Skip to content

Commit 39c595a

Browse files
authored
Merge pull request #52701 from Amrita42/Agent-61
Agent-61: Adds FIPS compliance for Agent-based Installer
2 parents 424f508 + 0ec1ec8 commit 39c595a

File tree

4 files changed

+71
-2
lines changed

4 files changed

+71
-2
lines changed

installing/installing_with_agent_based_installer/preparing-to-install-with-agent-based-installer.adoc

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,18 @@ The Agent-based Installer also utilizes Zero Touch Provisioning (ZTP) custom res
1616

1717
include::modules/understanding-agent-install.adoc[leveloffset=+1]
1818

19+
include::modules/agent-installer-fips-compliance.adoc[leveloffset=+1]
20+
21+
include::modules/agent-installer-configuring-fips-compliance.adoc[leveloffset=+1]
22+
23+
[discrete]
24+
[role="_additional-resources"]
25+
.Additional resources
26+
27+
* link:https://access.redhat.com/articles/5059881[OpenShift Security Guide Book].
28+
29+
* xref:../../installing/installing-fips.adoc#installing-fips[Support for FIPS cryptography]
30+
1931
include::modules/installation-bare-metal-agent-installer-config-yaml.adoc[leveloffset=+1]
2032

2133
include::modules/validations-before-agent-iso-creation.adoc[leveloffset=+1]
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * installing/installing_with_agent_bases_installer/preparing-to-install-with-agent-based-installer.adoc
4+
5+
6+
:_content-type: PROCEDURE
7+
[id="agent-installer-configuring-fips-compliance_{context}"]
8+
9+
= Configuring FIPS through the Agent-based Installer
10+
11+
During a cluster deployment, the Federal Information Processing Standards (FIPS) change is applied when the Red Hat Enterprise Linux CoreOS (RHCOS) machines are deployed in your cluster. For Red Hat Enterprise Linux (RHEL) machines, you must enable FIPS mode when you install the operating system on the machines that you plan to use as worker machines.
12+
13+
You can enable FIPS mode through the preferred method of `install-config.yaml` and `agent.config.yaml`:
14+
15+
. You must set value of the `fips` field to `True` in the `install-config.yaml` file:
16+
+
17+
.Sample install-config.yaml.file
18+
19+
[source,yaml]
20+
----
21+
apiVersion: v1
22+
baseDomain: test.example.com
23+
metadata:
24+
name: sno-cluster
25+
fips: True
26+
----
27+
28+
. Optional: If you are using the ZTP manifests, you must set the value of `fips` as `True` in the `Agent-install.openshift.io/install-config-overrides` field in the `agent-cluster-install.yaml` file:
29+
30+
+
31+
.Sample agent-cluster-install.yaml file
32+
[source,yaml]
33+
----
34+
apiVersion: extensions.hive.openshift.io/v1beta1
35+
kind: AgentClusterInstall
36+
metadata:
37+
annotations:
38+
agent-install.openshift.io/install-config-overrides: '{"fips": True}'
39+
name: sno-cluster
40+
namespace: sno-cluster-test
41+
----
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * installing/installing_with_agent_bases_installer/preparing-to-install-with-agent-based-installer.adoc
4+
5+
6+
:_content-type: CONCEPT
7+
[id="agent-installer-fips-compliance_{context}"]
8+
= About FIPS compliance
9+
10+
For many {product-title} customers, regulatory readiness, or compliance, on some level is required before any systems can be put into production. That regulatory readiness can be imposed by national standards, industry standards or the organization's corporate governance framework.
11+
Federal Information Processing Standards (FIPS) compliance is one of the most critical components required in highly secure environments to ensure that only supported cryptographic technologies are allowed on nodes.
12+
13+
[IMPORTANT]
14+
====
15+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
16+
====

modules/understanding-agent-install.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
// Module included in the following assemblies:
22
//
3-
// * installing/installing-with-agent/installing-with-agent.adoc
3+
// * installing/installing_with_agent_bases_installer/preparing-to-install-with-agent-based-installer.adoc
44

55
:_content-type: CONCEPT
66
[id="understanding-agent-install_{context}"]
@@ -35,7 +35,7 @@ One of the nodes runs the Assisted Service at the start of the boot process and
3535
The Assisted Service ensures that all the hosts meet the requirements and triggers an {product-title} cluster deployement. All the nodes have the Red Hat Enterprise Linux CoreOS (RHCOS) image written to the disk. The non-bootstrap nodes reboot and initiate a cluster deployment.
3636
When the nodes are rebooted, **node 0** reboots and joins the cluster. The bootstrapping is complete and the cluster is deployed.
3737

38-
.Node lifecycle workflow
38+
.Node lifecycle workflow
3939
image::agent-based-installer-workflow.png[Agent-based installer workflow]
4040

4141
You can install a disconnected {product-title} cluster through the `openshift-install agent create image` subcommand for the following topologies:

0 commit comments

Comments
 (0)