You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/support-policies-v4.md
+13-6Lines changed: 13 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: johnmarco
5
5
ms.author: johnmarc
6
6
ms.service: azure-redhat-openshift
7
7
ms.topic: conceptual
8
-
ms.date: 02/22/2024
8
+
ms.date: 03/04/2024
9
9
#Customer intent: I need to understand the Azure Red Hat OpenShift support policies for OpenShift 4.0.
10
10
---
11
11
@@ -24,7 +24,7 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
24
24
* Don't scale the cluster workers to zero, or attempt a cluster shutdown. Deallocating or powering down any virtual machine in the cluster resource group isn't supported.
25
25
* If you're making use of infrastructure nodes, don't run any undesignated workloads on them as this can affect the Service Level Agreement and cluster stability. Also, it's recommended to have three infrastructure nodes; one in each availability zone. See [Deploy infrastructure nodes in an Azure Red Hat OpenShift (ARO) cluster](howto-infrastructure-nodes.md) for more information.
26
26
* Non-RHCOS compute nodes aren't supported. For example, you can't use an RHEL compute node.
27
-
* Don't attempt to remove or replace a master node. These are high risk operations that can cause issues with etcd, permanent network loss, and loss of access and manageability by ARO SRE. If you feel that a master node should be replaced or removed, contact support before making any changes.
27
+
* Don't attempt to remove or replace a master node. That's a high risk operation that can cause issues with etcd, permanent network loss, and loss of access and manageability by ARO SRE. If you feel that a master node should be replaced or removed, contact support before making any changes.
28
28
29
29
### Operators
30
30
@@ -35,12 +35,12 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
35
35
* Don't add taints that would prevent any default OpenShift components from being scheduled.
36
36
* To avoid disruption resulting from cluster maintenance, in-cluster workloads should be configured with high availability practices, including but not limited to pod affinity and anti-affinity, pod disruption budgets, and adequate scaling.
37
37
* Don't run extra workloads on the control plane nodes. While they can be scheduled on the control plane nodes, it causes extra resource usage and stability issues that can affect the entire cluster.
38
-
* Running custom workloads (including operators installed from Operator Hub or additional operators provided by Red Hat) in infrastructure nodes isn't supported.
38
+
* Running custom workloads (including operators installed from Operator Hub or other operators provided by Red Hat) in infrastructure nodes isn't supported.
39
39
40
40
### Logging and monitoring
41
41
42
42
* Don't remove or modify the default cluster Prometheus service, except to modify scheduling of the default Prometheus instance.
43
-
* Don't remove or modify the default cluster Alertmanager svc, default receiver, or any default alerting rules, except to add additional receivers to notify external systems.
43
+
* Don't remove or modify the default cluster Alertmanager svc, default receiver, or any default alerting rules, except to add other receivers to notify external systems.
44
44
* Don't remove or modify Azure Red Hat OpenShift service logging (mdsd pods).
45
45
46
46
### Network and security
@@ -56,13 +56,13 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
56
56
* Don't override any of the cluster's MachineConfig objects (for example, the kubelet configuration) in any way.
57
57
* Don't set any unsupportedConfigOverrides options. Setting these options prevents minor version upgrades.
58
58
* Don't place policies within your subscription or management group that prevent SREs from performing normal maintenance against the Azure Red Hat OpenShift cluster. For example, don't require tags on the Azure Red Hat OpenShift RP-managed cluster resource group.
59
-
* Don't circumvent the deny assignment that is configured as part of the service, or perform administrative tasks that are normally prohibited by the deny assignment.
59
+
* Don't circumvent the deny assignment that is configured as part of the service, or perform administrative tasks normally prohibited by the deny assignment.
60
60
* OpenShift relies on the ability to automatically tag Azure resources. If you have configured a tagging policy, don't apply more than 10 user-defined tags to resources in the managed resource group.
61
61
62
62
63
63
## Incident management
64
64
65
-
An incident is an event that results in a degradation or outage Azure Red Hat OpenShift services. An incident can be raised by a customer or Customer Experience and Engagement (CEE) member through a [support case](openshift-service-definitions.md#support), directly by the centralized monitoring and alerting system, or directly by a member of the ARO Site Reliability Engineer (SRE) team.
65
+
An incident is an event that results in a degradation or outage Azure Red Hat OpenShift services. Incidents are raised by a customer or Customer Experience and Engagement (CEE) member through a [support case](openshift-service-definitions.md#support), directly by the centralized monitoring and alerting system, or directly by a member of the ARO Site Reliability Engineer (SRE) team.
66
66
67
67
Depending on the impact on the service and customer, the incident is categorized in terms of severity.
68
68
@@ -271,3 +271,10 @@ Azure Red Hat OpenShift 4 supports node instances on the following virtual machi
0 commit comments