Skip to content

Commit 7dcdea0

Browse files
authored
Merge pull request #64391 from bmcelvee/OSDOCS-7643
OSDOCS-7643: Privatelink endpoint creation
2 parents 8cf332a + 799e02a commit 7dcdea0

File tree

2 files changed

+17
-2
lines changed

2 files changed

+17
-2
lines changed
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
:_content-type: CONCEPT
2+
[id="rosa-sre-access-privatelink-vpc.adoc_{context}"]
3+
= SRE access through PrivateLink VPC endpoint service
4+
5+
PrivateLink VPC endpoint service is created as part of the ROSA cluster creation.
6+
7+
When you have a PrivateLink ROSA cluster, its Kubernetes API Server is exposed through a load balancer that can only be accessed from within the VPC by default. Red Hat site reliability engineering (SRE) can connect to this load balancer through a VPC Endpoint Service that has an associated VPC Endpoint in a Red Hat-owned AWS account. This endpoint service contains the name of the cluster, which is also in the ARN.
8+
9+
Under the *Allow principals* tab, a Red Hat-owned AWS account is listed. This specific user ensures that other entities cannot create VPC Endpoint connections to the PrivateLink cluster’s Kubernetes API Server.
10+
11+
When Red Hat SREs access the API, this fleet management plane can connect to the internal API through the VPC endpoint service.
12+
13+
14+
Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
1-
////
21
:_content-type: ASSEMBLY
32
include::_attributes/attributes-openshift-dedicated.adoc[]
43
:context: rosa-sre-access
54
[id="rosa-sre-access"]
65
= SRE and service account access
76

7+
Red Hat site reliability engineering (SRE) access to ROSA clusters is outlined through identity and access management.
8+
89
include::modules/rosa-policy-identity-access-management.adoc[leveloffset=+1]
9-
////
10+
include::modules/rosa-sre-access-privatelink-vpc.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)