You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/openshift-faq.yml
+9-42Lines changed: 9 additions & 42 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ metadata:
6
6
ms.author: johnmarc
7
7
ms.service: azure-redhat-openshift
8
8
ms.topic: faq
9
-
ms.date: 07/31/2020
9
+
ms.date: 01/12/2023
10
10
title: Azure Red Hat OpenShift FAQ
11
11
summary: This article answers frequently asked questions (FAQs) about Microsoft Azure Red Hat OpenShift.
12
12
@@ -17,22 +17,16 @@ sections:
17
17
answer: |
18
18
For a list of supported regions for Azure Red Hat OpenShift 4.x, see [Available regions](https://azure.microsoft.com/global-infrastructure/services/?products=openshift®ions=all).
19
19
20
-
For a list of supported regions for Azure Red Hat OpenShift 3.11, see [Products available by region](supported-resources.md#azure-regions).
21
-
22
20
- question: What virtual machine sizes can I use?
23
21
answer: |
24
22
For a list of supported virtual machine sizes for Azure Red Hat OpenShift 4, see [Supported resources for Azure Red Hat OpenShift 4](support-policies-v4.md).
25
23
26
-
For a list of supported virtual machine sizes for Azure Red Hat OpenShift 3.11, see [Supported resources for Azure Red Hat OpenShift 3.11](supported-resources.md).
27
-
28
24
- question: What is the maximum number of pods in an Azure Red Hat OpenShift cluster? What is the maximum number of pods per node in Azure Red Hat OpenShift?
29
25
answer: |
30
26
The actual number of supported pods depends on an application’s memory, CPU, and storage requirements.
31
27
32
28
Azure Red Hat OpenShift 4.x has a 250 pod-per-node limit and a 60 compute node limit. These limits cap the maximum number of pods supported in a cluster to 250×60 = 15,000.
33
29
34
-
Azure Red Hat OpenShift 3.11 has a 50 pod-per-node limit and a 20 compute node limit. These limits cap the maximum number of pods supported in a cluster to 50×20 = 1,000.
35
-
36
30
- question: Can a cluster have compute nodes across multiple Azure regions?
37
31
answer: No. All nodes in an Azure Red Hat OpenShift cluster must originate in the same Azure region.
38
32
@@ -53,8 +47,6 @@ sections:
53
47
answer: |
54
48
On Azure Red Hat OpenShift 4.x clusters, infrastructure nodes aren't currently available.
55
49
56
-
On Azure Red Hat OpenShift 3.11 clusters, infrastructure nodes are included by default.
57
-
58
50
## How do I handle cluster upgrades?
59
51
60
52
For information on upgrades, maintenance, and supported versions, see the [support lifecycle guide](support-lifecycle.md).
@@ -70,24 +62,18 @@ sections:
70
62
- question: Can I use Prometheus to monitor my applications?
71
63
answer: |
72
64
Prometheus comes pre-installed and configured for Azure Red Hat OpenShift 4.x clusters. Read more about [cluster monitoring](https://docs.openshift.com/container-platform/4.6/operators/operator_sdk/osdk-monitoring-prometheus.html).
73
-
74
-
For Azure Red Hat OpenShift 3.11 clusters, you can deploy Prometheus in your namespace and monitor applications in your namespace. For more information, see [Deploy Prometheus instance in Azure Red Hat OpenShift cluster](howto-deploy-prometheus.md).
75
-
65
+
76
66
- question: Can I use Prometheus to monitor metrics related to cluster health and capacity?
77
67
answer: |
78
68
In Azure Red Hat OpenShift 4.x: Yes.
79
69
80
-
In Azure Red Hat OpenShift 3.11: No.
81
-
82
70
- question: Can logs of underlying VMs be streamed out to a customer log analysis system?
83
71
answer: Logs from underlying VMs are handled by the managed service and aren't exposed to customers.
84
72
85
73
- question: How can a customer get access to metrics like CPU/memory at the node level to take action to scale, debug issues, etc.? I can’t seem to run kubectl top on an Azure Red Hat OpenShift cluster.
86
74
answer: |
87
75
For Azure Red Hat OpenShift 4.x clusters, the OpenShift web console contains all metrics at the node level. For more information, see the Red Hat documentation on [viewing cluster information](https://docs.openshift.com/container-platform/4.6/web_console/using-dashboard-to-get-cluster-information.html).
88
76
89
-
For Azure Red Hat OpenShift 3.11 clusters, customers can access the CPU/Memory metrics at the node level by using the command `oc adm top nodes` or `kubectl top nodes` with the customer-admin cluster role. Customers can also access the CPU/Memory metrics of `pods` with the command `oc adm top pods` or `kubectl top pods`.
90
-
91
77
- question: If we scale up the deployment, how do Azure fault domains map into pod placement to ensure all pods for a service don't get knocked out by a failure in a single fault domain?
92
78
answer: |
93
79
There are by default five fault domains when using virtual machine scale sets in Azure. Each virtual machine instance in a scale set will get placed into one of these fault domains. This ensures that applications deployed to the compute nodes in a cluster will get placed in separate fault domains.
@@ -112,16 +98,12 @@ sections:
112
98
- [Exposing a registry](https://docs.openshift.com/container-platform/4.6/registry/securing-exposing-registry.html)
113
99
- [Accessing the registry](https://docs.openshift.com/container-platform/4.6/registry/accessing-the-registry.html)
114
100
115
-
For 3.11 clusters, the Docker image registry is available. The Docker registry is available from `https://docker-registry.apps.<clustername>.<region>.azmosa.io/`. You can also use Azure Container Registry.
116
-
117
101
- name: Networking
118
102
questions:
119
103
- question: Can I deploy a cluster into an existing virtual network?
120
104
answer: |
121
105
In 4.x clusters, you can deploy a cluster into an existing VNet.
122
106
123
-
In 3.11 clusters, you can’t deploy a cluster into an existing VNet. You can connect an Azure Red Hat OpenShift 3.11 cluster to an existing VNet via peering.
124
-
125
107
- question: Is cross-namespace networking supported?
126
108
answer: Customer and individual project admins can customize cross-namespace networking (including denying it) on a per-project basis using `NetworkPolicy` objects.
127
109
@@ -132,11 +114,7 @@ sections:
132
114
- question: Can we specify IP ranges for deployment on the private VNet, avoiding clashes with other corporate VNets once peered?
133
115
answer: |
134
116
In 4.x clusters, you can specify your own IP ranges.
135
-
136
-
In 3.11 clusters, Azure Red Hat OpenShift supports VNet peering. Azure Red Hat OpenShift allows the customer to provide a VNet to peer with and a VNet CIDR in which the OpenShift network will operate.
137
-
138
-
The VNet created by Azure Red Hat OpenShift will be protected and won't accept configuration changes. The VNet that is peered is controlled by the customer and resides in their subscription.
139
-
117
+
140
118
- question: Is the Software Defined Network module configurable?
141
119
answer: The Software Defined Network is `openshift-ovs-networkpolicy` and isn't configurable.
142
120
@@ -165,25 +143,18 @@ sections:
165
143
For more information, see the OpenShift documentation on disabling self-provisioning for your cluster version:
166
144
167
145
- [Disabling self-provisioning in 4.6 clusters](https://docs.openshift.com/container-platform/4.6/applications/projects/configuring-project-creation.html#disabling-project-self-provisioning_configuring-project-creation)
168
-
- [Disabling self-provisioning in 3.11 clusters](https://docs.openshift.com/container-platform/3.11/admin_guide/managing_projects.html#disabling-self-provisioning)
169
146
170
147
- question: Which UNIX rights (in IaaS) are available for Masters/Infra/App Nodes?
171
148
answer: |
172
-
For 4.x clusters, node access is available through the cluster-admin role. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
173
-
174
-
For 3.11 clusters, node access is forbidden.
149
+
Node access is available through the cluster-admin role. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
175
150
176
151
- question: Which OCP rights do we have? Cluster-admin? Project-admin?
177
152
answer: |
178
-
For 4.x clusters, the cluster-admin role is available. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
179
-
180
-
For 3.11 clusters, see the [cluster administration overview](https://docs.openshift.com/aro/admin_guide/index.html) for more details.
153
+
The cluster-admin role is available. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
181
154
182
155
- question: Which identity providers are available?
183
156
answer: |
184
-
For 4.x clusters, you configure your own identity provider. For more information, see the Red Hat documentation on [configuring identity providers](https://docs.openshift.com/container-platform/4.6/authentication/identity_providers/configuring-ldap-identity-provider.html).
185
-
186
-
For 3.11 clusters, you can use the Azure AD integration.
157
+
You configure your own identity provider. For more information, see the Red Hat documentation on [configuring identity providers](https://docs.openshift.com/container-platform/4.6/authentication/identity_providers/configuring-ldap-identity-provider.html).
187
158
188
159
- name: Storage
189
160
questions:
@@ -207,15 +178,11 @@ sections:
207
178
208
179
- question: Is data stored in etcd encrypted on Azure Red Hat OpenShift?
209
180
answer: |
210
-
For Azure Red Hat OpenShift 4 clusters, data isn't encrypted by default, but you do have the option to enable encryption. For more information, see the guide on [encrypting etcd](https://docs.openshift.com/container-platform/4.6/security/encrypting-etcd.html).
211
-
212
-
For 3.11 clusters, data isn't encrypted on the etcd level. The option to turn on encryption is currently unsupported. OpenShift supports this feature, but engineering efforts are required to make it on the road map. The data is encrypted at the disk level. Refer to [Encrypting Data at Datastore Layer](https://docs.openshift.com/container-platform/3.11/admin_guide/encrypting_data.html) for more information.
213
-
181
+
Data isn't encrypted by default, but you do have the option to enable encryption. For more information, see the guide on [encrypting etcd](https://docs.openshift.com/container-platform/4.6/security/encrypting-etcd.html).
182
+
214
183
- question: Can we choose any persistent storage solution, like OCS?
215
184
answer: |
216
-
For 4.x clusters, Azure Disk (Premium_LRS) is configured as the default storage class. For additional storage providers, and for configuration details (including Azure File), see the Red Hat documentation on [persistent storage](https://docs.openshift.com/container-platform/4.6/storage/understanding-persistent-storage.html).
217
-
218
-
For 3.11 clusters, two storage classes are provided by default: one for Azure Disk (Premium_LRS) and one for Azure File.
185
+
Azure Disk (Premium_LRS) is configured as the default storage class. For additional storage providers, and for configuration details (including Azure File), see the Red Hat documentation on [persistent storage](https://docs.openshift.com/container-platform/4.6/storage/understanding-persistent-storage.html).
219
186
220
187
## Does ARO store any customer data outside of the cluster's region?
0 commit comments