You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/openshift-service-definitions.md
+30-10Lines changed: 30 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Azure Red Hat OpenShift Service Definition
3
-
description: Azure Red Hat OpenShift Service Definition
2
+
title: Azure Red Hat OpenShift service definition
3
+
description: Azure Red Hat OpenShift service definition
4
4
ms.service: azure-redhat-openshift
5
5
ms.topic: article
6
6
author: rahulm23
@@ -10,7 +10,9 @@ keywords: azure, openshift, aro, red hat, service, definition
10
10
#Customer intent: I need to understand Azure Red Hat OpenShift services to manage my subscription.
11
11
---
12
12
13
-
# Account management
13
+
# Azure Red Hat OpenShift account management
14
+
15
+
The following sections provide service definitions to help you manage your Azure Red Hat OpenShift account.
14
16
15
17
## Billing
16
18
@@ -29,6 +31,7 @@ For more information about pricing, see [Azure Red Hat OpenShift pricing](https:
29
31
Customers can create and delete their clusters using the Azure command-line utility (CLI). Azure Red Hat OpenShift clusters deploy with a kubeadmin user whose credentials are available from the Azure CLI after a cluster is successfully deployed.
30
32
31
33
You can perform all other Azure Red Hat OpenShift cluster actions, such as scaling nodes, by interacting with the OpenShift API using tools such as the OpenShift web console or the OpenShift CLI (oc).
34
+
32
35
## Azure resource architecture
33
36
34
37
An Azure Red Hat OpenShift deployment requires two resource groups within an Azure subscription. The first resource group is created by the customer and contains the virtual networking components for the cluster. Keeping the networking elements separate allows the customer to configure Azure Red Hat OpenShift to meet requirements and to add any peering options.
@@ -74,9 +77,8 @@ az provider show -n Microsoft.RedHatOpenShift --query "resourceTypes[?resourceTy
74
77
Once deployed, an Azure Red Hat OpenShift cluster can't be moved to a different region. Similarly, you can't transfer Azure Red Hat OpenShift clusters between subscriptions.
75
78
76
79
## Service level agreement
77
-
Microsoft and Red Hat operate and support Azure Red Hat OpenShift jointly. It is operated and supported with a service level agreement (SLA) of 99.95 percent availability
78
80
79
-
*For more SLA details, see [SLA for Azure Red Hat OpenShift](https://azure.microsoft.com/support/legal/sla/openshift/v1_0/).
81
+
For SLA details, see [SLA for Azure Red Hat OpenShift](https://azure.microsoft.com/support/legal/sla/openshift/v1_0/).
80
82
81
83
## Support
82
84
@@ -91,6 +93,8 @@ To open support tickets directly with Red Hat, your cluster will need to have a
91
93
92
94
## Logging
93
95
96
+
The following sections provide information about Azure Red Hat OpenShift security.
97
+
94
98
### Cluster operations and audit logging
95
99
96
100
Azure Red Hat OpenShift deploys with services for maintaining the health and performance of the cluster and its components. These services include cluster operations and audit logs. Cluster operations and audit logs are forwarded automatically to an Azure aggregation system for support and troubleshooting. This data is only accessible to authorized support staff via approved mechanisms.
@@ -106,6 +110,8 @@ The logging stack, [Logging Operator](https://operatorhub.io/operator/logging-op
106
110
If the cluster logging stack is installed, application logs sent to STDOUT are collected by Fluentd. The application logs are made available through the cluster logging stack. Retention is set to seven days, but won't exceed 200 GiB of logs per shard. For longer term retention, customers should follow the sidecar container design in their deployments. Customers should forward logs to the log aggregation or analytics service of their choice.
107
111
108
112
## Monitoring
113
+
114
+
The following section provides information about Azure Red Hat OpenShift security.
109
115
### Cluster metrics
110
116
111
117
Azure Red Hat OpenShift deploys with services for maintaining the health and performance of the cluster and its components. These services include the streaming of important metrics to an Azure aggregation system for support and troubleshooting purposes. This data is only accessible to authorized support staff via approved mechanisms.
@@ -115,6 +121,8 @@ Azure Red Hat OpenShift clusters come with an integrated Prometheus/Grafana stac
115
121
These metrics, which are accessible via the web console, can also be used to view cluster-level status and capacity/usage through a Grafana dashboard. These metrics also allow for horizontal pod autoscaling that is based on CPU or memory metrics provided by an Azure Red Hat OpenShift customer.
116
122
117
123
## Network
124
+
The following sections provide information about the Azure Red Hat OpenShift network.
125
+
118
126
### Domain-validated certificates
119
127
120
128
By default, Azure Red Hat OpenShift includes TLS security certificates needed for both internal and external services on the cluster. For external routes, a Transport Layer Security (TLS) wildcard certificate is provided and installed in the cluster. A TLS certificate is also used for the OpenShift API endpoint. DigiCert is the certificate authority (CA) used for these certificates.
@@ -132,13 +140,14 @@ By default, Azure Red Hat OpenShift uses self-signed certificates for all of the
132
140
133
141
Azure Red Hat OpenShift supports the use of CAs to be trusted by builds when pulling images from an image registry.
134
142
135
-
### Load Balancers
143
+
### Load balancers
136
144
137
145
Azure Red Hat OpenShift deploys with two Azure load balancers. The first is used for ingress traffic to applications and for the OpenShift and Kubernetes APIs. The second is used for internal communications between cluster components.
138
146
139
147
### Cluster ingress
140
148
141
149
Project administrators can add route annotations for many different purposes, including ingress control via an IP allowlist.
150
+
142
151
Ingress policies can be changed by using NetworkPolicy objects, which use the ovs-networkpolicy plugin. Using NetworkPolicy objects allows for full control over ingress network policy down to the pod level, including between pods on the same cluster and even in the same namespace.
143
152
144
153
All cluster ingress traffic traverses the defined load balancer.
@@ -164,6 +173,9 @@ No monitoring of these private network connections is provided by Red Hat SRE. M
164
173
Azure Red Hat OpenShift customers can specify their own DNS servers. For more information, see [Configure custom DNS for your Azure Red Hat OpenShift cluster](./howto-custom-dns.md).
165
174
166
175
## Storage
176
+
177
+
The following sections provide information about Azure Red Hat OpenShift storage.
178
+
167
179
### Encryption-at-rest
168
180
169
181
Azure Storage uses server-side encryption (SSE) to automatically encrypt your data when it's persisted to the cloud. By default, data is encrypted with Microsoft platform-managed keys.
@@ -185,6 +197,8 @@ Shared storage for Azure Red Hat OpenShift clusters must be configured by the cu
185
197
186
198
## Platform
187
199
200
+
The following sections provide information about the Azure Red Hat OpenShift platform.
201
+
188
202
### Cluster backup policy
189
203
190
204
> [!IMPORTANT]
@@ -213,18 +227,20 @@ For information about the Azure Red Hat OpenShift support lifecycle, see [Suppor
213
227
214
228
Azure Red Hat OpenShift runs on OpenShift 4 and uses the CRI-O implementation of the Kubernetes container runtime interface as the only available container engine.
215
229
216
-
### Operating System
230
+
### Operating system
217
231
218
232
Azure Red Hat OpenShift runs on OpenShift 4 using Red Hat Enterprise Linux CoreOS (RHCOS) as the operating system for all control plane and worker nodes.
219
233
220
-
### Kubernetes Operator Support
234
+
### Kubernetes operator support
221
235
222
236
Azure Red Hat OpenShift supports operators created by Red Hat and certified independent software vendors (ISVs). Operators provided by Red Hat are supported by Red Hat. ISV operators are supported by the ISV.
223
237
224
238
To use OperatorHub, your cluster must be configured with a Red Hat pull secret. For more information about using OperatorHub, see [Understanding OperatorHub](https://docs.openshift.com/container-platform/latest/operators/understanding/olm-understanding-operatorhub.html)
225
239
226
240
## Security
227
241
242
+
The following sections provide information about Azure OpenShift security.
243
+
228
244
### Authentication provider
229
245
230
246
Azure Red Hat OpenShift clusters aren't configured with any authentication providers.
@@ -234,6 +250,10 @@ Customers need to configure their own providers, such as Azure Active Directory.
234
250
*[Azure Active Directory Authentication](./configure-azure-ad-cli.md)
For details about Azure Red Hat OpenShift’s regulatory compliance certifications, see [Microsoft Azure Compliance Offerings](https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/).
256
+
257
+
## Next Steps
238
258
239
-
For details about Azure Red Hat OpenShift’s regulatory compliance certifications, see [Microsoft Azure Compliance Offerings](https://azure.microsoft.com/resources/microsoft-azure-compliance-offerings/).
259
+
For more information, see the [support policies](support-policies-v4.md) documentation.
0 commit comments