You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= How service accounts assume AWS IAM roles in SRE owned projects
9
9
10
-
When you install a {product-title} cluster that uses the AWS Security Token Service (STS), cluster-specific Operator AWS Identity and Access Management (IAM) roles are created. These IAM roles permit the {product-title} cluster Operators to run core OpenShift functionality.
10
+
When you install a {product-title}
11
+
ifdef::openshift-rosa-hcp[]
12
+
cluster,
13
+
endif::openshift-rosa-hcp[]
14
+
ifndef::openshift-rosa-hcp[]
15
+
that uses the AWS Security Token Service (STS),
16
+
endif::openshift-rosa-hcp[]
17
+
cluster-specific Operator AWS Identity and Access Management (IAM) roles are created. These IAM roles permit the ROSA cluster Operators to run core OpenShift functionality.
11
18
12
-
Cluster Operators use service accounts to assume IAM roles. When a service account assumes an IAM role, temporary STS credentials are provided for the service account to use in the cluster Operator's pod. If the assumed role has the necessary AWS privileges, the service account can run AWS SDK operations in the pod.
19
+
Cluster Operators use service accounts to assume IAM roles. When a service account assumes an IAM role, temporary AWS STS credentials are provided for the service account to use in the cluster Operator's pod. If the assumed role has the necessary AWS privileges, the service account can run AWS SDK operations in the pod.
== Workflow for assuming AWS IAM roles in SRE owned projects
23
+
== Workflow for assuming AWS IAM roles in Red{nbsp}Hat SRE owned projects
17
24
18
25
The following diagram illustrates the workflow for assuming AWS IAM roles in SRE owned projects:
19
26
20
27
.Workflow for assuming AWS IAM roles in SRE owned projects
21
-
image::workflow-assuming-aws-iam-roles-sre-owned-projects.png[Workflow for assuming AWS IAM roles in SRE owned projects]
28
+
image::workflow-assuming-aws-iam-roles-sre-owned-projects.png[Workflow for assuming AWS IAM roles in Red{nbsp}Hat SRE owned projects]
22
29
23
30
The workflow has the following stages:
24
31
25
-
. Within each project that a cluster Operator runs, the Operator's deployment spec has a volume mount for the projected service account token, and a secret containing AWS credential configuration for the pod. The token is audience-bound and time-bound. Every hour, {product-title} generates a new token, and the AWS SDK reads the mounted secret containing the AWS credential configuration. This configuration has a path to the mounted token and the AWS IAM Role ARN. The secret's credential configuration includes the following:
32
+
. Within each project that a cluster Operator runs, the Operator's deployment spec has a volume mount for the projected service account token, and a secret containing AWS credential configuration for the pod. The token is audience-bound and time-bound. Every hour, ROSA generates a new token, and the AWS SDK reads the mounted secret containing the AWS credential configuration. This configuration has a path to the mounted token and the AWS IAM Role ARN. The secret's credential configuration includes the following:
26
33
27
34
** An `$AWS_ARN_ROLE` variable that has the ARN for the IAM role that has the permissions required to run AWS SDK operations.
28
35
@@ -38,7 +45,7 @@ The workflow has the following stages:
38
45
+
39
46
[NOTE]
40
47
====
41
-
In {product-title} with STS clusters, the OIDC provider is created during install and set as the service account issuer by default. The `sts.amazonaws.com` audience is set by default in the OIDC provider.
48
+
In ROSA with STS clusters, the OIDC provider is created during install and set as the service account issuer by default. The `sts.amazonaws.com` audience is set by default in the OIDC provider.
Copy file name to clipboardExpand all lines: modules/life-cycle-limited-support.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,11 +15,11 @@ When a cluster transitions to a _Limited Support_ status, Red{nbsp}Hat no longer
15
15
16
16
A cluster might transition to a Limited Support status for many reasons, including the following scenarios:
17
17
18
-
ifndef::rosa-with-hcp[]
18
+
ifndef::openshift-rosa-hcp[]
19
19
If you do not upgrade a cluster to a supported version before the end-of-life date:: Red{nbsp}Hat does not make any runtime or SLA guarantees for versions after their end-of-life date. To receive continued support, upgrade the cluster to a supported version before the end-of-life date. If you do not upgrade the cluster before the end-of-life date, the cluster transitions to a Limited Support status until it is upgraded to a supported version.
20
20
+
21
21
Red{nbsp}Hat provides commercially reasonable support to upgrade from an unsupported version to a supported version. However, if a supported upgrade path is no longer available, you might have to create a new cluster and migrate your workloads.
22
-
endif::rosa-with-hcp[]
22
+
endif::openshift-rosa-hcp[]
23
23
24
24
If you remove or replace any native {product-title} components or any other component that is installed and managed by Red{nbsp}Hat:: If cluster administrator permissions were used, Red{nbsp}Hat is not responsible for any of your or your authorized users’ actions, including those that affect infrastructure services, service availability, or data loss. If Red{nbsp}Hat detects any such actions, the cluster might transition to a Limited Support status. Red{nbsp}Hat notifies you of the status change and you should either revert the action or create a support case to explore remediation steps that might require you to delete and recreate the cluster.
Copy file name to clipboardExpand all lines: modules/life-cycle-mandatory-upgrades.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,12 +14,12 @@ endif::[]
14
14
If a critical or important CVE, or other bug identified by Red{nbsp}Hat, significantly impacts the security or stability of the cluster, the customer must upgrade to the next supported patch release within two link:https://access.redhat.com/articles/2623321[business days].
15
15
16
16
In extreme circumstances and based on Red{nbsp}Hat's assessment of the CVE criticality to the environment, Red{nbsp}Hat will notify customers that they have two link:https://access.redhat.com/articles/2623321[business days] to schedule or manually update their cluster to the latest, secure patch release. In the case that an update is not performed after two link:https://access.redhat.com/articles/2623321[business days], Red{nbsp}Hat will automatically update the
17
-
ifdef::rosa-with-hcp[]
17
+
ifdef::openshift-rosa-hcp[]
18
18
cluster's control plane
19
-
endif::rosa-with-hcp[]
20
-
ifndef::rosa-with-hcp[]
19
+
endif::openshift-rosa-hcp[]
20
+
ifndef::openshift-rosa-hcp[]
21
21
cluster
22
-
endif::rosa-with-hcp[]
22
+
endif::openshift-rosa-hcp[]
23
23
to the latest, secure patch release to mitigate potential security breach(es) or instability. Red{nbsp}Hat might, at its own discretion, temporarily delay an automated update if requested by a customer through a link:https://access.redhat.com/support[support case].
Copy file name to clipboardExpand all lines: modules/life-cycle-minor-versions.adoc
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,23 +13,23 @@ endif::[]
13
13
Starting with the 4.8 OpenShift Container Platform minor version, Red{nbsp}Hat supports all minor versions for at least a 16 month period following general availability of the given minor version. Patch versions are not affected by the support period.
14
14
15
15
Customers are notified 60, 30, and 15 days before the end of the support period. Clusters must be upgraded to the latest patch version of the oldest supported minor version before the end of the support period, or
16
-
ifdef::rosa-with-hcp[]
16
+
ifdef::openshift-rosa-hcp[]
17
17
Red{nbsp}Hat will automatically upgrade the control plane to the next supported minor version.
18
-
endif::rosa-with-hcp[]
19
-
ifndef::rosa-with-hcp[]
18
+
endif::openshift-rosa-hcp[]
19
+
ifndef::openshift-rosa-hcp[]
20
20
the cluster will enter a "Limited Support" status.
21
-
endif::rosa-with-hcp[]
21
+
endif::openshift-rosa-hcp[]
22
22
23
23
.Example
24
24
. A customer's cluster is currently running on 4.13.8. The 4.13 minor version became generally available on May 17, 2023.
25
25
. On July 19, August 16, and September 2, 2024, the customer is notified that their cluster will enter "Limited Support" status on September 17, 2024 if the cluster has not already been upgraded to a supported minor version.
26
26
. The cluster must be upgraded to 4.14 or later by September 17, 2024.
27
-
ifdef::rosa-with-hcp[]
27
+
ifdef::openshift-rosa-hcp[]
28
28
. If the upgrade has not been performed, the cluster's control plane will be automatically upgraded to 4.14.26, and there will be no automatic upgrades to the cluster's worker nodes.
29
-
endif::rosa-with-hcp[]
30
-
ifndef::rosa-with-hcp[]
29
+
endif::openshift-rosa-hcp[]
30
+
ifndef::openshift-rosa-hcp[]
31
31
. If the upgrade has not been performed, the cluster will be flagged as being in a "Limited Support" status.
Copy file name to clipboardExpand all lines: modules/life-cycle-overview.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,4 +9,4 @@
9
9
10
10
Red{nbsp}Hat provides a published product life cycle for {product-title} in order for customers and partners to effectively plan, deploy, and support their applications running on the platform. Red{nbsp}Hat publishes this life cycle to provide as much transparency as possible and might make exceptions from these policies as conflicts arise.
11
11
12
-
{product-title} is a managed instance of Red{nbsp}Hat OpenShift and maintains an independent release schedule. More details about the managed offering can be found in the {product-title} service definition. The availability of Security Advisories and Bug Fix Advisories for a specific version are dependent upon the Red{nbsp}Hat OpenShift Container Platform life cycle policy and subject to the {product-title} maintenance schedule.
12
+
{product-title} is a managed deployment of Red{nbsp}Hat OpenShift and maintains an independent release schedule. More details about the managed offering can be found in the {product-title} service definition. The availability of Security Advisories and Bug Fix Advisories for a specific version are dependent upon the Red{nbsp}Hat OpenShift Container Platform life cycle policy and subject to the {product-title} maintenance schedule.
Copy file name to clipboardExpand all lines: modules/managed-cluster-notification-policy.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Most cluster notifications are generated and sent automatically to ensure that y
13
13
14
14
In certain situations, Red{nbsp}Hat Site Reliability Engineering (SRE) creates and sends cluster notifications to provide additional context and guidance for a complex issue.
15
15
16
-
Cluster notifications are not sent for low-impact events, low-risk security updates, routine operations and maintenance, or minor, transient issues that are quickly resolved by SRE.
16
+
Cluster notifications are not sent for low-impact events, low-risk security updates, routine operations and maintenance, or minor, transient issues that are quickly resolved by Red{nbsp}Hat SRE.
Copy file name to clipboardExpand all lines: modules/managed-resources.adoc
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,10 @@ The following covers all {product-title} resources that are managed or protected
15
15
[id="sd-managed-resources-all_{context}"]
16
16
== Managed resources
17
17
18
-
The following list displays the {product-title} resources managed by OpenShift Hive, the centralized fleet configuration management system. These resources are in addition to the OpenShift Container Platform resources created during installation. OpenShift Hive continually attempts to maintain consistency across all {product-title} clusters. Changes to {product-title} resources should be made through {cluster-manager} so that {cluster-manager} and Hive are synchronized. Contact [email protected] if {cluster-manager} does not support modifying the resources in question.
18
+
The following list displays the {product-title} resources managed by OpenShift Hive, the centralized fleet configuration management system. These resources are in addition to the OpenShift/ROSA platform resources created during installation. OpenShift Hive continually reconciles consistency across all {product-title} clusters. Changes to {product-title} resources should be made through {cluster-manager} so that {cluster-manager} and Hive are synchronized. Contact [email protected] if {cluster-manager} does not support modifying the resources in question.
19
19
20
20
.List of Red{nbsp}Hat managed resources
21
+
(Note that the following may not be visible in your ROSA cluster)
Copy file name to clipboardExpand all lines: modules/rosa-access-approval-review.adoc
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@
6
6
7
7
[id="rosa-policy-access-approval_{context}"]
8
8
= Access approval and review
9
-
New SRE user access requires management approval. Separated or transferred SRE accounts are removed as authorized users through an automated process. Additionally, the SRE performs periodic access review, including management sign-off of authorized user lists.
9
+
New Red{nbsp}Hat SRE user access requires management approval. Separated or transferred SRE accounts are removed as authorized users through an automated process. Additionally, the SRE performs periodic access review, including management sign-off of authorized user lists.
10
10
11
11
The access and identity authorization table includes responsibilities for managing authorized access to clusters, applications, and infrastructure resources. This includes tasks such as providing access control mechanisms, authentication, authorization, and managing access to resources.
Copy file name to clipboardExpand all lines: modules/rosa-aws-customer-managed-policies.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,5 +17,5 @@ Attaching permission boundary policies to IAM roles that restrict ROSA-specific
17
17
[role="_additional-resources"]
18
18
.Additional resources
19
19
20
-
* xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-aws-requirements-attaching-boundary-policy_rosa-sts-about-iam-resources[Permission boundaries for the installer role]
20
+
// * xref:../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-aws-requirements-attaching-boundary-policy_rosa-sts-about-iam-resources[Permission boundaries for the installer role]
21
21
* link:https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html[Permissions boundaries for IAM entities]
0 commit comments