Skip to content

Commit 8c27fe4

Browse files
author
Michael Burke
committed
[OSDOCS-8070] OCP content port to ROSA and OSD: Service Mesh
1 parent a9cb3ce commit 8c27fe4

20 files changed

+334
-47
lines changed

_topic_maps/_topic_map_osd.yml

Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1262,6 +1262,94 @@ Topics:
12621262
- Name: Config map reference for the Cluster Monitoring Operator
12631263
File: config-map-reference-for-the-cluster-monitoring-operator
12641264
---
1265+
Name: Service Mesh
1266+
Dir: service_mesh
1267+
Distros: openshift-dedicated
1268+
Topics:
1269+
- Name: Service Mesh 2.x
1270+
Dir: v2x
1271+
Topics:
1272+
- Name: About OpenShift Service Mesh
1273+
File: ossm-about
1274+
- Name: Service Mesh 2.x release notes
1275+
File: servicemesh-release-notes
1276+
- Name: Service Mesh architecture
1277+
File: ossm-architecture
1278+
- Name: Service Mesh deployment models
1279+
File: ossm-deployment-models
1280+
- Name: Service Mesh and Istio differences
1281+
File: ossm-vs-community
1282+
- Name: Preparing to install Service Mesh
1283+
File: preparing-ossm-installation
1284+
- Name: Installing the Operators
1285+
File: installing-ossm
1286+
- Name: Creating the ServiceMeshControlPlane
1287+
File: ossm-create-smcp
1288+
- Name: Adding workloads to a service mesh
1289+
File: ossm-create-mesh
1290+
- Name: Enabling sidecar injection
1291+
File: prepare-to-deploy-applications-ossm
1292+
- Name: Upgrading Service Mesh
1293+
File: upgrading-ossm
1294+
- Name: Managing users and profiles
1295+
File: ossm-profiles-users
1296+
- Name: Security
1297+
File: ossm-security
1298+
- Name: Traffic management
1299+
File: ossm-traffic-manage
1300+
- Name: Metrics, logs, and traces
1301+
File: ossm-observability
1302+
- Name: Performance and scalability
1303+
File: ossm-performance-scalability
1304+
- Name: Deploying to production
1305+
File: ossm-deploy-production
1306+
- Name: Federation
1307+
File: ossm-federation
1308+
- Name: Extensions
1309+
File: ossm-extensions
1310+
- Name: 3scale WebAssembly for 2.1
1311+
File: ossm-threescale-webassembly-module
1312+
- Name: 3scale Istio adapter for 2.0
1313+
File: threescale-adapter
1314+
- Name: Troubleshooting Service Mesh
1315+
File: ossm-troubleshooting-istio
1316+
- Name: Control plane configuration reference
1317+
File: ossm-reference-smcp
1318+
- Name: Kiali configuration reference
1319+
File: ossm-reference-kiali
1320+
- Name: Jaeger configuration reference
1321+
File: ossm-reference-jaeger
1322+
- Name: Uninstalling Service Mesh
1323+
File: removing-ossm
1324+
# Service Mesh 1.x is tech preview
1325+
# - Name: Service Mesh 1.x
1326+
# Dir: v1x
1327+
# Topics:
1328+
# - Name: Service Mesh 1.x release notes
1329+
# File: servicemesh-release-notes
1330+
# - Name: Service Mesh architecture
1331+
# File: ossm-architecture
1332+
# - Name: Service Mesh and Istio differences
1333+
# File: ossm-vs-community
1334+
# - Name: Preparing to install Service Mesh
1335+
# File: preparing-ossm-installation
1336+
# - Name: Installing Service Mesh
1337+
# File: installing-ossm
1338+
# - Name: Security
1339+
# File: ossm-security
1340+
# - Name: Traffic management
1341+
# File: ossm-traffic-manage
1342+
# - Name: Deploying applications on Service Mesh
1343+
# File: prepare-to-deploy-applications-ossm
1344+
# - Name: Data visualization and observability
1345+
# File: ossm-observability
1346+
# - Name: Custom resources
1347+
# File: ossm-custom-resources
1348+
# - Name: 3scale Istio adapter for 1.x
1349+
# File: threescale-adapter
1350+
# - Name: Removing Service Mesh
1351+
# File: removing-ossm
1352+
---
12651353
Name: Serverless
12661354
Dir: serverless
12671355
Distros: openshift-dedicated

_topic_maps/_topic_map_rosa.yml

Lines changed: 28 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1563,33 +1563,34 @@ Topics:
15631563
File: ossm-reference-jaeger
15641564
- Name: Uninstalling Service Mesh
15651565
File: removing-ossm
1566-
- Name: Service Mesh 1.x
1567-
Dir: v1x
1568-
Topics:
1569-
- Name: Service Mesh 1.x release notes
1570-
File: servicemesh-release-notes
1571-
- Name: Service Mesh architecture
1572-
File: ossm-architecture
1573-
- Name: Service Mesh and Istio differences
1574-
File: ossm-vs-community
1575-
- Name: Preparing to install Service Mesh
1576-
File: preparing-ossm-installation
1577-
- Name: Installing Service Mesh
1578-
File: installing-ossm
1579-
- Name: Security
1580-
File: ossm-security
1581-
- Name: Traffic management
1582-
File: ossm-traffic-manage
1583-
- Name: Deploying applications on Service Mesh
1584-
File: prepare-to-deploy-applications-ossm
1585-
- Name: Data visualization and observability
1586-
File: ossm-observability
1587-
- Name: Custom resources
1588-
File: ossm-custom-resources
1589-
- Name: 3scale Istio adapter for 1.x
1590-
File: threescale-adapter
1591-
- Name: Removing Service Mesh
1592-
File: removing-ossm
1566+
# Service Mesh 1.x is tech preview
1567+
# - Name: Service Mesh 1.x
1568+
# Dir: v1x
1569+
# Topics:
1570+
# - Name: Service Mesh 1.x release notes
1571+
# File: servicemesh-release-notes
1572+
# - Name: Service Mesh architecture
1573+
# File: ossm-architecture
1574+
# - Name: Service Mesh and Istio differences
1575+
# File: ossm-vs-community
1576+
# - Name: Preparing to install Service Mesh
1577+
# File: preparing-ossm-installation
1578+
# - Name: Installing Service Mesh
1579+
# File: installing-ossm
1580+
# - Name: Security
1581+
# File: ossm-security
1582+
# - Name: Traffic management
1583+
# File: ossm-traffic-manage
1584+
# - Name: Deploying applications on Service Mesh
1585+
# File: prepare-to-deploy-applications-ossm
1586+
# - Name: Data visualization and observability
1587+
# File: ossm-observability
1588+
# - Name: Custom resources
1589+
# File: ossm-custom-resources
1590+
# - Name: 3scale Istio adapter for 1.x
1591+
# File: threescale-adapter
1592+
# - Name: Removing Service Mesh
1593+
# File: removing-ossm
15931594
---
15941595
Name: Serverless
15951596
Dir: serverless

modules/distr-tracing-config-storage.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -645,6 +645,7 @@ spec:
645645
<3> Secret which defines environment variables ES_PASSWORD and ES_USERNAME. Created by kubectl create secret generic tracing-secret --from-literal=ES_PASSWORD=changeme --from-literal=ES_USERNAME=elastic
646646
<4> Volume mounts and volumes which are mounted into all storage components.
647647

648+
ifndef::openshift-rosa,openshift-dedicated[]
648649
[id="distr-tracing-manage-es-certificates_{context}"]
649650
= Managing certificates with Elasticsearch
650651

@@ -721,3 +722,4 @@ spec:
721722
The {JaegerName} Operator sets the Elasticsearch custom resource `name` to the value of `spec.storage.elasticsearch.name` from the Jaeger custom resource when provisioning Elasticsearch.
722723

723724
The certificates are provisioned by the Red Hat Elasticsearch Operator and the {JaegerName} Operator injects the certificates.
725+
endif::openshift-rosa,openshift-dedicated[]

modules/ossm-about-smcp.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,4 +24,7 @@ The {SMProductShortName} documentation uses `istio-system` as the example projec
2424

2525
ifdef::openshift-rosa[]
2626
If you are deploying the control plane for use on {product-rosa}, see the Red Hat Knowledgebase article link:https://access.redhat.com/solutions/6529231[OpenShift service mesh operator Istio basic not starting due to authentication errors], which discusses adding a new project and starting pods.
27-
endif::openshift-rosa[]
27+
endif::openshift-rosa[]
28+
ifdef::openshift-dedicated[]
29+
If you are deploying the control plane for use on {product-dedicated}, see the Red Hat Knowledgebase article link:https://access.redhat.com/solutions/6529231[OpenShift service mesh operator Istio basic not starting due to authentication errors], which discusses adding a new project and starting pods.
30+
endif::openshift-dedicated[]

modules/ossm-configuring-the-threescale-wasm-auth-module.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@ Configuring the WebAssembly extension is currently a manual process. Support for
2525

2626
* Identify a Kubernetes workload and namespace on your {SMProductShortName} deployment that you will apply this module.
2727
* You must have a 3scale tenant account. See link:https://www.3scale.net/signup[SaaS] or link:https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management/2.11/html-single/installing_3scale/index#install-threescale-on-openshift-guide[3scale 2.11 On-Premises] with a matching service and relevant applications and metrics defined.
28+
ifndef::openshift-rosa,openshift-dedicated[]
2829
* If you apply the module to the `<product_page>` microservice in the `bookinfo` namespace, see the xref:../../service_mesh/v1x/prepare-to-deploy-applications-ossm.adoc#ossm-tutorial-bookinfo-overview_deploying-applications-ossm-v1x[Bookinfo sample application].
30+
endif::openshift-rosa,openshift-dedicated[]
2931
** The following example is the YAML format for the custom resource for `threescale-wasm-auth` module.
3032
This example refers to the upstream Maistra version of {SMProductShortName}, `WasmPlugin` API. You must declare the namespace where the `threescale-wasm-auth` module is deployed, alongside a `selector` to identify the set of applications the module will apply to:
3133
+

modules/ossm-control-plane-web.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,12 @@ You can deploy a basic `ServiceMeshControlPlane` by using the web console. In t
1111
.Prerequisites
1212

1313
* The {SMProductName} Operator must be installed.
14-
* An account with the `cluster-admin` role.
14+
ifndef::openshift-rosa,openshift-dedicated[]
15+
* You are logged in to the {product-title} web console as `cluster-admin`.
16+
endif::openshift-rosa,openshift-dedicated[]
17+
ifdef::openshift-rosa,openshift-dedicated[]
18+
* You are logged in to the {product-title} web console as a user with the `dedicated-admin` role.
19+
endif::openshift-rosa,openshift-dedicated[]
1520
1621
.Procedure
1722

modules/ossm-federation-across-cluster.adoc

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,28 +15,32 @@ If the cluster runs on bare metal and fully supports `LoadBalancer` services, th
1515

1616
If the cluster does not support `LoadBalancer` services, using a `NodePort` service could be an option if the nodes are accessible from the cluster running the other mesh. In the `ServiceMeshPeer` object, specify the IP addresses of the nodes in the `.spec.remote.addresses` field and the service's node ports in the `.spec.remote.discoveryPort` and `.spec.remote.servicePort` fields.
1717

18-
ifndef::openshift-rosa[]
18+
ifndef::openshift-rosa,openshift-dedicated[]
1919
== Exposing the federation ingress on clusters running on {ibm-power-title} and {ibm-z-title}
2020
If the cluster runs on {ibm-power-name} or {ibm-z-name} infrastructure and fully supports `LoadBalancer` services, the IP address found in the `.status.loadBalancer.ingress.ip` field of the ingress gateway `Service` object should be specified as one of the entries in the `.spec.remote.addresses` field of the `ServiceMeshPeer` object.
2121

2222
If the cluster does not support `LoadBalancer` services, using a `NodePort` service could be an option if the nodes are accessible from the cluster running the other mesh. In the `ServiceMeshPeer` object, specify the IP addresses of the nodes in the `.spec.remote.addresses` field and the service's node ports in the `.spec.remote.discoveryPort` and `.spec.remote.servicePort` fields.
23-
endif::openshift-rosa[]
23+
endif::openshift-rosa,openshift-dedicated[]
2424

25+
ifndef::openshift-dedicated[]
2526
== Exposing the federation ingress on Amazon Web Services (AWS)
2627
By default, LoadBalancer services in clusters running on AWS do not support L4 load balancing. In order for {SMProductName} federation to operate correctly, the following annotation must be added to the ingress gateway service:
2728

2829
service.beta.kubernetes.io/aws-load-balancer-type: nlb
2930

3031
The Fully Qualified Domain Name found in the `.status.loadBalancer.ingress.hostname` field of the ingress gateway `Service` object should be specified as one of the entries in the `.spec.remote.addresses` field of the `ServiceMeshPeer` object.
32+
endif::openshift-dedicated[]
3133

32-
ifndef::openshift-rosa[]
34+
ifndef::openshift-rosa,openshift-dedicated[]
3335
== Exposing the federation ingress on Azure
3436
On Microsoft Azure, merely setting the service type to `LoadBalancer` suffices for mesh federation to operate correctly.
3537

3638
The IP address found in the `.status.loadBalancer.ingress.ip` field of the ingress gateway `Service` object should be specified as one of the entries in the `.spec.remote.addresses` field of the `ServiceMeshPeer` object.
39+
endif::openshift-rosa,openshift-dedicated[]
3740

41+
ifndef::openshift-rosa[]
3842
== Exposing the federation ingress on Google Cloud Platform (GCP)
3943
On Google Cloud Platform, merely setting the service type to `LoadBalancer` suffices for mesh federation to operate correctly.
4044

4145
The IP address found in the `.status.loadBalancer.ingress.ip` field of the ingress gateway `Service` object should be specified as one of the entries in the `.spec.remote.addresses` field of the `ServiceMeshPeer` object.
42-
endif::openshift-rosa[]
46+
endif::openshift-rosa[]

modules/ossm-federation-config-smcp.adoc

Lines changed: 81 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ Before a mesh can be federated, you must configure the `ServiceMeshControlPlane`
1111

1212
In the following example, the administrator for the `red-mesh` is configuring the SMCP for federation with both the `green-mesh` and the `blue-mesh`.
1313

14+
ifndef::openshift-rosa,openshift-dedicated[]
1415
.Sample SMCP for red-mesh
1516
[source,yaml, subs="attributes,verbatim"]
1617
----
@@ -82,7 +83,86 @@ spec:
8283
trust:
8384
domain: red-mesh.local
8485
----
85-
86+
endif::openshift-rosa,openshift-dedicated[]
87+
ifdef::openshift-rosa,openshift-dedicated[]
88+
.Sample SMCP for red-mesh
89+
[source,yaml, subs="attributes,verbatim"]
90+
----
91+
apiVersion: maistra.io/v2
92+
kind: ServiceMeshControlPlane
93+
metadata:
94+
name: red-mesh
95+
namespace: red-mesh-system
96+
spec:
97+
version: v{MaistraVersion}
98+
runtime:
99+
defaults:
100+
container:
101+
imagePullPolicy: Always
102+
gateways:
103+
additionalEgress:
104+
egress-green-mesh:
105+
enabled: true
106+
requestedNetworkView:
107+
- green-network
108+
routerMode: sni-dnat
109+
service:
110+
metadata:
111+
labels:
112+
federation.maistra.io/egress-for: egress-green-mesh
113+
ports:
114+
- port: 15443
115+
name: tls
116+
- port: 8188
117+
name: http-discovery #note HTTP here
118+
egress-blue-mesh:
119+
enabled: true
120+
requestedNetworkView:
121+
- blue-network
122+
routerMode: sni-dnat
123+
service:
124+
metadata:
125+
labels:
126+
federation.maistra.io/egress-for: egress-blue-mesh
127+
ports:
128+
- port: 15443
129+
name: tls
130+
- port: 8188
131+
name: http-discovery #note HTTP here
132+
additionalIngress:
133+
ingress-green-mesh:
134+
enabled: true
135+
routerMode: sni-dnat
136+
service:
137+
type: LoadBalancer
138+
metadata:
139+
labels:
140+
federation.maistra.io/ingress-for: ingress-green-mesh
141+
ports:
142+
- port: 15443
143+
name: tls
144+
- port: 8188
145+
name: https-discovery #note HTTPS here
146+
ingress-blue-mesh:
147+
enabled: true
148+
routerMode: sni-dnat
149+
service:
150+
type: LoadBalancer
151+
metadata:
152+
labels:
153+
federation.maistra.io/ingress-for: ingress-blue-mesh
154+
ports:
155+
- port: 15443
156+
name: tls
157+
- port: 8188
158+
name: https-discovery #note HTTPS here
159+
security:
160+
identity:
161+
type: ThirdParty
162+
trust:
163+
domain: red-mesh.local
164+
----
165+
endif::openshift-rosa,openshift-dedicated[]
86166

87167
.ServiceMeshControlPlane federation configuration parameters
88168
[options="header"]
@@ -142,7 +222,6 @@ To avoid naming conflicts between meshes, you must create separate egress and in
142222
|Networks associated with exported services.
143223
|Set to the value of `spec.cluster.network` in the SMCP for the mesh, otherwise use <ServiceMeshPeer-name>-network. For example, if the `ServiceMeshPeer` resource for that mesh is named `west`, then the network would be named `west-network`.
144224
|
145-
|
146225

147226
|spec:
148227
gateways:

modules/ossm-install-ossm-operator.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,12 @@ If you have already installed the OpenShift Elasticsearch Operator as part of Op
2121

2222
.Procedure
2323

24-
. Log in to the {product-title} web console as a user with the `cluster-admin` role. If you use {product-dedicated}, you must have an account with the `dedicated-admin` role.
24+
ifndef::openshift-rosa,openshift-dedicated[]
25+
. Log in to the {product-title} web console as a user with the `cluster-admin` role.
26+
endif::openshift-rosa,openshift-dedicated[]
27+
ifdef::openshift-rosa,openshift-dedicated[]
28+
. Log in to the {product-title} web console as a user with the `dedicated-admin` role.
29+
endif::openshift-rosa,openshift-dedicated[]
2530

2631
. In the {product-title} web console, click *Operators* -> *OperatorHub*.
2732

0 commit comments

Comments
 (0)