You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/advanced/settings.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,10 +64,12 @@ The following example adds disks that match the glob pattern `/dev/sd*` or `/dev
64
64
65
65
**Definition**: Setting that allows you to automatically rotate certificates for RKE2 services. This setting is disabled by default.
66
66
67
-
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). Harvester automatically replaces the certificate before the specified period ends.
67
+
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). If the certificate expires within the specified period, Harvester automatically replaces the certificate.
68
68
69
69
For more information, see the **Certificate Rotation** section of the [Rancher](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/manage-clusters/rotate-certificates) and [RKE2](https://docs.rke2.io/advanced#certificate-rotation) documentation.
70
70
71
+
If your certificates have expired, you can [rotate them manually](../host/host.md#rotate-expiring-certificates).
-`restoreVM`: Option that enables Harvester to automatically restore previously running [non-migratable virtual machines](../vm/live-migration.md#non-migratable-virtual-machines) after the upgrade is *successfully* completed. You can specify either of the following values:
824
826
825
827
-`true`: Harvester forcibly shuts down *running* and *paused* non-migratable virtual machines on each node. After the upgrade is completed, the previously running virtual machines are automatically restarted, while the paused virtual machines remain shut down.
826
-
828
+
827
829
-`false`: This is the default value. In multi-node environments, you must stop all non-migratable virtual machines to allow the upgrade to proceed. Harvester does not restart these virtual machines after the upgrade is completed.
Copy file name to clipboardExpand all lines: docs/host/host.md
+48Lines changed: 48 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -589,3 +589,51 @@ You can configure the URL of the console for remote server management. This cons
589
589
1. Click **Console** to access the remote server.
590
590
591
591

592
+
593
+
## Rotate Expired Certificates
594
+
595
+
If the RKE2 certificates have expired, you cannot use the `auto-rotate-rke2-certificates` setting to rotate them. The setting only works when the cluster (`cluster.provisioning`) is marked `Ready`.
596
+
597
+
```
598
+
> kubectl get cluster.provisioning -n fleet-local local -o yaml | yq -e '.status.conditions[] | select(.type=="Ready")'
599
+
lastUpdateTime: "2025-10-22T06:41:33Z"
600
+
status: "True"
601
+
type: Ready
602
+
```
603
+
604
+
If the `status` field's value is `False`, you must manually rotate the certificates by following these steps on each node:
Copy file name to clipboardExpand all lines: versioned_docs/version-v1.4/advanced/settings.md
+17-15Lines changed: 17 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,10 +64,12 @@ The following example adds disks that match the glob pattern `/dev/sd*` or `/dev
64
64
65
65
**Definition**: Setting that allows you to automatically rotate certificates for RKE2 services. This setting is disabled by default.
66
66
67
-
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). Harvester automatically replaces the certificate before the specified period ends.
67
+
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). If the certificate expires within the specified period, Harvester automatically replaces the certificate.
68
68
69
69
For more information, see the **Certificate Rotation** section of the [Rancher](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/manage-clusters/rotate-certificates) and [RKE2](https://docs.rke2.io/advanced#certificate-rotation) documentation.
70
70
71
+
If your certificates have expired, you can [rotate them manually](../host/host.md#rotate-expiring-certificates).
@@ -78,7 +80,7 @@ For more information, see the **Certificate Rotation** section of the [Rancher](
78
80
79
81
### `backup-target`
80
82
81
-
**Definition**: Custom backup target used to store VM backups.
83
+
**Definition**: Custom backup target used to store VM backups.
82
84
83
85
For more information, see the [Longhorn documentation](https://longhorn.io/docs/1.6.0/snapshots-and-backups/backup-and-restore/set-backup-target/#set-up-aws-s3-backupstore).
**Definition**: Configuration of a private registry created for the Harvester cluster.
127
+
**Definition**: Configuration of a private registry created for the Harvester cluster.
126
128
127
129
The value is stored in the `registries.yaml` file of each node (path: `/etc/rancher/rke2/registries.yaml`). For more information, see [Containerd Registry Configuration](https://docs.rke2.io/install/private_registry) in the RKE2 documentation.
128
130
@@ -207,7 +209,7 @@ Changing this setting might cause single-node clusters to temporarily become una
207
209
- Proxy URL for HTTPS requests: `"httpsProxy": "https://<username>:<pswd>@<ip>:<port>"`
208
210
- Comma-separated list of hostnames and/or CIDRs: `"noProxy": "<hostname | CIDR>"`
209
211
210
-
You must specify key information in the `noProxy` field if you configured the following options or settings:
212
+
You must specify key information in the `noProxy` field if you configured the following options or settings:
211
213
212
214
| Configured option/setting | Required value in `noProxy`| Reason |
213
215
| --- | --- | --- |
@@ -254,7 +256,7 @@ debug
254
256
255
257
**Definition**: Setting that enables and disables the Longhorn V2 Data Engine.
256
258
257
-
When set to `true`, Harvester automatically loads the kernel modules required by the Longhorn V2 Data Engine, and attempts to allocate 1024 × 2 MiB-sized huge pages (for example, 2 GiB of RAM) on all nodes.
259
+
When set to `true`, Harvester automatically loads the kernel modules required by the Longhorn V2 Data Engine, and attempts to allocate 1024 × 2 MiB-sized huge pages (for example, 2 GiB of RAM) on all nodes.
258
260
259
261
Changing this setting automatically restarts RKE2 on all nodes but does not affect running virtual machine workloads.
260
262
@@ -263,7 +265,7 @@ Changing this setting automatically restarts RKE2 on all nodes but does not affe
263
265
If you encounter error messages that include the phrase "not enough hugepages-2Mi capacity", allow some time for the error to be resolved. If the error persists, reboot the affected nodes.
264
266
265
267
To disable the Longhorn V2 Data Engine on specific nodes (for example, nodes with less processing and memory resources), go to the **Hosts** screen and add the following label to the target nodes:
@@ -308,7 +310,7 @@ Changes to the server address list are applied to all nodes.
308
310
309
311
**Definition**: Percentage of physical compute, memory, and storage resources that can be allocated for VM use.
310
312
311
-
Overcommitting is used to optimize physical resource allocation, particularly when VMs are not expected to fully consume the allocated resources most of the time. Setting values greater than 100% allows scheduling of multiple VMs even when physical resources are notionally fully allocated.
313
+
Overcommitting is used to optimize physical resource allocation, particularly when VMs are not expected to fully consume the allocated resources most of the time. Setting values greater than 100% allows scheduling of multiple VMs even when physical resources are notionally fully allocated.
@@ -517,7 +519,7 @@ If you misconfigure this setting and are unable to access the Harvester UI and A
517
519
518
520
**Supported options and values**:
519
521
520
-
-`protocols`: Enabled protocols.
522
+
-`protocols`: Enabled protocols.
521
523
-`ciphers`: Enabled ciphers.
522
524
523
525
For more information about the supported options, see [`ssl-protocols`](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#ssl-protocols) and [`ssl-ciphers`](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#ssl-ciphers) in the Ingress-Nginx Controller documentation.
@@ -688,7 +690,7 @@ When the cluster is upgraded in the future, the contents of the `value` field ma
688
690
689
691
**Versions**: v1.2.0 and later
690
692
691
-
**Definition**: Additional namespaces that you can use when [generating a support bundle](../troubleshooting/harvester.md#generate-a-support-bundle).
693
+
**Definition**: Additional namespaces that you can use when [generating a support bundle](../troubleshooting/harvester.md#generate-a-support-bundle).
692
694
693
695
By default, the support bundle only collects resources from the following predefined namespaces:
694
696
@@ -731,7 +733,7 @@ You can specify a value greater than or equal to 0. When the value is 0, Harvest
731
733
732
734
**Versions**: v1.3.1 and later
733
735
734
-
**Definition**: Number of minutes Harvester allows for collection of logs and configurations (Harvester) on the nodes for the support bundle.
736
+
**Definition**: Number of minutes Harvester allows for collection of logs and configurations (Harvester) on the nodes for the support bundle.
735
737
736
738
If the collection process is not completed within the allotted time, Harvester still allows you to download the support bundle (without the uncollected data). You can specify a value greater than or equal to 0. When the value is 0, Harvester uses the default value.
-`imagePreloadOption`: Options for the image preloading phase.
775
-
777
+
776
778
The full ISO contains the core operating system components and all required container images. Harvester can preload these container images to each node during installation and upgrades. When workloads are scheduled to management and worker nodes, the container images are ready to use.
If you decide to use `skip`, ensure that the following requirements are met:
789
791
790
792
- You have a private container registry that contains all required images.
791
-
- Your cluster has high-speed internet access and is able to pull all images from Docker Hub when necessary.
792
-
793
+
- Your cluster has high-speed internet access and is able to pull all images from Docker Hub when necessary.
794
+
793
795
Note any potential internet service interruptions and how close you are to reaching your [Docker Hub rate limit](https://www.docker.com/increase-rate-limits/). Failure to download any of the required images may cause the upgrade to fail and may leave the cluster in a middle state.
794
-
796
+
795
797
:::
796
798
797
799
-`parallel` (**experimental**): Nodes preload images in batches. You can adjust this using the `concurrency` option.
**Definition**: Setting that allows you to force rescheduling of a VM when the node that it is running on becomes unavailable.
846
+
**Definition**: Setting that allows you to force rescheduling of a VM when the node that it is running on becomes unavailable.
845
847
846
848
When the state of the node changes to `Not Ready`, the VM is force deleted and rescheduled to an available node after the configured number of seconds.
Copy file name to clipboardExpand all lines: versioned_docs/version-v1.4/host/host.md
+39Lines changed: 39 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -625,3 +625,42 @@ You can configure the URL of the console for remote server management. This cons
625
625
1. Click **Console** to access the remote server.
626
626
627
627

628
+
629
+
## Rotate Expired Certificates
630
+
631
+
If the RKE2 certificates have expired, you cannot use the `auto-rotate-rke2-certificates` setting to rotate them. The setting only works when the cluster (`cluster.provisioning`) is marked `Ready`.
632
+
633
+
```
634
+
> kubectl get cluster.provisioning -n fleet-local local -o yaml | yq -e '.status.conditions[] | select(.type=="Ready")'
635
+
lastUpdateTime: "2025-10-22T06:41:33Z"
636
+
status: "True"
637
+
type: Ready
638
+
```
639
+
If the `status` field's value is `False`, you must manually rotate the certificates by following these steps on each node:
Copy file name to clipboardExpand all lines: versioned_docs/version-v1.5/advanced/settings.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,10 +64,12 @@ The following example adds disks that match the glob pattern `/dev/sd*` or `/dev
64
64
65
65
**Definition**: Setting that allows you to automatically rotate certificates for RKE2 services. This setting is disabled by default.
66
66
67
-
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). Harvester automatically replaces the certificate before the specified period ends.
67
+
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). If the certificate expires within the specified period, Harvester automatically replaces the certificate.
68
68
69
69
For more information, see the **Certificate Rotation** section of the [Rancher](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/manage-clusters/rotate-certificates) and [RKE2](https://docs.rke2.io/advanced#certificate-rotation) documentation.
70
70
71
+
If your certificates have expired, you can [rotate them manually](../host/host.md#rotate-expiring-certificates).
Copy file name to clipboardExpand all lines: versioned_docs/version-v1.5/host/host.md
+39Lines changed: 39 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -593,3 +593,42 @@ You can configure the URL of the console for remote server management. This cons
593
593
1. Click **Console** to access the remote server.
594
594
595
595

596
+
597
+
## Rotate Expired Certificates
598
+
599
+
If the RKE2 certificates have expired, you cannot use the `auto-rotate-rke2-certificates` setting to rotate them. The setting only works when the cluster (`cluster.provisioning`) is marked `Ready`.
600
+
601
+
```
602
+
> kubectl get cluster.provisioning -n fleet-local local -o yaml | yq -e '.status.conditions[] | select(.type=="Ready")'
603
+
lastUpdateTime: "2025-10-22T06:41:33Z"
604
+
status: "True"
605
+
type: Ready
606
+
```
607
+
If the `status` field's value is `False`, you must manually rotate the certificates by following these steps on each node:
Copy file name to clipboardExpand all lines: versioned_docs/version-v1.6/advanced/settings.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,10 +64,12 @@ The following example adds disks that match the glob pattern `/dev/sd*` or `/dev
64
64
65
65
**Definition**: Setting that allows you to automatically rotate certificates for RKE2 services. This setting is disabled by default.
66
66
67
-
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). Harvester automatically replaces the certificate before the specified period ends.
67
+
Use the field `expiringInHours` to specify the validity period of each certificate (`1` to `8759` hours). If the certificate expires within the specified period, Harvester automatically replaces the certificate.
68
68
69
69
For more information, see the **Certificate Rotation** section of the [Rancher](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/manage-clusters/rotate-certificates) and [RKE2](https://docs.rke2.io/advanced#certificate-rotation) documentation.
70
70
71
+
If your certificates have expired, you can [rotate them manually](../host/host.md#rotate-expiring-certificates).
-`restoreVM`: Option that enables Harvester to automatically restore previously running [non-migratable virtual machines](../vm/live-migration.md#non-migratable-virtual-machines) after the upgrade is *successfully* completed. You can specify either of the following values:
824
826
825
827
-`true`: Harvester forcibly shuts down *running* and *paused* non-migratable virtual machines on each node. After the upgrade is completed, the previously running virtual machines are automatically restarted, while the paused virtual machines remain shut down.
826
-
828
+
827
829
-`false`: This is the default value. In multi-node environments, you must stop all non-migratable virtual machines to allow the upgrade to proceed. Harvester does not restart these virtual machines after the upgrade is completed.
Copy file name to clipboardExpand all lines: versioned_docs/version-v1.6/host/host.md
+39Lines changed: 39 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -589,3 +589,42 @@ You can configure the URL of the console for remote server management. This cons
589
589
1. Click **Console** to access the remote server.
590
590
591
591

592
+
593
+
## Rotate Expired Certificates
594
+
595
+
If the RKE2 certificates have expired, you cannot use the `auto-rotate-rke2-certificates` setting to rotate them. The setting only works when the cluster (`cluster.provisioning`) is marked `Ready`.
596
+
597
+
```
598
+
> kubectl get cluster.provisioning -n fleet-local local -o yaml | yq -e '.status.conditions[] | select(.type=="Ready")'
599
+
lastUpdateTime: "2025-10-22T06:41:33Z"
600
+
status: "True"
601
+
type: Ready
602
+
```
603
+
If the `status` field's value is `False`, you must manually rotate the certificates by following these steps on each node:
0 commit comments