that there are non-Auth/Proxy services beside Nodes
- Remove "shell" where it is unnecessary
- Revert the "HTTP CONNECT" section to where it was before this
  change. The copy-edits were inaccurate, but I don't have time
  to perform the edits agin more carefully.

* Address PR feedback

Simplify the HTTP CONNECT section by bringing the example closer
to the explanation of this functionality and removing some
ambiguity over whether one or both of HTTPS_PROXY and HTTP_PROXY are
required. The original text suggested that either is required, then
that both are required. The new text says to assign both, then
explains why.
@webvictim webvictim mentioned this pull request Apr 19, 2022
@webvictim webvictim mentioned this pull request Jun 8, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants