Skip to content

Commit e671bd8

Browse files
Merge pull request #266948 from johnmarco/jm-aro-support-policy-updates
ARO: Support policy updates
2 parents bb7e126 + 166d47b commit e671bd8

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/openshift/support-policies-v4.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: johnmarco
55
ms.author: johnmarc
66
ms.service: azure-redhat-openshift
77
ms.topic: conceptual
8-
ms.date: 11/27/2023
8+
ms.date: 02/22/2024
99
#Customer intent: I need to understand the Azure Red Hat OpenShift support policies for OpenShift 4.0.
1010
---
1111

@@ -23,8 +23,8 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
2323
* The cluster must have a minimum of three worker nodes and three master nodes.
2424
* Don't scale the cluster workers to zero, or attempt a cluster shutdown. Deallocating or powering down any virtual machine in the cluster resource group isn't supported.
2525
* If you're making use of infrastructure nodes, don't run any undesignated workloads on them as this can affect the Service Level Agreement and cluster stability. Also, it's recommended to have three infrastructure nodes; one in each availability zone. See [Deploy infrastructure nodes in an Azure Red Hat OpenShift (ARO) cluster](howto-infrastructure-nodes.md) for more information.
26-
* Non-RHCOS compute nodes aren't supported. For example, you can't use a RHEL compute node.
27-
* Don't attempt to remove or replace a master node. These are high risk operations that can cause issues with etcd, permanent network loss, and loss of access and manageability by ARO SRE. If you feel that a master node should be replaced or removed, please contact support before making any changes.
26+
* Non-RHCOS compute nodes aren't supported. For example, you can't use an RHEL compute node.
27+
* Don't attempt to remove or replace a master node. These are high risk operations that can cause issues with etcd, permanent network loss, and loss of access and manageability by ARO SRE. If you feel that a master node should be replaced or removed, contact support before making any changes.
2828

2929
### Operators
3030

@@ -35,6 +35,7 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
3535
* Don't add taints that would prevent any default OpenShift components from being scheduled.
3636
* To avoid disruption resulting from cluster maintenance, in-cluster workloads should be configured with high availability practices, including but not limited to pod affinity and anti-affinity, pod disruption budgets, and adequate scaling.
3737
* Don't run extra workloads on the control plane nodes. While they can be scheduled on the control plane nodes, it causes extra resource usage and stability issues that can affect the entire cluster.
38+
* Running custom workloads (including operators installed from Operator Hub or additional operators provided by Red Hat) in infrastructure nodes isn't supported.
3839

3940
### Logging and monitoring
4041

@@ -47,6 +48,7 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
4748
* The ARO-provided Network Security Group can't be modified or replaced. Any attempt to modify or replace it will be reverted.
4849
* All cluster virtual machines must have direct outbound internet access, at least to the Azure Resource Manager (ARM) and service logging (Geneva) endpoints. No form of HTTPS proxying is supported.
4950
* The Azure Red Hat OpenShift service accesses your cluster via Private Link Service. Don't remove or modify service access.
51+
* Migrating from OpenShift SDN to OVN isn't supported.
5052

5153
### Cluster management
5254

@@ -55,7 +57,7 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
5557
* Don't set any unsupportedConfigOverrides options. Setting these options prevents minor version upgrades.
5658
* Don't place policies within your subscription or management group that prevent SREs from performing normal maintenance against the Azure Red Hat OpenShift cluster. For example, don't require tags on the Azure Red Hat OpenShift RP-managed cluster resource group.
5759
* Don't circumvent the deny assignment that is configured as part of the service, or perform administrative tasks that are normally prohibited by the deny assignment.
58-
* OpenShift relies on the ability to automatically tag Azure resources. If you have configured a tagging policy, do not apply more than 10 user-defined tags to resources in the managed resource group.
60+
* OpenShift relies on the ability to automatically tag Azure resources. If you have configured a tagging policy, don't apply more than 10 user-defined tags to resources in the managed resource group.
5961

6062

6163
## Incident management
@@ -136,7 +138,7 @@ Azure Red Hat OpenShift 4 supports node instances on the following virtual machi
136138
|Fsv2|Standard_F72s_v2|72|144|
137139
|Mms*|Standard_M128ms|128|3892|
138140

139-
\*Standard_M128ms' does not support encryption at host
141+
\*Standard_M128ms' doesn't support encryption at host
140142

141143
### Worker nodes
142144

@@ -236,7 +238,7 @@ Azure Red Hat OpenShift 4 supports node instances on the following virtual machi
236238
|-|-|-|-|
237239
|Mms*|Standard_M128ms|128|3892|
238240

239-
\*Standard_M128ms' does not support encryption at host
241+
\*Standard_M128ms' doesn't support encryption at host
240242

241243

242244
#### Storage optimized

0 commit comments

Comments
 (0)