You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/support-policies-v4.md
+27-9Lines changed: 27 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: johnmarco
5
5
ms.author: johnmarc
6
6
ms.service: azure-redhat-openshift
7
7
ms.topic: conceptual
8
-
ms.date: 06/22/2023
8
+
ms.date: 09/11/2023
9
9
#Customer intent: I need to understand the Azure Red Hat OpenShift support policies for OpenShift 4.0.
10
10
---
11
11
@@ -18,25 +18,43 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
18
18
19
19
## Cluster configuration requirements
20
20
21
-
* All OpenShift Cluster operators must remain in a managed state. The list of cluster operators can be returned by running `oc get clusteroperators`.
21
+
### Compute
22
+
22
23
* The cluster must have a minimum of three worker nodes and three master nodes.
23
24
* Don't scale the cluster workers to zero, or attempt a cluster shutdown. Deallocating or powering down any virtual machine in the cluster resource group is not supported.
25
+
* If you are making use of infrastructure nodes, do not run any undesignated workloads on them as this may affect the Service Level Agreement and cluster stability. Also, it is strongly recommended to have at least 3 infrastructure nodes; one in each availability zone. See [Deploy infrastructure nodes in an Azure Red Hat OpenShift (ARO) cluster](howto-infrastructure-nodes.md) for more information.
26
+
* Non-RHCOS compute nodes aren't supported. For example, you can't use a RHEL compute node.
27
+
* Don't attempt to remove or replace a master node. These are high risk operations that can cause issues with etcd, permanent network loss, as well as loss of access and manageability by ARO SRE. If you feel that a master node should be replaced or removed, please contact support before making any changes.
28
+
29
+
### Operators
30
+
31
+
* All OpenShift Cluster operators must remain in a managed state. The list of cluster operators can be returned by running `oc get clusteroperators`.
32
+
33
+
### Workload management
34
+
24
35
* Don't add taints that would prevent any default OpenShift components from being scheduled.
36
+
* To avoid disruption resulting from cluster maintenance, in-cluster workloads should be configured with high availability practices, including but not limited to pod affinity and anti-affinity, pod disruption budgets, and adequate scaling.
37
+
* Don't run extra workloads on the control plane nodes. While they can be scheduled on the control plane nodes, it will cause extra resource usage and stability issues that can affect the entire cluster.
38
+
39
+
### Logging and monitoring
40
+
25
41
* Don't remove or modify the default cluster Prometheus service, except to modify scheduling of the default Prometheus instance.
26
42
* Don't remove or modify the default cluster Alertmanager svc, default receiver, or any default alerting rules, except to add additional receivers to notify external systems.
27
-
* The ARO-provided Network Security Group can't be modified or replaced. Any attempt to modify or replace it will be reverted.
28
43
* Don't remove or modify Azure Red Hat OpenShift service logging (mdsd pods).
29
-
* Don't remove or modify the 'arosvc.azurecr.io' cluster pull secret.
44
+
45
+
### Network and security
46
+
47
+
* The ARO-provided Network Security Group can't be modified or replaced. Any attempt to modify or replace it will be reverted.
30
48
* All cluster virtual machines must have direct outbound internet access, at least to the Azure Resource Manager (ARM) and service logging (Geneva) endpoints. No form of HTTPS proxying is supported.
49
+
* The Azure Red Hat OpenShift service accesses your cluster via Private Link Service. Don't remove or modify service access.
50
+
51
+
### Cluster management
52
+
53
+
* Don't remove or modify the 'arosvc.azurecr.io' cluster pull secret.
31
54
* Don't override any of the cluster's MachineConfig objects (for example, the kubelet configuration) in any way.
32
55
* Don't set any unsupportedConfigOverrides options. Setting these options prevents minor version upgrades.
33
-
* The Azure Red Hat OpenShift service accesses your cluster via Private Link Service. Don't remove or modify service access.
34
-
* To avoid disruption resulting from cluster maintenance, in-cluster workloads should be configured with high availability practices, including but not limited to pod affinity and anti-affinity, pod disruption budgets, and adequate scaling.
35
-
* Non-RHCOS compute nodes aren't supported. For example, you can't use a RHEL compute node.
36
56
* Don't place policies within your subscription or management group that prevent SREs from performing normal maintenance against the Azure Red Hat OpenShift cluster. For example, don't require tags on the Azure Red Hat OpenShift RP-managed cluster resource group.
37
-
* Do not run extra workloads on the control plane nodes. While they can be scheduled on the control plane nodes, it will cause extra resource usage and stability issues that can affect the entire cluster.
38
57
* Don't circumvent the deny assignment that is configured as part of the service, or perform administrative tasks that are normally prohibited by the deny assignment.
39
-
* If you are making use of infrastructure nodes, do not run any undesignated workloads on them as this may affect the Service Level Agreement and cluster stability. Also, it is strongly recommended to have at least 3 infrastructure nodes; one in each availability zone. See [Deploy infrastructure nodes in an Azure Red Hat OpenShift (ARO) cluster](howto-infrastructure-nodes.md) for more information.
40
58
* OpenShift relies on the ability to automatically tag Azure resources. If you have configured a tagging policy, do not apply more than 10 user-defined tags to resources in the managed resource group.
0 commit comments