Skip to content

Commit 20fbf2c

Browse files
authored
Merge pull request #96509 from mletalie/OSDOCS-14103
[OSDOCS-14103]: Review-Introduction to ROSA
2 parents d6d1dab + e38be1f commit 20fbf2c

35 files changed

+672
-248
lines changed

_topic_maps/_topic_map_rosa_hcp.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -440,8 +440,9 @@ Topics:
440440
File: rosa-troubleshooting-iam-resources
441441
- Name: Troubleshooting cluster deployments
442442
File: rosa-troubleshooting-deployments
443-
- Name: Red Hat managed resources
444-
File: sd-managed-resources
443+
# Removed from HCP Topic Map until managed resources are correct for HCP.
444+
# - Name: Red Hat managed resources
445+
# File: sd-managed-resources
445446
---
446447
Name: Cluster administration
447448
Dir: rosa_cluster_admin

modules/how-service-accounts-assume-aws-iam-roles-in-sre-owned-projects.adoc

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,22 +7,29 @@
77
[id="how-service-accounts-assume-aws-iam-roles-in-sre-owned-projects_{context}"]
88
= How service accounts assume AWS IAM roles in SRE owned projects
99

10-
When you install a {product-title} cluster that uses the AWS Security Token Service (STS), cluster-specific Operator AWS Identity and Access Management (IAM) roles are created. These IAM roles permit the {product-title} cluster Operators to run core OpenShift functionality.
10+
When you install a {product-title}
11+
ifdef::openshift-rosa-hcp[]
12+
cluster,
13+
endif::openshift-rosa-hcp[]
14+
ifndef::openshift-rosa-hcp[]
15+
that uses the AWS Security Token Service (STS),
16+
endif::openshift-rosa-hcp[]
17+
cluster-specific Operator AWS Identity and Access Management (IAM) roles are created. These IAM roles permit the ROSA cluster Operators to run core OpenShift functionality.
1118

12-
Cluster Operators use service accounts to assume IAM roles. When a service account assumes an IAM role, temporary STS credentials are provided for the service account to use in the cluster Operator's pod. If the assumed role has the necessary AWS privileges, the service account can run AWS SDK operations in the pod.
19+
Cluster Operators use service accounts to assume IAM roles. When a service account assumes an IAM role, temporary AWS STS credentials are provided for the service account to use in the cluster Operator's pod. If the assumed role has the necessary AWS privileges, the service account can run AWS SDK operations in the pod.
1320

1421
[discrete]
1522
[id="workflow-for-assuming-aws-iam-roles-in-sre-owned-projects_{context}"]
16-
== Workflow for assuming AWS IAM roles in SRE owned projects
23+
== Workflow for assuming AWS IAM roles in Red{nbsp}Hat SRE owned projects
1724

1825
The following diagram illustrates the workflow for assuming AWS IAM roles in SRE owned projects:
1926

2027
.Workflow for assuming AWS IAM roles in SRE owned projects
21-
image::workflow-assuming-aws-iam-roles-sre-owned-projects.png[Workflow for assuming AWS IAM roles in SRE owned projects]
28+
image::workflow-assuming-aws-iam-roles-sre-owned-projects.png[Workflow for assuming AWS IAM roles in Red{nbsp}Hat SRE owned projects]
2229

2330
The workflow has the following stages:
2431

25-
. Within each project that a cluster Operator runs, the Operator's deployment spec has a volume mount for the projected service account token, and a secret containing AWS credential configuration for the pod. The token is audience-bound and time-bound. Every hour, {product-title} generates a new token, and the AWS SDK reads the mounted secret containing the AWS credential configuration. This configuration has a path to the mounted token and the AWS IAM Role ARN. The secret's credential configuration includes the following:
32+
. Within each project that a cluster Operator runs, the Operator's deployment spec has a volume mount for the projected service account token, and a secret containing AWS credential configuration for the pod. The token is audience-bound and time-bound. Every hour, ROSA generates a new token, and the AWS SDK reads the mounted secret containing the AWS credential configuration. This configuration has a path to the mounted token and the AWS IAM Role ARN. The secret's credential configuration includes the following:
2633

2734
** An `$AWS_ARN_ROLE` variable that has the ARN for the IAM role that has the permissions required to run AWS SDK operations.
2835

@@ -38,7 +45,7 @@ The workflow has the following stages:
3845
+
3946
[NOTE]
4047
====
41-
In {product-title} with STS clusters, the OIDC provider is created during install and set as the service account issuer by default. The `sts.amazonaws.com` audience is set by default in the OIDC provider.
48+
In ROSA with STS clusters, the OIDC provider is created during install and set as the service account issuer by default. The `sts.amazonaws.com` audience is set by default in the OIDC provider.
4249
====
4350

4451
** The OIDC token has not expired.

modules/life-cycle-limited-support.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ When a cluster transitions to a _Limited Support_ status, Red{nbsp}Hat no longer
1515

1616
A cluster might transition to a Limited Support status for many reasons, including the following scenarios:
1717

18-
ifndef::rosa-with-hcp[]
18+
ifndef::openshift-rosa-hcp[]
1919
If you do not upgrade a cluster to a supported version before the end-of-life date:: Red{nbsp}Hat does not make any runtime or SLA guarantees for versions after their end-of-life date. To receive continued support, upgrade the cluster to a supported version before the end-of-life date. If you do not upgrade the cluster before the end-of-life date, the cluster transitions to a Limited Support status until it is upgraded to a supported version.
2020
+
2121
Red{nbsp}Hat provides commercially reasonable support to upgrade from an unsupported version to a supported version. However, if a supported upgrade path is no longer available, you might have to create a new cluster and migrate your workloads.
22-
endif::rosa-with-hcp[]
22+
endif::openshift-rosa-hcp[]
2323

2424
If you remove or replace any native {product-title} components or any other component that is installed and managed by Red{nbsp}Hat:: If cluster administrator permissions were used, Red{nbsp}Hat is not responsible for any of your or your authorized users’ actions, including those that affect infrastructure services, service availability, or data loss. If Red{nbsp}Hat detects any such actions, the cluster might transition to a Limited Support status. Red{nbsp}Hat notifies you of the status change and you should either revert the action or create a support case to explore remediation steps that might require you to delete and recreate the cluster.
2525

modules/life-cycle-mandatory-upgrades.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,12 @@ endif::[]
1414
If a critical or important CVE, or other bug identified by Red{nbsp}Hat, significantly impacts the security or stability of the cluster, the customer must upgrade to the next supported patch release within two link:https://access.redhat.com/articles/2623321[business days].
1515

1616
In extreme circumstances and based on Red{nbsp}Hat's assessment of the CVE criticality to the environment, Red{nbsp}Hat will notify customers that they have two link:https://access.redhat.com/articles/2623321[business days] to schedule or manually update their cluster to the latest, secure patch release. In the case that an update is not performed after two link:https://access.redhat.com/articles/2623321[business days], Red{nbsp}Hat will automatically update the
17-
ifdef::rosa-with-hcp[]
17+
ifdef::openshift-rosa-hcp[]
1818
cluster's control plane
19-
endif::rosa-with-hcp[]
20-
ifndef::rosa-with-hcp[]
19+
endif::openshift-rosa-hcp[]
20+
ifndef::openshift-rosa-hcp[]
2121
cluster
22-
endif::rosa-with-hcp[]
22+
endif::openshift-rosa-hcp[]
2323
to the latest, secure patch release to mitigate potential security breach(es) or instability. Red{nbsp}Hat might, at its own discretion, temporarily delay an automated update if requested by a customer through a link:https://access.redhat.com/support[support case].
2424

2525
ifeval::["{context}" == "rosa-hcp-life-cycle"]

modules/life-cycle-minor-versions.adoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,23 +13,23 @@ endif::[]
1313
Starting with the 4.8 OpenShift Container Platform minor version, Red{nbsp}Hat supports all minor versions for at least a 16 month period following general availability of the given minor version. Patch versions are not affected by the support period.
1414

1515
Customers are notified 60, 30, and 15 days before the end of the support period. Clusters must be upgraded to the latest patch version of the oldest supported minor version before the end of the support period, or
16-
ifdef::rosa-with-hcp[]
16+
ifdef::openshift-rosa-hcp[]
1717
Red{nbsp}Hat will automatically upgrade the control plane to the next supported minor version.
18-
endif::rosa-with-hcp[]
19-
ifndef::rosa-with-hcp[]
18+
endif::openshift-rosa-hcp[]
19+
ifndef::openshift-rosa-hcp[]
2020
the cluster will enter a "Limited Support" status.
21-
endif::rosa-with-hcp[]
21+
endif::openshift-rosa-hcp[]
2222

2323
.Example
2424
. A customer's cluster is currently running on 4.13.8. The 4.13 minor version became generally available on May 17, 2023.
2525
. On July 19, August 16, and September 2, 2024, the customer is notified that their cluster will enter "Limited Support" status on September 17, 2024 if the cluster has not already been upgraded to a supported minor version.
2626
. The cluster must be upgraded to 4.14 or later by September 17, 2024.
27-
ifdef::rosa-with-hcp[]
27+
ifdef::openshift-rosa-hcp[]
2828
. If the upgrade has not been performed, the cluster's control plane will be automatically upgraded to 4.14.26, and there will be no automatic upgrades to the cluster's worker nodes.
29-
endif::rosa-with-hcp[]
30-
ifndef::rosa-with-hcp[]
29+
endif::openshift-rosa-hcp[]
30+
ifndef::openshift-rosa-hcp[]
3131
. If the upgrade has not been performed, the cluster will be flagged as being in a "Limited Support" status.
32-
endif::rosa-with-hcp[]
32+
endif::openshift-rosa-hcp[]
3333

3434
ifeval::["{context}" == "rosa-hcp-life-cycle"]
3535
:!rosa-with-hcp:

modules/life-cycle-overview.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@
99

1010
Red{nbsp}Hat provides a published product life cycle for {product-title} in order for customers and partners to effectively plan, deploy, and support their applications running on the platform. Red{nbsp}Hat publishes this life cycle to provide as much transparency as possible and might make exceptions from these policies as conflicts arise.
1111

12-
{product-title} is a managed instance of Red{nbsp}Hat OpenShift and maintains an independent release schedule. More details about the managed offering can be found in the {product-title} service definition. The availability of Security Advisories and Bug Fix Advisories for a specific version are dependent upon the Red{nbsp}Hat OpenShift Container Platform life cycle policy and subject to the {product-title} maintenance schedule.
12+
{product-title} is a managed deployment of Red{nbsp}Hat OpenShift and maintains an independent release schedule. More details about the managed offering can be found in the {product-title} service definition. The availability of Security Advisories and Bug Fix Advisories for a specific version are dependent upon the Red{nbsp}Hat OpenShift Container Platform life cycle policy and subject to the {product-title} maintenance schedule.

modules/managed-cluster-notification-policy.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Most cluster notifications are generated and sent automatically to ensure that y
1313

1414
In certain situations, Red{nbsp}Hat Site Reliability Engineering (SRE) creates and sends cluster notifications to provide additional context and guidance for a complex issue.
1515

16-
Cluster notifications are not sent for low-impact events, low-risk security updates, routine operations and maintenance, or minor, transient issues that are quickly resolved by SRE.
16+
Cluster notifications are not sent for low-impact events, low-risk security updates, routine operations and maintenance, or minor, transient issues that are quickly resolved by Red{nbsp}Hat SRE.
1717

1818
Red{nbsp}Hat services automatically send notifications when:
1919

modules/managed-resources.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,10 @@ The following covers all {product-title} resources that are managed or protected
1515
[id="sd-managed-resources-all_{context}"]
1616
== Managed resources
1717

18-
The following list displays the {product-title} resources managed by OpenShift Hive, the centralized fleet configuration management system. These resources are in addition to the OpenShift Container Platform resources created during installation. OpenShift Hive continually attempts to maintain consistency across all {product-title} clusters. Changes to {product-title} resources should be made through {cluster-manager} so that {cluster-manager} and Hive are synchronized. Contact [email protected] if {cluster-manager} does not support modifying the resources in question.
18+
The following list displays the {product-title} resources managed by OpenShift Hive, the centralized fleet configuration management system. These resources are in addition to the OpenShift/ROSA platform resources created during installation. OpenShift Hive continually reconciles consistency across all {product-title} clusters. Changes to {product-title} resources should be made through {cluster-manager} so that {cluster-manager} and Hive are synchronized. Contact [email protected] if {cluster-manager} does not support modifying the resources in question.
1919

2020
.List of Red{nbsp}Hat managed resources
21+
(Note that the following may not be visible in your ROSA cluster)
2122
[%collapsible]
2223
====
2324
[source,yaml]
@@ -32,6 +33,8 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/mast
3233
{product-title} core namespaces are installed by default during cluster installation.
3334

3435
.List of core namespaces
36+
(Note that the following may not be visible in your ROSA cluster)
37+
3538
[%collapsible]
3639
====
3740
[source,yaml]

modules/rosa-access-approval-review.adoc

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66

77
[id="rosa-policy-access-approval_{context}"]
88
= Access approval and review
9-
New SRE user access requires management approval. Separated or transferred SRE accounts are removed as authorized users through an automated process. Additionally, the SRE performs periodic access review, including management sign-off of authorized user lists.
9+
New Red{nbsp}Hat SRE user access requires management approval. Separated or transferred SRE accounts are removed as authorized users through an automated process. Additionally, the SRE performs periodic access review, including management sign-off of authorized user lists.
1010

1111
The access and identity authorization table includes responsibilities for managing authorized access to clusters, applications, and infrastructure resources. This includes tasks such as providing access control mechanisms, authentication, authorization, and managing access to resources.
1212

@@ -73,7 +73,14 @@ Red{nbsp}Hat OpenShift Cluster Manager.
7373
|AWS software (public AWS services)
7474
|**AWS**
7575

76-
**Compute:** Provide the Amazon EC2 service, used for ROSA control plane, infrastructure, and worker nodes.
76+
**Compute:**
77+
Provide the Amazon EC2 service,
78+
ifdef::openshift-rosa-hcp[]
79+
used for ROSA control plane and worker nodes.
80+
endif::openshift-rosa-hcp[]
81+
ifndef::openshift-rosa-hcp[]
82+
used for ROSA control plane, infrastructure, and worker nodes.
83+
endif::openshift-rosa-hcp[]
7784

7885
**Storage:** Provide Amazon EBS, used to allow ROSA to provision local node storage and persistent volume storage for the cluster.
7986

modules/rosa-aws-customer-managed-policies.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,5 @@ Attaching permission boundary policies to IAM roles that restrict ROSA-specific
1717
[role="_additional-resources"]
1818
.Additional resources
1919

20-
* xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-aws-requirements-attaching-boundary-policy_rosa-sts-about-iam-resources[Permission boundaries for the installer role]
20+
// * xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-aws-requirements-attaching-boundary-policy_rosa-sts-about-iam-resources[Permission boundaries for the installer role]
2121
* link:https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html[Permissions boundaries for IAM entities]

0 commit comments

Comments
 (0)