Skip to content

Commit 02dfa52

Browse files
committed
Update to remove 311 references
Remove 3.11 references
1 parent e1720a2 commit 02dfa52

File tree

1 file changed

+9
-42
lines changed

1 file changed

+9
-42
lines changed

articles/openshift/openshift-faq.yml

Lines changed: 9 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ms.author: johnmarc
77
ms.service: azure-redhat-openshift
88
ms.topic: faq
9-
ms.date: 07/31/2020
9+
ms.date: 01/12/2023
1010
title: Azure Red Hat OpenShift FAQ
1111
summary: This article answers frequently asked questions (FAQs) about Microsoft Azure Red Hat OpenShift.
1212

@@ -17,22 +17,16 @@ sections:
1717
answer: |
1818
For a list of supported regions for Azure Red Hat OpenShift 4.x, see [Available regions](https://azure.microsoft.com/global-infrastructure/services/?products=openshift&regions=all).
1919
20-
For a list of supported regions for Azure Red Hat OpenShift 3.11, see [Products available by region](supported-resources.md#azure-regions).
21-
2220
- question: What virtual machine sizes can I use?
2321
answer: |
2422
For a list of supported virtual machine sizes for Azure Red Hat OpenShift 4, see [Supported resources for Azure Red Hat OpenShift 4](support-policies-v4.md).
2523
26-
For a list of supported virtual machine sizes for Azure Red Hat OpenShift 3.11, see [Supported resources for Azure Red Hat OpenShift 3.11](supported-resources.md).
27-
2824
- question: What is the maximum number of pods in an Azure Red Hat OpenShift cluster? What is the maximum number of pods per node in Azure Red Hat OpenShift?
2925
answer: |
3026
The actual number of supported pods depends on an application’s memory, CPU, and storage requirements.
3127
3228
Azure Red Hat OpenShift 4.x has a 250 pod-per-node limit and a 60 compute node limit. These limits cap the maximum number of pods supported in a cluster to 250×60 = 15,000.
3329
34-
Azure Red Hat OpenShift 3.11 has a 50 pod-per-node limit and a 20 compute node limit. These limits cap the maximum number of pods supported in a cluster to 50×20 = 1,000.
35-
3630
- question: Can a cluster have compute nodes across multiple Azure regions?
3731
answer: No. All nodes in an Azure Red Hat OpenShift cluster must originate in the same Azure region.
3832

@@ -53,8 +47,6 @@ sections:
5347
answer: |
5448
On Azure Red Hat OpenShift 4.x clusters, infrastructure nodes aren't currently available.
5549
56-
On Azure Red Hat OpenShift 3.11 clusters, infrastructure nodes are included by default.
57-
5850
## How do I handle cluster upgrades?
5951
6052
For information on upgrades, maintenance, and supported versions, see the [support lifecycle guide](support-lifecycle.md).
@@ -70,24 +62,18 @@ sections:
7062
- question: Can I use Prometheus to monitor my applications?
7163
answer: |
7264
Prometheus comes pre-installed and configured for Azure Red Hat OpenShift 4.x clusters. Read more about [cluster monitoring](https://docs.openshift.com/container-platform/4.6/operators/operator_sdk/osdk-monitoring-prometheus.html).
73-
74-
For Azure Red Hat OpenShift 3.11 clusters, you can deploy Prometheus in your namespace and monitor applications in your namespace. For more information, see [Deploy Prometheus instance in Azure Red Hat OpenShift cluster](howto-deploy-prometheus.md).
75-
65+
7666
- question: Can I use Prometheus to monitor metrics related to cluster health and capacity?
7767
answer: |
7868
In Azure Red Hat OpenShift 4.x: Yes.
7969
80-
In Azure Red Hat OpenShift 3.11: No.
81-
8270
- question: Can logs of underlying VMs be streamed out to a customer log analysis system?
8371
answer: Logs from underlying VMs are handled by the managed service and aren't exposed to customers.
8472

8573
- question: How can a customer get access to metrics like CPU/memory at the node level to take action to scale, debug issues, etc.? I can’t seem to run kubectl top on an Azure Red Hat OpenShift cluster.
8674
answer: |
8775
For Azure Red Hat OpenShift 4.x clusters, the OpenShift web console contains all metrics at the node level. For more information, see the Red Hat documentation on [viewing cluster information](https://docs.openshift.com/container-platform/4.6/web_console/using-dashboard-to-get-cluster-information.html).
8876
89-
For Azure Red Hat OpenShift 3.11 clusters, customers can access the CPU/Memory metrics at the node level by using the command `oc adm top nodes` or `kubectl top nodes` with the customer-admin cluster role. Customers can also access the CPU/Memory metrics of `pods` with the command `oc adm top pods` or `kubectl top pods`.
90-
9177
- question: If we scale up the deployment, how do Azure fault domains map into pod placement to ensure all pods for a service don't get knocked out by a failure in a single fault domain?
9278
answer: |
9379
There are by default five fault domains when using virtual machine scale sets in Azure. Each virtual machine instance in a scale set will get placed into one of these fault domains. This ensures that applications deployed to the compute nodes in a cluster will get placed in separate fault domains.
@@ -112,16 +98,12 @@ sections:
11298
- [Exposing a registry](https://docs.openshift.com/container-platform/4.6/registry/securing-exposing-registry.html)
11399
- [Accessing the registry](https://docs.openshift.com/container-platform/4.6/registry/accessing-the-registry.html)
114100
115-
For 3.11 clusters, the Docker image registry is available. The Docker registry is available from `https://docker-registry.apps.<clustername>.<region>.azmosa.io/`. You can also use Azure Container Registry.
116-
117101
- name: Networking
118102
questions:
119103
- question: Can I deploy a cluster into an existing virtual network?
120104
answer: |
121105
In 4.x clusters, you can deploy a cluster into an existing VNet.
122106
123-
In 3.11 clusters, you can’t deploy a cluster into an existing VNet. You can connect an Azure Red Hat OpenShift 3.11 cluster to an existing VNet via peering.
124-
125107
- question: Is cross-namespace networking supported?
126108
answer: Customer and individual project admins can customize cross-namespace networking (including denying it) on a per-project basis using `NetworkPolicy` objects.
127109

@@ -132,11 +114,7 @@ sections:
132114
- question: Can we specify IP ranges for deployment on the private VNet, avoiding clashes with other corporate VNets once peered?
133115
answer: |
134116
In 4.x clusters, you can specify your own IP ranges.
135-
136-
In 3.11 clusters, Azure Red Hat OpenShift supports VNet peering. Azure Red Hat OpenShift allows the customer to provide a VNet to peer with and a VNet CIDR in which the OpenShift network will operate.
137-
138-
The VNet created by Azure Red Hat OpenShift will be protected and won't accept configuration changes. The VNet that is peered is controlled by the customer and resides in their subscription.
139-
117+
140118
- question: Is the Software Defined Network module configurable?
141119
answer: The Software Defined Network is `openshift-ovs-networkpolicy` and isn't configurable.
142120

@@ -165,25 +143,18 @@ sections:
165143
For more information, see the OpenShift documentation on disabling self-provisioning for your cluster version:
166144
167145
- [Disabling self-provisioning in 4.6 clusters](https://docs.openshift.com/container-platform/4.6/applications/projects/configuring-project-creation.html#disabling-project-self-provisioning_configuring-project-creation)
168-
- [Disabling self-provisioning in 3.11 clusters](https://docs.openshift.com/container-platform/3.11/admin_guide/managing_projects.html#disabling-self-provisioning)
169146
170147
- question: Which UNIX rights (in IaaS) are available for Masters/Infra/App Nodes?
171148
answer: |
172-
For 4.x clusters, node access is available through the cluster-admin role. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
173-
174-
For 3.11 clusters, node access is forbidden.
149+
Node access is available through the cluster-admin role. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
175150
176151
- question: Which OCP rights do we have? Cluster-admin? Project-admin?
177152
answer: |
178-
For 4.x clusters, the cluster-admin role is available. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
179-
180-
For 3.11 clusters, see the [cluster administration overview](https://docs.openshift.com/aro/admin_guide/index.html) for more details.
153+
The cluster-admin role is available. For more information, see [Kubernetes RBAC overview](https://docs.openshift.com/container-platform/4.6/authentication/using-rbac.html).
181154
182155
- question: Which identity providers are available?
183156
answer: |
184-
For 4.x clusters, you configure your own identity provider. For more information, see the Red Hat documentation on [configuring identity providers](https://docs.openshift.com/container-platform/4.6/authentication/identity_providers/configuring-ldap-identity-provider.html).
185-
186-
For 3.11 clusters, you can use the Azure AD integration.
157+
You configure your own identity provider. For more information, see the Red Hat documentation on [configuring identity providers](https://docs.openshift.com/container-platform/4.6/authentication/identity_providers/configuring-ldap-identity-provider.html).
187158
188159
- name: Storage
189160
questions:
@@ -207,15 +178,11 @@ sections:
207178
208179
- question: Is data stored in etcd encrypted on Azure Red Hat OpenShift?
209180
answer: |
210-
For Azure Red Hat OpenShift 4 clusters, data isn't encrypted by default, but you do have the option to enable encryption. For more information, see the guide on [encrypting etcd](https://docs.openshift.com/container-platform/4.6/security/encrypting-etcd.html).
211-
212-
For 3.11 clusters, data isn't encrypted on the etcd level. The option to turn on encryption is currently unsupported. OpenShift supports this feature, but engineering efforts are required to make it on the road map. The data is encrypted at the disk level. Refer to [Encrypting Data at Datastore Layer](https://docs.openshift.com/container-platform/3.11/admin_guide/encrypting_data.html) for more information.
213-
181+
Data isn't encrypted by default, but you do have the option to enable encryption. For more information, see the guide on [encrypting etcd](https://docs.openshift.com/container-platform/4.6/security/encrypting-etcd.html).
182+
214183
- question: Can we choose any persistent storage solution, like OCS?
215184
answer: |
216-
For 4.x clusters, Azure Disk (Premium_LRS) is configured as the default storage class. For additional storage providers, and for configuration details (including Azure File), see the Red Hat documentation on [persistent storage](https://docs.openshift.com/container-platform/4.6/storage/understanding-persistent-storage.html).
217-
218-
For 3.11 clusters, two storage classes are provided by default: one for Azure Disk (Premium_LRS) and one for Azure File.
185+
Azure Disk (Premium_LRS) is configured as the default storage class. For additional storage providers, and for configuration details (including Azure File), see the Red Hat documentation on [persistent storage](https://docs.openshift.com/container-platform/4.6/storage/understanding-persistent-storage.html).
219186
220187
## Does ARO store any customer data outside of the cluster's region?
221188

0 commit comments

Comments
 (0)