You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/support-policies-v4.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: johnmarco
5
5
ms.author: johnmarc
6
6
ms.service: azure-redhat-openshift
7
7
ms.topic: conceptual
8
-
ms.date: 11/27/2023
8
+
ms.date: 02/22/2024
9
9
#Customer intent: I need to understand the Azure Red Hat OpenShift support policies for OpenShift 4.0.
10
10
---
11
11
@@ -23,8 +23,8 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
23
23
* The cluster must have a minimum of three worker nodes and three master nodes.
24
24
* Don't scale the cluster workers to zero, or attempt a cluster shutdown. Deallocating or powering down any virtual machine in the cluster resource group isn't supported.
25
25
* If you're making use of infrastructure nodes, don't run any undesignated workloads on them as this can affect the Service Level Agreement and cluster stability. Also, it's recommended to have three infrastructure nodes; one in each availability zone. See [Deploy infrastructure nodes in an Azure Red Hat OpenShift (ARO) cluster](howto-infrastructure-nodes.md) for more information.
26
-
* Non-RHCOS compute nodes aren't supported. For example, you can't use a RHEL compute node.
27
-
* Don't attempt to remove or replace a master node. These are high risk operations that can cause issues with etcd, permanent network loss, and loss of access and manageability by ARO SRE. If you feel that a master node should be replaced or removed, please contact support before making any changes.
26
+
* Non-RHCOS compute nodes aren't supported. For example, you can't use an RHEL compute node.
27
+
* Don't attempt to remove or replace a master node. These are high risk operations that can cause issues with etcd, permanent network loss, and loss of access and manageability by ARO SRE. If you feel that a master node should be replaced or removed, contact support before making any changes.
28
28
29
29
### Operators
30
30
@@ -35,6 +35,7 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
35
35
* Don't add taints that would prevent any default OpenShift components from being scheduled.
36
36
* To avoid disruption resulting from cluster maintenance, in-cluster workloads should be configured with high availability practices, including but not limited to pod affinity and anti-affinity, pod disruption budgets, and adequate scaling.
37
37
* Don't run extra workloads on the control plane nodes. While they can be scheduled on the control plane nodes, it causes extra resource usage and stability issues that can affect the entire cluster.
38
+
* Running custom workloads (including operators installed from Operator Hub or additional operators provided by Red Hat) in infrastructure nodes isn't supported.
38
39
39
40
### Logging and monitoring
40
41
@@ -47,6 +48,7 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
47
48
* The ARO-provided Network Security Group can't be modified or replaced. Any attempt to modify or replace it will be reverted.
48
49
* All cluster virtual machines must have direct outbound internet access, at least to the Azure Resource Manager (ARM) and service logging (Geneva) endpoints. No form of HTTPS proxying is supported.
49
50
* The Azure Red Hat OpenShift service accesses your cluster via Private Link Service. Don't remove or modify service access.
51
+
* Migrating from OpenShift SDN to OVN isn't supported.
50
52
51
53
### Cluster management
52
54
@@ -55,7 +57,7 @@ Certain configurations for Azure Red Hat OpenShift 4 clusters can affect your cl
55
57
* Don't set any unsupportedConfigOverrides options. Setting these options prevents minor version upgrades.
56
58
* Don't place policies within your subscription or management group that prevent SREs from performing normal maintenance against the Azure Red Hat OpenShift cluster. For example, don't require tags on the Azure Red Hat OpenShift RP-managed cluster resource group.
57
59
* Don't circumvent the deny assignment that is configured as part of the service, or perform administrative tasks that are normally prohibited by the deny assignment.
58
-
* OpenShift relies on the ability to automatically tag Azure resources. If you have configured a tagging policy, do not apply more than 10 user-defined tags to resources in the managed resource group.
60
+
* OpenShift relies on the ability to automatically tag Azure resources. If you have configured a tagging policy, don't apply more than 10 user-defined tags to resources in the managed resource group.
59
61
60
62
61
63
## Incident management
@@ -136,7 +138,7 @@ Azure Red Hat OpenShift 4 supports node instances on the following virtual machi
136
138
|Fsv2|Standard_F72s_v2|72|144|
137
139
|Mms*|Standard_M128ms|128|3892|
138
140
139
-
\*Standard_M128ms' does not support encryption at host
141
+
\*Standard_M128ms' doesn't support encryption at host
140
142
141
143
### Worker nodes
142
144
@@ -236,7 +238,7 @@ Azure Red Hat OpenShift 4 supports node instances on the following virtual machi
236
238
|-|-|-|-|
237
239
|Mms*|Standard_M128ms|128|3892|
238
240
239
-
\*Standard_M128ms' does not support encryption at host
241
+
\*Standard_M128ms' doesn't support encryption at host
0 commit comments