You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fixed minor issues with the document. Wording, spelling, missing references.
- Changed "primary nodes" to "control plane nodes" for consistency since there's no "primary" among them
- Fixed security/monitoring copy-paste mistake
- removed dangling reference without a link, the egress requirement is "internet access."
- fixed double spaces
Copy file name to clipboardExpand all lines: articles/openshift/openshift-service-definitions.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,8 +57,8 @@ Customers have the ability to increase the node count and the permission in each
57
57
58
58
Azure Red Hat OpenShift clusters are provisioned with three control plane nodes. These nodes are responsible for etcd key-value store and API-related workloads. The control plane node can't be used for customer workloads. Control plane node deployment follows the same rules as worker nodes.
59
59
60
-
- In regions that consist of multiple availability zones, a primary node machine set is created in each zone. A primary node is provisioned from each machine set.
61
-
- Where an Azure region doesn't support availability zones, the Azure Red Hat OpenShift cluster provisions the primary nodes from a single machine set.
60
+
- In regions that consist of multiple availability zones, a control plane node machine set is created in each zone. A control plane node is provisioned from each machine set.
61
+
- Where an Azure region doesn't support availability zones, the Azure Red Hat OpenShift cluster provisions the control plane nodes from a single machine set.
62
62
63
63
## Azure compute types
64
64
@@ -78,7 +78,7 @@ Once deployed, an Azure Red Hat OpenShift cluster can't be moved to a different
78
78
79
79
## Service level agreement
80
80
81
-
For SLA details, see [SLA for Azure Red Hat OpenShift](https://azure.microsoft.com/support/legal/sla/openshift/v1_0/).
81
+
For SLA details, see [SLA for Azure Red Hat OpenShift](https://azure.microsoft.com/support/legal/sla/openshift/v1_0/).
82
82
83
83
## Support
84
84
@@ -99,7 +99,7 @@ The following sections provide information about Azure Red Hat OpenShift securit
99
99
100
100
Azure Red Hat OpenShift deploys with services for maintaining the health and performance of the cluster and its components. These services include cluster operations and audit logs. Cluster operations and audit logs are forwarded automatically to an Azure aggregation system for support and troubleshooting. This data is only accessible to authorized support staff via approved mechanisms.
101
101
102
-
Customer cluster administrators can deploy an optional logging stack to aggregate all logs from their Azure Red Hat OpenShift cluster. For example, node system audit logs and infrastructure logs can be aggregated. However, these logs consume another cluster resources.
102
+
Customer cluster administrators can deploy an optional logging stack to aggregate all logs from their Azure Red Hat OpenShift cluster. For example, node system audit logs and infrastructure logs can be aggregated. However, these logs consume another cluster resources.
103
103
104
104
### Application logging
105
105
@@ -111,7 +111,7 @@ If the cluster logging stack is installed, application logs sent to STDOUT are c
111
111
112
112
## Monitoring
113
113
114
-
The following section provides information about Azure Red Hat OpenShift security.
114
+
The following section provides information about Azure Red Hat OpenShift monitoring.
115
115
### Cluster metrics
116
116
117
117
Azure Red Hat OpenShift deploys with services for maintaining the health and performance of the cluster and its components. These services include the streaming of important metrics to an Azure aggregation system for support and troubleshooting purposes. This data is only accessible to authorized support staff via approved mechanisms.
@@ -155,7 +155,7 @@ All cluster ingress traffic traverses the defined load balancer.
155
155
### Cluster egress
156
156
157
157
Pod egress traffic control via EgressNetworkPolicy objects can be used to prevent or limit outbound traffic in Azure Red Hat OpenShift.
158
-
Currently all virtual machines must have outbound internet access, at least to the endpoints listed here.
158
+
Currently all virtual machines must have outbound internet access.
0 commit comments