Skip to content

Commit 7b5e9e1

Browse files
committed
OpenShift service definition-fix blocking issues
1 parent 9124554 commit 7b5e9e1

File tree

1 file changed

+30
-10
lines changed

1 file changed

+30
-10
lines changed

articles/openshift/openshift-service-definitions.md

Lines changed: 30 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Red Hat OpenShift Service Definition
3-
description: Azure Red Hat OpenShift Service Definition
2+
title: Azure Red Hat OpenShift service definition
3+
description: Azure Red Hat OpenShift service definition
44
ms.service: azure-redhat-openshift
55
ms.topic: article
66
author: rahulm23
@@ -10,7 +10,9 @@ keywords: azure, openshift, aro, red hat, service, definition
1010
#Customer intent: I need to understand Azure Red Hat OpenShift services to manage my subscription.
1111
---
1212

13-
# Account management
13+
# Azure Red Hat OpenShift account management
14+
15+
The following sections provide service definitions to help you manage your Azure Red Hat OpenShift account.
1416

1517
## Billing
1618

@@ -29,6 +31,7 @@ For more information about pricing, see [Azure Red Hat OpenShift pricing](https:
2931
Customers can create and delete their clusters using the Azure command-line utility (CLI). Azure Red Hat OpenShift clusters deploy with a kubeadmin user whose credentials are available from the Azure CLI after a cluster is successfully deployed.
3032

3133
You can perform all other Azure Red Hat OpenShift cluster actions, such as scaling nodes, by interacting with the OpenShift API using tools such as the OpenShift web console or the OpenShift CLI (oc).
34+
3235
## Azure resource architecture
3336

3437
An Azure Red Hat OpenShift deployment requires two resource groups within an Azure subscription. The first resource group is created by the customer and contains the virtual networking components for the cluster. Keeping the networking elements separate allows the customer to configure Azure Red Hat OpenShift to meet requirements and to add any peering options.
@@ -74,9 +77,8 @@ az provider show -n Microsoft.RedHatOpenShift --query "resourceTypes[?resourceTy
7477
Once deployed, an Azure Red Hat OpenShift cluster can't be moved to a different region. Similarly, you can't transfer Azure Red Hat OpenShift clusters between subscriptions.
7578

7679
## Service level agreement
77-
Microsoft and Red Hat operate and support Azure Red Hat OpenShift jointly. It is operated and supported with a service level agreement (SLA) of 99.95 percent availability
7880

79-
* For more SLA details, see [SLA for Azure Red Hat OpenShift](https://azure.microsoft.com/support/legal/sla/openshift/v1_0/).
81+
For SLA details, see [SLA for Azure Red Hat OpenShift](https://azure.microsoft.com/support/legal/sla/openshift/v1_0/).
8082

8183
## Support
8284

@@ -91,6 +93,8 @@ To open support tickets directly with Red Hat, your cluster will need to have a
9193

9294
## Logging
9395

96+
The following sections provide information about Azure Red Hat OpenShift security.
97+
9498
### Cluster operations and audit logging
9599

96100
Azure Red Hat OpenShift deploys with services for maintaining the health and performance of the cluster and its components. These services include cluster operations and audit logs. Cluster operations and audit logs are forwarded automatically to an Azure aggregation system for support and troubleshooting. This data is only accessible to authorized support staff via approved mechanisms.
@@ -106,6 +110,8 @@ The logging stack, [Logging Operator](https://operatorhub.io/operator/logging-op
106110
If the cluster logging stack is installed, application logs sent to STDOUT are collected by Fluentd. The application logs are made available through the cluster logging stack. Retention is set to seven days, but won't exceed 200 GiB of logs per shard. For longer term retention, customers should follow the sidecar container design in their deployments. Customers should forward logs to the log aggregation or analytics service of their choice.
107111

108112
## Monitoring
113+
114+
The following section provides information about Azure Red Hat OpenShift security.
109115
### Cluster metrics
110116

111117
Azure Red Hat OpenShift deploys with services for maintaining the health and performance of the cluster and its components. These services include the streaming of important metrics to an Azure aggregation system for support and troubleshooting purposes. This data is only accessible to authorized support staff via approved mechanisms.
@@ -115,6 +121,8 @@ Azure Red Hat OpenShift clusters come with an integrated Prometheus/Grafana stac
115121
These metrics, which are accessible via the web console, can also be used to view cluster-level status and capacity/usage through a Grafana dashboard. These metrics also allow for horizontal pod autoscaling that is based on CPU or memory metrics provided by an Azure Red Hat OpenShift customer.
116122

117123
## Network
124+
The following sections provide information about the Azure Red Hat OpenShift network.
125+
118126
### Domain-validated certificates
119127

120128
By default, Azure Red Hat OpenShift includes TLS security certificates needed for both internal and external services on the cluster. For external routes, a Transport Layer Security (TLS) wildcard certificate is provided and installed in the cluster. A TLS certificate is also used for the OpenShift API endpoint. DigiCert is the certificate authority (CA) used for these certificates.
@@ -132,13 +140,14 @@ By default, Azure Red Hat OpenShift uses self-signed certificates for all of the
132140

133141
Azure Red Hat OpenShift supports the use of CAs to be trusted by builds when pulling images from an image registry.
134142

135-
### Load Balancers
143+
### Load balancers
136144

137145
Azure Red Hat OpenShift deploys with two Azure load balancers. The first is used for ingress traffic to applications and for the OpenShift and Kubernetes APIs. The second is used for internal communications between cluster components.
138146

139147
### Cluster ingress
140148

141149
Project administrators can add route annotations for many different purposes, including ingress control via an IP allowlist.
150+
142151
Ingress policies can be changed by using NetworkPolicy objects, which use the ovs-networkpolicy plugin. Using NetworkPolicy objects allows for full control over ingress network policy down to the pod level, including between pods on the same cluster and even in the same namespace.
143152

144153
All cluster ingress traffic traverses the defined load balancer.
@@ -164,6 +173,9 @@ No monitoring of these private network connections is provided by Red Hat SRE. M
164173
Azure Red Hat OpenShift customers can specify their own DNS servers. For more information, see [Configure custom DNS for your Azure Red Hat OpenShift cluster](./howto-custom-dns.md).
165174

166175
## Storage
176+
177+
The following sections provide information about Azure Red Hat OpenShift storage.
178+
167179
### Encryption-at-rest
168180

169181
Azure Storage uses server-side encryption (SSE) to automatically encrypt your data when it's persisted to the cloud. By default, data is encrypted with Microsoft platform-managed keys.
@@ -185,6 +197,8 @@ Shared storage for Azure Red Hat OpenShift clusters must be configured by the cu
185197

186198
## Platform
187199

200+
The following sections provide information about the Azure Red Hat OpenShift platform.
201+
188202
### Cluster backup policy
189203

190204
> [!IMPORTANT]
@@ -213,18 +227,20 @@ For information about the Azure Red Hat OpenShift support lifecycle, see [Suppor
213227

214228
Azure Red Hat OpenShift runs on OpenShift 4 and uses the CRI-O implementation of the Kubernetes container runtime interface as the only available container engine.
215229

216-
### Operating System
230+
### Operating system
217231

218232
Azure Red Hat OpenShift runs on OpenShift 4 using Red Hat Enterprise Linux CoreOS (RHCOS) as the operating system for all control plane and worker nodes.
219233

220-
### Kubernetes Operator Support
234+
### Kubernetes operator support
221235

222236
Azure Red Hat OpenShift supports operators created by Red Hat and certified independent software vendors (ISVs). Operators provided by Red Hat are supported by Red Hat. ISV operators are supported by the ISV.
223237

224238
To use OperatorHub, your cluster must be configured with a Red Hat pull secret. For more information about using OperatorHub, see [Understanding OperatorHub](https://docs.openshift.com/container-platform/latest/operators/understanding/olm-understanding-operatorhub.html)
225239

226240
## Security
227241

242+
The following sections provide information about Azure OpenShift security.
243+
228244
### Authentication provider
229245

230246
Azure Red Hat OpenShift clusters aren't configured with any authentication providers.
@@ -234,6 +250,10 @@ Customers need to configure their own providers, such as Azure Active Directory.
234250
* [Azure Active Directory Authentication](./configure-azure-ad-cli.md)
235251
* [OpenShift identity providers](https://docs.openshift.com/container-platform/4.7/authentication/understanding-identity-provider.html)
236252

237-
### Regulatory Compliance
253+
### Regulatory compliance
254+
255+
For details about Azure Red Hat OpenShift’s regulatory compliance certifications, see [Microsoft Azure Compliance Offerings](https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/).
256+
257+
## Next Steps
238258

239-
For details about Azure Red Hat OpenShift’s regulatory compliance certifications, see [Microsoft Azure Compliance Offerings](https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/).
259+
For more information, see the [support policies](support-policies-v4.md) documentation.

0 commit comments

Comments
 (0)