Skip to content

Commit a388557

Browse files
authored
Merge pull request #43022 from EricPonvelle/OSDOCS-3342_ProxyNetworkExceptions
OSDOCS-3342: Network Requirements
2 parents a47ac85 + 378f89a commit a388557

File tree

4 files changed

+75
-24
lines changed

4 files changed

+75
-24
lines changed

modules/cluster-wide-proxy-preqs.adoc

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * networking/configuring-cluster-wide-proxy.adoc
4+
5+
:_content-type: PROCEDURE
6+
[id="cluster-wide-proxy-prereqs_{context}"]
7+
= Prerequisites for configuring a cluster-wide proxy
8+
9+
To configure a cluster-wide proxy, you must meet the following requirements. These requirements are valid for both fresh installation and post installation proxy configuration.
10+
11+
[id="cluster-wide-proxy-general-prereqs_{context}"]
12+
== General requirements
13+
14+
* You are the cluster owner.
15+
* Your account has sufficient privileges.
16+
* You have added the `ec2.<region>.amazonaws.com`, `elasticloadbalancing.<region>.amazonaws.com`, and `s3.<region>.amazonaws.com` endpoints to your virtual private cloud (VPC) endpoint. These endpoints are required to complete requests from the nodes to the AWS EC2 API. Because the proxy works on the container level, not the node level, you must route these requests to the AWS EC2 API through the AWS private network. Adding the public IP address of the EC2 API to your allowlist in your proxy server is not sufficient.
17+
ifdef::openshift-rosa[]
18+
* You have the `rosa` CLI installed and configured.
19+
endif::[]
20+
ifdef::openshift-dedicated[]
21+
* You must have a Customer Cloud Subscription (CCS) cluster with a VPC that the proxy can access.
22+
* You have the `ocm` CLI installed and configured.
23+
endif::[]
24+
25+
[id="cluster-wide-proxy-network-prereqs_{context}"]
26+
== Network requirements
27+
28+
* If your proxy re-encyrpts egress traffic, you must create exclusions to the domain and port combinations. The following table offers guidance into these exceptions.
29+
** Allowlist the following OpenShift URLs for re-encryption.
30+
+
31+
[cols="6,1,6",options="header"]
32+
|===
33+
|Address | Protocol/Port | Function
34+
|`observatorium-mst.api.openshift.com`
35+
|https/443
36+
|Required. Used for Managed OpenShift-specific telemetry.
37+
38+
|`sso.redhat.com`
39+
|https/443
40+
|The https://cloud.redhat.com/openshift site uses authentication from sso.redhat.com to download the cluster pull secret and use Red Hat SaaS solutions to facilitate monitoring of your subscriptions, cluster inventory, and chargeback reporting.
41+
|===
42+
+
43+
** Allowlist the following site reliability engineering (SRE) and management URLs for re-encryption.
44+
+
45+
[cols="6,1,6",options="header"]
46+
|===
47+
|Address | Protocol/Port | Function
48+
|`*.osdsecuritylogs.splunkcloud.com`
49+
50+
**OR**
51+
52+
`inputs1.osdsecuritylogs.splunkcloud.com`
53+
`inputs2.osdsecuritylogs.splunkcloud.com`
54+
`inputs4.osdsecuritylogs.splunkcloud.com`
55+
`inputs5.osdsecuritylogs.splunkcloud.com`
56+
`inputs6.osdsecuritylogs.splunkcloud.com`
57+
`inputs7.osdsecuritylogs.splunkcloud.com`
58+
`inputs8.osdsecuritylogs.splunkcloud.com`
59+
`inputs9.osdsecuritylogs.splunkcloud.com`
60+
`inputs10.osdsecuritylogs.splunkcloud.com`
61+
`inputs11.osdsecuritylogs.splunkcloud.com`
62+
`inputs12.osdsecuritylogs.splunkcloud.com`
63+
`inputs13.osdsecuritylogs.splunkcloud.com`
64+
`inputs14.osdsecuritylogs.splunkcloud.com`
65+
`inputs15.osdsecuritylogs.splunkcloud.com`
66+
|tcp/9997
67+
|Used by the splunk-forwarder-operator as a log forwarding endpoint to be used by Red Hat SRE for log-based alerting.
68+
69+
|`http-inputs-osdsecuritylogs.splunkcloud.com`
70+
|https/443
71+
|Used by the splunk-forwarder-operator as a log forwarding endpoint to be used by Red Hat SRE for log-based alerting.
72+
|===

modules/cluster-wide-proxy-updates.adoc

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,6 @@ You may need to perform these actions if:
2525
The cluster applies the configuration to the cluster’s control plane and worker nodes. This process results in each node in the cluster temporarily being placed into an unschedulable state and drained of its workloads while applying the configuration. Each node will be restarted as part of this process.
2626
====
2727

28-
.Prerequsites
29-
ifdef::openshift-rosa[]
30-
* You have the `rosa` CLI installed and configured.
31-
endif::[]
32-
ifdef::openshift-dedicated[]
33-
* You have the `ocm` CLI installed and configured.
34-
endif::[]
35-
3628
.Procedure
3729
* To edit a cluster, run the following command:
3830
+

modules/cluster-wide-proxy.adoc

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,6 @@
88

99
You can add a proxy during cluster installation. Prior to installation, however, you should verify that the proxy is accessible from the intended cluster virtual private cloud (VPC) and its private subnets.
1010

11-
.Prerequsites
12-
ifdef::openshift-rosa[]
13-
* You have the `rosa` CLI installed and configured.
14-
endif::[]
15-
ifdef::openshift-dedicated[]
16-
* You have the `ocm` CLI installed and configured.
17-
endif::[]
18-
1911
[WARNING]
2012
====
2113
Only cluster system egress traffic is proxied, including calls to the AWS API. A system-wide proxy does not affect user workloads. It only affects system components.

networking/configuring-cluster-wide-proxy.adoc

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ endif::[]
99

1010
toc::[]
1111

12-
You can configure a cluster-wide proxy during cluster installation.
12+
You can configure a cluster-wide proxy during cluster installation or after the cluster has been installed.
1313

1414
//OSDOCS-2830 Customer Responsibilities
1515
If you use a cluster-wide proxy, you are responsible for the following:
@@ -22,18 +22,13 @@ If you use a cluster-wide proxy, you are responsible for the following:
2222
Cluster-wide proxy is a functionally-complete feature and suitable for production workloads. There are additional considerations that need to be added to documentation, and until then, this feature is considered a Technology Preview.
2323
====
2424

25-
[id="prerequisites_cluster-wide-proxy-configuration"]
26-
== Prerequisites
25+
include::modules/cluster-wide-proxy-preqs.adoc[leveloffset=+1]
2726

28-
* You are the cluster owner.
29-
* Your account has sufficient privileges.
30-
* You have added the `ec2.<region>.amazonaws.com`, `elasticloadbalancing.<region>.amazonaws.com`, and `s3.<region>.amazonaws.com` endpoints to your VPC endpoint. These endpoints are required to complete requests from the nodes to the AWS EC2 API. Because the proxy works on the container level, not the node level, you must route these requests to the AWS EC2 API through the AWS private network. Adding the public IP address of the EC2 API to your allowlist in your proxy server is not sufficient.
27+
.Additional Resources
3128
ifdef::openshift-rosa[]
3229
For information about standard installation prerequisites, see xref:../rosa_getting_started/rosa-aws-prereqs.adoc#prerequisites[AWS prerequisites for ROSA]. For information about the prerequisites for installation using AWS Security Token Service (STS), see xref:../rosa_getting_started_sts/rosa-sts-aws-prereqs.adoc#rosa-sts-aws-prerequisites[AWS prerequisites for ROSA with STS].
3330
endif::[]
3431
ifdef::openshift-dedicated[]
35-
* You must have a Customer Cloud Subscription (CCS) cluster with a VPC that the proxy can access.
36-
3732
For more information, see xref:../osd_quickstart/osd-quickstart.adoc#osd-getting-started[Getting started with {product-title}] for a basic cluster installation workflow.
3833
endif::[]
3934

0 commit comments

Comments
 (0)