|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * networking/configuring-cluster-wide-proxy.adoc |
| 4 | + |
| 5 | +:_content-type: PROCEDURE |
| 6 | +[id="cluster-wide-proxy-prereqs_{context}"] |
| 7 | += Prerequisites for configuring a cluster-wide proxy |
| 8 | + |
| 9 | +To configure a cluster-wide proxy, you must meet the following requirements. These requirements are valid for both fresh installation and post installation proxy configuration. |
| 10 | + |
| 11 | +[id="cluster-wide-proxy-general-prereqs_{context}"] |
| 12 | +== General requirements |
| 13 | + |
| 14 | +* You are the cluster owner. |
| 15 | +* Your account has sufficient privileges. |
| 16 | +* You have added the `ec2.<region>.amazonaws.com`, `elasticloadbalancing.<region>.amazonaws.com`, and `s3.<region>.amazonaws.com` endpoints to your virtual private cloud (VPC) endpoint. These endpoints are required to complete requests from the nodes to the AWS EC2 API. Because the proxy works on the container level, not the node level, you must route these requests to the AWS EC2 API through the AWS private network. Adding the public IP address of the EC2 API to your allowlist in your proxy server is not sufficient. |
| 17 | +ifdef::openshift-rosa[] |
| 18 | +* You have the `rosa` CLI installed and configured. |
| 19 | +endif::[] |
| 20 | +ifdef::openshift-dedicated[] |
| 21 | +* You must have a Customer Cloud Subscription (CCS) cluster with a VPC that the proxy can access. |
| 22 | +* You have the `ocm` CLI installed and configured. |
| 23 | +endif::[] |
| 24 | + |
| 25 | +[id="cluster-wide-proxy-network-prereqs_{context}"] |
| 26 | +== Network requirements |
| 27 | + |
| 28 | +* If your proxy re-encyrpts egress traffic, you must create exclusions to the domain and port combinations. The following table offers guidance into these exceptions. |
| 29 | +** Allowlist the following OpenShift URLs for re-encryption. |
| 30 | ++ |
| 31 | +[cols="6,1,6",options="header"] |
| 32 | +|=== |
| 33 | +|Address | Protocol/Port | Function |
| 34 | +|`observatorium-mst.api.openshift.com` |
| 35 | +|https/443 |
| 36 | +|Required. Used for Managed OpenShift-specific telemetry. |
| 37 | + |
| 38 | +|`sso.redhat.com` |
| 39 | +|https/443 |
| 40 | +|The https://cloud.redhat.com/openshift site uses authentication from sso.redhat.com to download the cluster pull secret and use Red Hat SaaS solutions to facilitate monitoring of your subscriptions, cluster inventory, and chargeback reporting. |
| 41 | +|=== |
| 42 | ++ |
| 43 | +** Allowlist the following site reliability engineering (SRE) and management URLs for re-encryption. |
| 44 | ++ |
| 45 | +[cols="6,1,6",options="header"] |
| 46 | +|=== |
| 47 | +|Address | Protocol/Port | Function |
| 48 | +|`*.osdsecuritylogs.splunkcloud.com` |
| 49 | + |
| 50 | +**OR** |
| 51 | + |
| 52 | +`inputs1.osdsecuritylogs.splunkcloud.com` |
| 53 | +`inputs2.osdsecuritylogs.splunkcloud.com` |
| 54 | +`inputs4.osdsecuritylogs.splunkcloud.com` |
| 55 | +`inputs5.osdsecuritylogs.splunkcloud.com` |
| 56 | +`inputs6.osdsecuritylogs.splunkcloud.com` |
| 57 | +`inputs7.osdsecuritylogs.splunkcloud.com` |
| 58 | +`inputs8.osdsecuritylogs.splunkcloud.com` |
| 59 | +`inputs9.osdsecuritylogs.splunkcloud.com` |
| 60 | +`inputs10.osdsecuritylogs.splunkcloud.com` |
| 61 | +`inputs11.osdsecuritylogs.splunkcloud.com` |
| 62 | +`inputs12.osdsecuritylogs.splunkcloud.com` |
| 63 | +`inputs13.osdsecuritylogs.splunkcloud.com` |
| 64 | +`inputs14.osdsecuritylogs.splunkcloud.com` |
| 65 | +`inputs15.osdsecuritylogs.splunkcloud.com` |
| 66 | +|tcp/9997 |
| 67 | +|Used by the splunk-forwarder-operator as a log forwarding endpoint to be used by Red Hat SRE for log-based alerting. |
| 68 | + |
| 69 | +|`http-inputs-osdsecuritylogs.splunkcloud.com` |
| 70 | +|https/443 |
| 71 | +|Used by the splunk-forwarder-operator as a log forwarding endpoint to be used by Red Hat SRE for log-based alerting. |
| 72 | +|=== |
0 commit comments