Skip to content

Commit

Permalink
STAC-21823: Add minimal helm version to docs
Browse files Browse the repository at this point in the history
  • Loading branch information
craffit committed Oct 22, 2024
1 parent 218fa8d commit 2119063
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 7 deletions.
14 changes: 7 additions & 7 deletions k8s-quick-start-guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Set up a Kubernetes integration to collect topology, events, logs, change and me
To set up a SUSE Observability Kubernetes integration you need to have:

* An up-and-running Kubernetes Cluster.
* A recent version of Helm 3.
* Helm version 3.13.1 or higher.
* A user with the permission to `create privileged pods`, `ClusterRoles` and `ClusterRoleBindings`:
* ClusterRole and ClusterRoleBinding are needed to grant SUSE Observability Agents permissions to access the Kubernetes API.
* SUSE Observability Agents need to run in a privileged pod to be able to gather information on network connections and host information.
Expand Down Expand Up @@ -113,7 +113,7 @@ Set up an OpenShift integration to collect topology, events, logs, change and me
To set up a SUSE Observability OpenShift integration you need to have:

* An up-and-running OpenShift Cluster.
* A recent version of Helm 3.
* Helm version 3.13.1 or higher.
* A user with the permission to `create privileged pods`, `ClusterRoles` and `ClusterRoleBindings`:
* ClusterRole and ClusterRoleBinding are needed to grant SUSE Observability Agents permissions to access the Kubernetes API.
* SUSE Observability Agents need to run in a privileged pod to be able to gather information on network connections and host information.
Expand Down Expand Up @@ -179,7 +179,7 @@ Set up an Amazon EKS integration to collect topology, events, logs, change and m
To set up a SUSE Observability Amazon EKS integration you need to have:

* An up-and-running Amazon EKS Cluster.
* A recent version of Helm 3.
* Helm version 3.13.1 or higher.
* A user with the permission to `create privileged pods`, `ClusterRoles` and `ClusterRoleBindings`:
* ClusterRole and ClusterRoleBinding are needed to grant SUSE Observability Agents permissions to access the Kubernetes API.
* SUSE Observability Agents need to run in a privileged pod to be able to gather information on network connections and host information.
Expand Down Expand Up @@ -238,7 +238,7 @@ Set up a Google GKE integration to collect topology, events, logs, change and me
To set up a SUSE Observability Google GKE integration you need to have:

* An up-and-running Google GKE Cluster.
* A recent version of Helm 3.
* Helm version 3.13.1 or higher.
* A user with the permission to `create privileged pods`, `ClusterRoles` and `ClusterRoleBindings`:
* ClusterRole and ClusterRoleBinding are needed to grant SUSE Observability Agents permissions to access the Kubernetes API.
* SUSE Observability Agents need to run in a privileged pod to be able to gather information on network connections and host information.
Expand Down Expand Up @@ -294,7 +294,7 @@ Set up an Azure AKS integration to collect topology, events, logs, change and me
To set up a SUSE Observability Azure AKS integration you need to have:

* An up-and-running Azure AKS Cluster.
* A recent version of Helm 3.
* Helm version 3.13.1 or higher.
* A user with the permission to `create privileged pods`, `ClusterRoles` and `ClusterRoleBindings`:
* ClusterRole and ClusterRoleBinding are needed to grant SUSE Observability Agents permissions to access the Kubernetes API.
* SUSE Observability Agents need to run in a privileged pod to be able to gather information on network connections and host information.
Expand Down Expand Up @@ -360,7 +360,7 @@ Set up a KOPS integration to collect topology, events, logs, change and metrics
To set up a SUSE Observability KOPS integration you need to have:

* An up-and-running KOPS Cluster.
* A recent version of Helm 3.
* Helm version 3.13.1 or higher.
* A user with the permission to `create privileged pods`, `ClusterRoles` and `ClusterRoleBindings`:
* ClusterRole and ClusterRoleBinding are needed to grant SUSE Observability Agents permissions to access the Kubernetes API.
* SUSE Observability Agents need to run in a privileged pod to be able to gather information on network connections and host information.
Expand Down Expand Up @@ -426,7 +426,7 @@ Set up a Self-hosted integration to collect topology, events, logs, change and m
To set up a SUSE Observability Self-hosted integration you need to have:

* An up-and-running Self-hosted Cluster.
* A recent version of Helm 3.
* Helm version 3.13.1 or higher.
* A user with the permission to `create privileged pods`, `ClusterRoles` and `ClusterRoleBindings`:
* ClusterRole and ClusterRoleBinding are needed to:
* Grant SUSE Observability Agents permissions to access the Kubernetes API
Expand Down
4 changes: 4 additions & 0 deletions k8s-suse-rancher-prime.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,10 @@ For our different installation profiles, the following are the defaulted storage

For more details on the defaults used, see the page [Configure storage](/setup/install-stackstate/kubernetes_openshift/storage.md).

### Helm

SUSE Observability is installed through Helm, which needs to be installed with a minimum version of 3.13.1.

### The different components

#### SUSE Observability Server
Expand Down

0 comments on commit 2119063

Please sign in to comment.