Skip to content
Merged
Show file tree
Hide file tree
Changes from 47 commits
Commits
Show all changes
48 commits
Select commit Hold shift + click to select a range
d6bbc9b
docs: release 4.8.a
addetz Dec 1, 2025
d815b5a
Merge branch 'master' into docs-rel-4-8-a
addetz Dec 9, 2025
6110193
docs: bump date
addetz Dec 9, 2025
3a78d6f
docs: add kubeconfig breaking change PEM-9185 (#8950)
addetz Dec 9, 2025
c2eabb3
docs: Palette Optimized Canonical - Tech Preview Exit (#8955)
achuribooks Dec 12, 2025
e36fa9f
docs: Cluster Templates - Tech Preview Exit (#8957)
achuribooks Dec 15, 2025
b0c9489
docs: OCI Helm Registries without authentication (#8973)
benradstone Dec 16, 2025
90d04ae
docs: Cluster Template Time Zone + Repave Behavior (#8984)
achuribooks Dec 16, 2025
b5e0888
Merge branch 'master' into docs-rel-4-8-a
addetz Dec 16, 2025
db46a18
docs: PE-7907 Document trusted boot exiting tech preview (#9006)
svetlana-efimova Dec 18, 2025
019b349
docs: DOC-1855: VerteX Azure Government Secret Cloud Support (#8034)
achuribooks Dec 18, 2025
b45adf0
Merge branch 'master' into docs-rel-4-8-a
addetz Dec 18, 2025
441c4af
Reverting PE-7908 due to 4.8.b shift (#9053)
achuribooks Jan 5, 2026
4d4c42c
Merge branch 'master' into docs-rel-4-8-a
addetz Jan 5, 2026
2e35fae
docs: PE-7882 Document network configuration via Local UI (#9054)
svetlana-efimova Jan 5, 2026
c136a75
Pcp 5686 cloudstack annotations again (#9098)
Linus-SpectroCloud Jan 6, 2026
8c3f224
Merge branch 'master' into docs-rel-4-8-a
benradstone Jan 7, 2026
1ceca49
docs: add private DNS zone configuration to AKS PCP-5583 (#9077)
addetz Jan 7, 2026
1f9ace0
docs: add deprecation note for cert manager DOC-2454 (#9109)
addetz Jan 7, 2026
cf87d02
pcp-5283: cloudstack additional worker pool field for kubeadm overrid…
Linus-SpectroCloud Jan 7, 2026
8bfef58
PCP-5687 - AWS Dedicated Hosts support for AWS IaaS clusters (#9005)
benradstone Jan 7, 2026
6df1069
docs: Remove stylus.installationMode and Other Deprecation Updates (#…
achuribooks Jan 7, 2026
79c3614
docs: Spectro Kubernetes Dashboard support for AWS EKS (#9112)
benradstone Jan 8, 2026
7dbaf3b
Merge branch 'master' into docs-rel-4-8-a
addetz Jan 8, 2026
3d96b97
docs: add zarf oci sync PEM-9022 (#9120)
addetz Jan 8, 2026
658f54e
Merge branch 'master' into docs-rel-4-8-a
benradstone Jan 9, 2026
76387ae
doc-2459:fix notify-slack on docs-rel-4-8-a (#9131)
Linus-SpectroCloud Jan 9, 2026
ab71047
pcp-5589: cloudstack image node pool configuration using template fro…
Linus-SpectroCloud Jan 9, 2026
5e741cd
docs: deprecate Kubernetes dashbooard packs DOC-2456 (#9122)
addetz Jan 9, 2026
51f6dbe
Pcp 5684 rolling update custom (#9133)
Linus-SpectroCloud Jan 9, 2026
f14849d
docs: installCRDs option for VMO installations (#9153)
benradstone Jan 13, 2026
755e60c
Remove airgap limitation (#9152)
svetlana-efimova Jan 13, 2026
46527d5
Merge branch 'master' into docs-rel-4-8-a
benradstone Jan 14, 2026
e053a33
docs: add warning about Kubernetes Dashboard on EKS PEM-9606 (#9172)
addetz Jan 14, 2026
09333bf
doc-2270: cert manager addon for 4.8.a (#9165)
Linus-SpectroCloud Jan 15, 2026
5f0fee7
docs: PE-7905: Edge GPU Lookup (#9181)
achuribooks Jan 15, 2026
94279fd
docs: PE-7889 Document how to deploy MAAS Edge hosts (#9134)
svetlana-efimova Jan 15, 2026
9a2472e
doc: PE-7645 Document how to select ISO installation device in TUI (#…
svetlana-efimova Jan 15, 2026
cba1e24
Merge branch 'master' into docs-rel-4-8-a
benradstone Jan 16, 2026
16c30b7
docs: add release notes 4.8.a DOC-2335 DOC-2463 (#9171)
addetz Jan 16, 2026
fe14736
doc-2339: new apis (#9199)
Linus-SpectroCloud Jan 16, 2026
8909fb1
docs: PCP-5685 + PCP-5686: Worker Pool Annotations + Kubeadm Override…
achuribooks Jan 16, 2026
95a81ad
doc-2334: updated oss licenses (#9197)
Linus-SpectroCloud Jan 16, 2026
30c8d65
docs: DOC-2415 and DOC-1897: AWS Secret Cleanup + MirrorRegistry v2 E…
achuribooks Jan 16, 2026
95684cb
docs: DOC-2337 [4.8.a] Update Self-Hosted and VerteX Upgrade Path Mat…
svetlana-efimova Jan 18, 2026
6672198
docs: DOC-2336 Generate release 4.8.21 updates (#9202)
svetlana-efimova Jan 18, 2026
8f2f97f
Changing Jan 17 to Jan 18
achuribooks Jan 18, 2026
462f697
Updating TF/CP version 0.27.0
achuribooks Jan 18, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
51 changes: 47 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -515,6 +515,16 @@ Result

### Admonitions - Warning / Info / Tip / Danger / Tech Preview / Further Guidance

For guidance on using admonitions in our docs, refer to
[Spectro Cloud Internal Style Guide: Admonitions/Callouts](https://spectrocloud.atlassian.net/wiki/spaces/DE/pages/1765933057/Spectro+Cloud+Internal+Style+Guide#Admonitions%2FCallouts).

To learn more about admonitions in Docusaurus, refer to the
[Admonitions](https://docusaurus.io/docs/markdown-features/admonitions) guide.

The content must have a new line at the beginning and at the end of the tag.

#### Warning

```mdx
:::warning

Expand All @@ -523,6 +533,8 @@ Some **content** with _Markdown_ `syntax`.
:::
```

#### Info

```mdx
:::info

Expand All @@ -531,6 +543,8 @@ Some **content** with _Markdown_ `syntax`.
:::
```

#### Tip

```mdx
:::tip

Expand All @@ -539,6 +553,8 @@ Some **content** with _Markdown_ `syntax`.
:::
```

#### Danger

```mdx
:::danger

Expand All @@ -547,6 +563,15 @@ Some **content** with _Markdown_ `syntax`.
:::
```

#### Tech Preview

The `:::preview` admonition is a custom admonition configured in `docusaurus.config.js` under `admonitions.keywords`.

Unlike other admonition types, you do not need to enter content in the admonition block. By default, the Tech Preview
admonition generates the message, "This is a Tech Preview feature and is subject to change. Do not use this feature in
production workloads." This message is hardcoded using `src/theme/Admonition/Type/TechPreview.js`. However, if you need
to deviate from the template text, you can provide a custom message.

```mdx
:::preview

Expand All @@ -555,6 +580,22 @@ Some **content** with _Markdown_ `syntax`.
:::
```

Files in `docs/docs-content` and `docs/api-content` are processed during the build phase. However, partials in the
`_partials` directory are dynamically imported at runtime. Because of this, custom admonitions defined in
`docusaurus.config.js` that are used in partials are not rendered, and the custom admonition is ignored.

As a workaround, when using custom admonitions in partials, import and reference the admonition with JSX syntax.

```mdx
import AdmonitionTypeTechPreview from '@theme/Admonition/Type/TechPreview'; # Import below front matter

<AdmonitionTypeTechPreview /> # Use instead of :::
```

Note that when used in partials, the default message cannot be overridden.

#### Further Guidance

```mdx
:::further

Expand All @@ -563,12 +604,14 @@ Some **content** with _Markdown_ `syntax`.
:::
```

https://docusaurus.io/docs/markdown-features/admonitions
Like Tech Preview, the Further Guidance admonition is a custom admonition. To use this admonition in partials, you must
import and reference it with JSX syntax.

The content must have a new line at the beginning and at the end of the tag.
```mdx
import AdmonitionTypeFurtherGuidance from '@theme/Admonition/Type/FurtherGuidance'; # Import below front matter

For guidance on using admonitions, refer to
[Spectro Cloud Internal Style Guide: Admonitions/Callouts](https://spectrocloud.atlassian.net/wiki/spaces/DE/pages/1765933057/Spectro+Cloud+Internal+Style+Guide#Admonitions%2FCallouts).
<AdmonitionTypeFurtherGuidance /> # Use instead of :::
```

### Video

Expand Down
31 changes: 0 additions & 31 deletions _partials/_aws-static-credentials-setup.mdx

This file was deleted.

40 changes: 0 additions & 40 deletions _partials/_azure-cloud-account-setup.mdx

This file was deleted.

1 change: 1 addition & 0 deletions _partials/_palette-kubernetes-versions.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ For installations using a Kubernetes cluster, we support any non-EOL (End of Lif

| **Palette Version** <!-- kubernetes-max-version-table --> | **Highest Supported Kubernetes Version** |
| ------------------- | ---------------------- |
| <!-- k8s-max-4-8-a --> 4.8.21 | 1.35.5 |
| <!-- k8s-max-4.8.0 --> 4.8.6 | 1.34.2 |
| <!-- k8s-max-4-7-c --> 4.7.27 | 1.33.0 |
| <!-- k8s-max-4.7.b --> 4.7.20 | 1.33.0 |
Expand Down
17 changes: 4 additions & 13 deletions _partials/cluster-templates/_profile-vs-template.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -3,16 +3,8 @@ partial_category: cluster-templates
partial_name: profile-vs-template
---

import AdmonitionTypeTechPreview from '@theme/Admonition/Type/TechPreview';

Choose between deploying your cluster using individual <VersionedLink text="cluster profiles" url="/profiles/cluster-profiles/" />
or a single <VersionedLink text="cluster template" url="/cluster-templates" />.

:::info

<VersionedLink text="Cluster templates" url="/cluster-templates" /> are a Tech Preview feature and can be used only if the **ClusterTemplates** <VersionedLink text="feature flag" url="/enterprise-version/system-management/feature-flags/" /> is enabled.

:::
or a single <VersionedLink text="cluster template" url="/cluster-templates" />.

<Tabs>

Expand All @@ -26,18 +18,17 @@ or a single <VersionedLink text="cluster template" url="/cluster-templates" />.
3. Review the layers of your cluster profile. Use the drop-down menus to select the appropriate cluster profile version, add necessary
<VersionedLink text="add-on profiles" url="/profiles/cluster-profiles/create-cluster-profiles/create-addon-profile/" />, and make changes to YAML configuration files as needed. {props.additional_info} When finished, select **Next**.

:::tip
:::info

For ease of reuse and to persist changes across clusters using the same cluster profile, we recommend <VersionedLink text="creating a new version of your cluster profile" url="/profiles/cluster-profiles/modify-cluster-profiles/version-cluster-profile" /> rather than making inline changes.
- Cluster profile versions linked to cluster templates cannot be used in the cluster profile workflow.
- For ease of reuse and to persist changes across clusters using the same cluster profile, we recommend <VersionedLink text="creating a new version of your cluster profile" url="/profiles/cluster-profiles/modify-cluster-profiles/version-cluster-profile" /> rather than making inline changes.

:::

</TabItem>

<TabItem value="template" label="Cluster Templates">

<AdmonitionTypeTechPreview />

1. On the **Cluster setup type** window, choose **Cluster Template > Select Cluster Template**.

2. Select the appropriate cluster template and **Confirm** your selection.
Expand Down
15 changes: 15 additions & 0 deletions _partials/clusters/_clusters_cluster-settings.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
partial_category: clusters
partial_name: cluster-settings
---

On the **Cluster Settings** page, configure additional
options as needed. If you are deploying your cluster using [cluster templates](/cluster-templates), a **Cluster Timezone** is required.

| **Left Menu Item** | **Additional Information** |
| --- | --- |
| **Cluster Timezone** | Specify the time zone where your cluster is being deployed. The time zone is used in [maintenance policies](/cluster-templates/create-cluster-template-policies/maintenance-policy) to determine when updates are rolled out to clusters deployed with [cluster templates](/cluster-templates).
| **Manage machines** | Set an [OS patching](/clusters/cluster-management/os-patching) schedule and specify node behavior when creating your cluster, including upgrading your nodes to use the latest OS patch version and allowing reboots. |
| **Schedule scans** | Enable any scan options you want Palette to perform and select a scan schedule. Palette supports Kubernetes configuration security, penetration testing, and conformance testing. Refer to [Compliance Scan](/clusters/cluster-management/compliance-scan/#configuration-security) for details on each scan type. |
| **Schedule backups** | Schedule backups for your entire cluster or etcd. Refer to [Backup and Restore](/clusters/cluster-management/backup-restore) for more information. |
| **RBAC** | Map a set of users or groups to a Kubernetes RBAC role. This is required when custom OIDC is configured. Refer to the following guides for more information: <br />- [Create Role Bindings](/clusters/cluster-management/cluster-rbac/#create-role-bindings) <br /> - <VersionedLink text="Palette eXtended Kubernetes (PXK)" url="/integrations/packs/?pack=kubernetes&tab=custom" /> |
12 changes: 12 additions & 0 deletions _partials/clusters/aws/_aws-account-setup-validate.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
---
partial_category: clusters-aws-account-setup
partial_name: aws-account-setup-validate
---

1. Log in to {props.edition} as a tenant admin.

2. From the left main menu, select **Tenant Settings**.

3. From the **Tenant Settings Menu**, select **Cloud Accounts**.

4. Verify that your AWS account appears in the **AWS** section.
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
---
partial_category: clusters-aws-account-setup
partial_name: aws-dynamic-credentials-enablement-1
---

1. Log in to [Palette](https://console.spectrocloud.com) or Palette VerteX as a tenant admin.

2. From the left main menu, select **Tenant Settings**.

3. From the **Tenant Settings** menu, select **Cloud Accounts**.

4. Locate the **AWS** section and select **Add AWS Account**.

5. Fill out the following information.

| **Palette Parameter** | **Description** |
| -------------------------- | --------------------------------------------------------------------------------------------------- |
| **Account Name** | Enter a custom account name. The account name must be unique within the tenant scope. |
| **Description (Optional)** | Enter a description for the cloud account. |
| **Partition** | Select **{props.partition}**. |
| **STS** | Select **STS** to authenticate your AWS account using STS credentials and reveal the **ARN** field. |

6. When you select **STS**, the right side of the wizard populates with details on how to create an IAM role for
Palette. Log in to your AWS account and begin the IAM role creation process by navigating to **IAM > Roles > Create
role**. The following table expands on the information provided by the wizard.

| **AWS Parameter** | **Description** |
| ------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **Trusted entity type** | Select **AWS account**. In the **An AWS account** section, select **Another AWS account**. |
| **Account ID** | Copy the **Account ID** displayed on the Palette wizard. If using a self-hosted instance, this is the same AWS account that you configured for your Palette or Palette VerteX instance to enable STS. Refer to the appropriate [Enable Adding AWS Accounts Using STS - Palette](/enterprise-version/system-management/configure-aws-sts-account/) or [Enable Adding AWS Accounts Using STS - VerteX](/vertex/system-management/configure-aws-sts-account/) guide for more information. |
| **Require external ID** | In the **An AWS account** section, below **Options**, select **Require External ID**. |
| **External ID** | Copy the **External ID** displayed on the Palette wizard. This ID is generated by Palette and is different for each tenant. |
| **Permissions policies** | Search for and select the [required IAM policies](/clusters/public-cloud/aws/required-iam-policies/): **PaletteControllerPolicy**, **PaletteControlPlanePolicy**, **PaletteDeploymentPolicy**, and **PaletteNodesPolicy**. If deploying EKS clusters, add the **PaletteControllersEKSPolicy** as well. |
| **Role name** | In the **Role details** section, enter `SpectroCloudRole` for the **Role name**. |

7. Your new role appears in the **Roles** list. Locate and select the new role. In the **Summary** section, copy the
Amazon Resource Name (**ARN**) for the role.

8. In Palette, paste the role ARN into the **ARN** field.

Loading
Loading