You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/deleting-cluster.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,5 +22,5 @@ You can delete your {product-title} cluster in {cluster-manager-first}.
22
22
+
23
23
[NOTE]
24
24
====
25
-
If you delete a cluster that was installed into a GCP Shared VPC, inform the Shared VPC Admin of the host project to remove the IAM policy roles granted to the service account that was referenced during cluster creation.
25
+
If you delete a cluster that was installed into a GCP Shared VPC, inform the VPC owner of the host project to remove the IAM policy roles granted to the service account that was referenced during cluster creation.
Copy file name to clipboardExpand all lines: modules/osd-create-cluster-ccs.adoc
+31-10Lines changed: 31 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,19 +135,40 @@ endif::osd-on-gcp[]
135
135
.. Select a cloud provider region from the *Region* drop-down menu.
136
136
.. Select a *Single zone* or *Multi-zone* configuration.
137
137
.. Leave *Enable user workload monitoring* selected to monitor your own projects in isolation from Red Hat Site Reliability Engineer (SRE) platform metrics. This option is enabled by default.
138
+
ifdef::osd-on-gcp[]
139
+
. Optional: Expand *Advanced Encryption* to make changes to encryption settings.
140
+
141
+
.. Select *Use Custom KMS keys* to use custom KMS keys. If you prefer not to use custom KMS keys, leave the default setting *Use default KMS Keys*.
142
+
+
143
+
[IMPORTANT]
144
+
====
145
+
To use custom KMS keys, the IAM service account `osd-ccs-admin` must be granted the *Cloud KMS CryptoKey Encrypter/Decrypter* role. For more information about granting roles on a resource, see link:https://cloud.google.com/kms/docs/iam#granting_roles_on_a_resource[Granting roles on a resource].
146
+
====
147
+
+
148
+
With *Use Custom KMS keys* selected:
149
+
150
+
... Select a key ring location from the *Key ring location* drop-down menu.
151
+
... Select a key ring from the *Key ring* drop-down menu.
152
+
... Select a key name from the *Key name* drop-down menu.
153
+
... Provide the *KMS Service Account*.
154
+
+
155
+
endif::osd-on-gcp[]
138
156
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
139
157
+
140
158
[NOTE]
141
159
====
142
160
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
143
161
====
144
-
.. Optional: Select *Encrypt persistent volumes with customer keys* if you want to provide your own
145
-
ifdef::osd-on-aws[]
146
-
AWS Key Management Service (KMS) key Amazon Resource Name (ARN).
147
-
endif::osd-on-aws[]
162
+
+
148
163
ifdef::osd-on-gcp[]
149
-
encryption keys through the Google Cloud Key Management Service.
164
+
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
150
165
endif::osd-on-gcp[]
166
+
ifdef::osd-on-aws[]
167
+
.. Optional: Select *Encrypt persistent volumes with customer keys* if you want to provide your own
168
+
AWS Key Management Service (KMS) key Amazon Resource Name (ARN).
169
+
// ifdef::osd-on-gcp[]
170
+
// encryption keys through the Google Cloud Key Management Service.
171
+
// endif::osd-on-gcp[]
151
172
The key is used for encrypting all control plane, infrastructure, worker node root volumes, and persistent volumes in your cluster.
152
173
+
153
174
[IMPORTANT]
@@ -156,7 +177,7 @@ Only persistent volumes (PVs) created from the default storage class are encrypt
156
177
157
178
PVs created by using any other storage class are still encrypted, but the PVs are not encrypted with this key unless the storage class is specifically configured to use this key.
158
179
====
159
-
180
+
endif::osd-on-aws[]
160
181
.. Click *Next*.
161
182
162
183
. On the *Default machine pool* page, select a *Compute node instance type* and a *Compute node count*. The number and types of nodes that are available depend on your {product-title} subscription. If you are using multiple availability zones, the compute node count is per zone.
@@ -221,16 +242,16 @@ ifdef::osd-on-gcp[]
221
242
[IMPORTANT]
222
243
====
223
244
224
-
To install a cluster into a Shared VPC, you must use {product-title} version 4.13.15 or above. Additionally, the Shared VPC Admin must enable a project as a host project in their Google Cloud console. For more information, see link:https://cloud.google.com/vpc/docs/provisioning-shared-vpc#set-up-shared-vpc[Enable a host project].
245
+
To install a cluster into a Shared VPC, you must use {product-title} version 4.13.15 or above. Additionally, the VPC owner of the host project must enable a project as a host project in their Google Cloud console. For more information, see link:https://cloud.google.com/vpc/docs/provisioning-shared-vpc#set-up-shared-vpc[Enable a host project].
225
246
====
226
247
227
248
.. Select *Install into GCP Shared VPC*.
228
249
.. Specify the *Host project ID*. If the specified host project ID is incorrect, cluster creation fails.
229
250
+
230
251
[IMPORTANT]
231
252
====
232
-
Once you complete the steps within the cluster configuration wizard and click *Create Cluster*, the cluster will go into the "Installation Waiting" state. At this point, you must contact the Shared VPC Admin of the host project, who must assign the dynamically-generated service account the following roles: *Computer Network Administrator*, *Compute Security Administrator*, and *DNS Administrator*.
233
-
The Shared VPC Admin of the host project has 30 days to grant the listed permissions before the cluster creation fails.
253
+
Once you complete the steps within the cluster configuration wizard and click *Create Cluster*, the cluster will go into the "Installation Waiting" state. At this point, you must contact the VPC owner of the host project, who must assign the dynamically-generated service account the following roles: *Computer Network Administrator*, *Compute Security Administrator*, and *DNS Administrator*.
254
+
The VPC owner of the host project has 30 days to grant the listed permissions before the cluster creation fails.
234
255
For information about Shared VPC permissions, see link:https://cloud.google.com/vpc/docs/provisioning-shared-vpc#migs-service-accounts[Provision Shared VPC].
235
256
====
236
257
endif::osd-on-gcp[]
@@ -318,7 +339,7 @@ In the event of critical security concerns that significantly impact the securit
318
339
ifdef::osd-on-gcp[]
319
340
[NOTE]
320
341
====
321
-
If you delete a cluster that was installed into a GCP Shared VPC, inform the Shared VPC Admin of the host project to remove the IAM policy roles granted to the service account that was referenced during cluster creation.
342
+
If you delete a cluster that was installed into a GCP Shared VPC, inform the VPC owner of the host project to remove the IAM policy roles granted to the service account that was referenced during cluster creation.
Copy file name to clipboardExpand all lines: modules/osd-create-cluster-gcp-account.adoc
+85-5Lines changed: 85 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,16 +34,36 @@ For more information about service account keys, click the information icon loca
34
34
.. Select a cluster version from the *Version* drop-down menu.
35
35
.. Select a cloud provider region from the *Region* drop-down menu.
36
36
.. Select a *Single zone* or *Multi-zone* configuration.
37
-
.. Select a *Persistent storage* capacity for the cluster. For more information, see the _Storage_ section in the {product-title} service definition.
38
-
.. Specify the number of *Load balancers* that you require for your cluster. For more information, see the _Load balancers_ section in the {product-title} service definition.
39
37
.. Leave *Enable user workload monitoring* selected to monitor your own projects in isolation from Red Hat Site Reliability Engineer (SRE) platform metrics. This option is enabled by default.
40
-
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
38
+
39
+
. Optional: Expand *Advanced Encryption* to make changes to encryption settings.
40
+
41
+
.. Select *Use Custom KMS keys* to use custom KMS keys. If you prefer not to use custom KMS keys, leave the default setting *Use default KMS Keys*.
42
+
+
43
+
[IMPORTANT]
44
+
====
45
+
To use custom KMS keys, the IAM service account `osd-ccs-admin` must be granted the *Cloud KMS CryptoKey Encrypter/Decrypter* role. For more information about granting roles on a resource, see link:https://cloud.google.com/kms/docs/iam#granting_roles_on_a_resource[Granting roles on a resource].
46
+
====
47
+
+
48
+
With *Use Custom KMS keys* selected:
49
+
50
+
... Select a key ring location from the *Key ring location* drop-down menu.
51
+
... Select a key ring from the *Key ring* drop-down menu.
52
+
... Select a key name from the *Key name* drop-down menu.
53
+
... Provide the *KMS Service Account*.
54
+
55
+
+
56
+
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption.
57
+
With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
41
58
+
42
59
[NOTE]
43
60
====
44
61
By enabling etcd encryption for the key values in etcd, you incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
45
62
====
46
-
.. Click *Next*.
63
+
+
64
+
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
65
+
+
66
+
. Click *Next*.
47
67
48
68
. On the *Machine pool* page, select a *Compute node instance type* and a *Compute node count*. The number and types of nodes that are available depend on your {product-title} subscription. If you are using multiple availability zones, the compute node count is per zone.
49
69
+
@@ -52,12 +72,72 @@ By enabling etcd encryption for the key values in etcd, you incur a performance
52
72
After your cluster is created, you can change the number of compute nodes, but you cannot change the compute node instance type in a created machine pool. You can add machine pools after installation that use a customized instance type. The number and types of nodes available to you depend on your {product-title} subscription.
53
73
====
54
74
55
-
. Optional: Expand *Edit node labels* to add labels to your nodes. Click *Add label* to add more node labels and select *Next*.
75
+
. Optional: Expand *Add node labels* to add labels to your nodes. Click *Add additional label* to add more node labels.
76
+
77
+
. Click *Next*.
56
78
57
79
. In the *Cluster privacy* dialog, select *Public* or *Private* to use either public or private API endpoints and application routes for your cluster.
80
+
+
81
+
. Optional: To install the cluster in an existing GCP Virtual Private Cloud (VPC):
82
+
.. Select *Install into an existing VPC*.
83
+
.. If you are installing into an existing VPC and you want to enable an HTTP or HTTPS proxy for your cluster, select *Configure a cluster-wide proxy*.
84
+
85
+
+
86
+
. Click *Next*.
87
+
+
88
+
89
+
. Optional: To install the cluster into a GCP Shared VPC:
90
+
+
91
+
[IMPORTANT]
92
+
====
58
93
94
+
To install a cluster into a Shared VPC, you must use {product-title} version 4.13.15 or above. Additionally, the VPC owner of the host project must enable a project as a host project in their Google Cloud console. For more information, see link:https://cloud.google.com/vpc/docs/provisioning-shared-vpc#set-up-shared-vpc[Enable a host project].
95
+
====
96
+
97
+
.. Select *Install into GCP Shared VPC*.
98
+
.. Specify the *Host project ID*. If the specified host project ID is incorrect, cluster creation fails.
99
+
+
100
+
[IMPORTANT]
101
+
====
102
+
Once you complete the steps within the cluster configuration wizard and click *Create Cluster*, the cluster will go into the "Installation Waiting" state. At this point, you must contact the VPC owner of the host project, who must assign the dynamically-generated service account the following roles: *Computer Network Administrator*, *Compute Security Administrator*, and *DNS Administrator*.
103
+
The VPC owner of the host project has 30 days to grant the listed permissions before the cluster creation fails.
104
+
For information about Shared VPC permissions, see link:https://cloud.google.com/vpc/docs/provisioning-shared-vpc#migs-service-accounts[Provision Shared VPC].
105
+
====
106
+
+
107
+
. If you opted to install the cluster in an existing GCP VPC, provide your *Virtual Private Cloud (VPC) subnet settings* and select *Next*.
108
+
You must have created the Cloud network address translation (NAT) and a Cloud router. See the additional resources for information about Cloud NATs and Google VPCs.
109
+
+
110
+
[NOTE]
111
+
====
112
+
You must ensure that your VPC is configured with a public and a private subnet for each availability zone that you want the cluster installed into. If you opted to use PrivateLink, only private subnets are required.
113
+
====
114
+
+
115
+
[NOTE]
116
+
====
117
+
If you are installing a cluster into a Shared VPC, the VPC name and subnets are shared from the host project.
118
+
====
119
+
+
59
120
. Click *Next*.
121
+
. If you opted to configure a cluster-wide proxy, provide your proxy configuration details on the *Cluster-wide proxy* page:
122
+
+
123
+
--
124
+
.. Enter a value in at least one of the following fields:
125
+
** Specify a valid *HTTP proxy URL*.
126
+
** Specify a valid *HTTPS proxy URL*.
127
+
** In the *Additional trust bundle* field, provide a PEM encoded X.509 certificate bundle. The bundle is added to the trusted certificate store for the cluster nodes. An additional trust bundle file is required unless the identity certificate for the proxy is signed by an authority from the {op-system-first} trust bundle.
128
+
+
129
+
If you use an MITM transparent proxy network that does not require additional proxy configuration but requires additional certificate authorities (CAs), you must provide the MITM CA certificate.
130
+
+
131
+
[NOTE]
132
+
====
133
+
If you upload an additional trust bundle file without specifying an HTTP or HTTPS proxy URL, the bundle is set on the cluster but is not configured to be used with the proxy.
134
+
====
135
+
.. Click *Next*.
136
+
--
137
+
+
138
+
For more information about configuring a proxy with {product-title}, see _Configuring a cluster-wide proxy_.
60
139
140
+
+
61
141
. In the *CIDR ranges* dialog, configure custom classless inter-domain routing (CIDR) ranges or use the defaults that are provided.
0 commit comments