You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -315,46 +310,48 @@ storage type as `io1` and set `iops` to `2000`.
315
310
The IMDS configuration for control plane machines that is set during cluster installation can only be changed by using the AWS CLI. The IMDS configuration for compute machines can be changed by using compute machine sets.
316
311
====
317
312
ifdef::vpc,restricted[]
318
-
<8> If you provide your own VPC, specify subnets for each availability zone that your cluster uses.
319
-
<9> The ID of the AMI used to boot machines for the cluster. If set, the AMI
313
+
<8> The cluster network plugin to install. The supported values are `OVNKubernetes` and `OpenShiftSDN`. The default value is `OVNKubernetes`.
314
+
<9> If you provide your own VPC, specify subnets for each availability zone that your cluster uses.
315
+
<10> The ID of the AMI used to boot machines for the cluster. If set, the AMI
320
316
must belong to the same region as the cluster.
321
-
<10> The AWS service endpoints. Custom endpoints are required when installing to
317
+
<11> The AWS service endpoints. Custom endpoints are required when installing to
322
318
an unknown AWS region. The endpoint URL must use the `https` protocol and the
323
319
host must trust the certificate.
324
-
<11> The ID of your existing Route 53 private hosted zone. Providing an existing hosted zone requires that you supply your own VPC and the hosted zone is already associated with the VPC prior to installing your cluster. If undefined, the installation program creates a new hosted zone.
320
+
<12> The ID of your existing Route 53 private hosted zone. Providing an existing hosted zone requires that you supply your own VPC and the hosted zone is already associated with the VPC prior to installing your cluster. If undefined, the installation program creates a new hosted zone.
325
321
ifndef::openshift-origin[]
326
-
<12> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
322
+
<13> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
327
323
+
328
324
[IMPORTANT]
329
325
====
330
326
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
331
327
====
332
-
<13> You can optionally provide the `sshKey` value that you use to access the
328
+
<14> You can optionally provide the `sshKey` value that you use to access the
333
329
machines in your cluster.
334
330
endif::openshift-origin[]
335
331
ifdef::openshift-origin[]
336
-
<12> You can optionally provide the `sshKey` value that you use to access the
332
+
<13> You can optionally provide the `sshKey` value that you use to access the
337
333
machines in your cluster.
338
334
endif::openshift-origin[]
339
335
endif::vpc,restricted[]
340
336
ifndef::vpc,restricted[]
341
-
<8> The ID of the AMI used to boot machines for the cluster. If set, the AMI
337
+
<8> The cluster network plugin to install. The supported values are `OVNKubernetes` and `OpenShiftSDN`. The default value is `OVNKubernetes`.
338
+
<9> The ID of the AMI used to boot machines for the cluster. If set, the AMI
342
339
must belong to the same region as the cluster.
343
-
<9> The AWS service endpoints. Custom endpoints are required when installing to
340
+
<10> The AWS service endpoints. Custom endpoints are required when installing to
344
341
an unknown AWS region. The endpoint URL must use the `https` protocol and the
345
342
host must trust the certificate.
346
343
ifndef::openshift-origin[]
347
-
<10> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
344
+
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
348
345
+
349
346
[IMPORTANT]
350
347
====
351
348
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
352
349
====
353
-
<11> You can optionally provide the `sshKey` value that you use to access the
350
+
<12> You can optionally provide the `sshKey` value that you use to access the
354
351
machines in your cluster.
355
352
endif::openshift-origin[]
356
353
ifdef::openshift-origin[]
357
-
<10> You can optionally provide the `sshKey` value that you use to access the
354
+
<11> You can optionally provide the `sshKey` value that you use to access the
358
355
machines in your cluster.
359
356
endif::openshift-origin[]
360
357
endif::vpc,restricted[]
@@ -365,36 +362,36 @@ For production {product-title} clusters on which you want to perform installatio
365
362
====
366
363
ifdef::private[]
367
364
ifndef::openshift-origin[]
368
-
<14> How to publish the user-facing endpoints of your cluster. Set `publish` to `Internal` to deploy a private cluster, which cannot be accessed from the internet. The default value is `External`.
365
+
<15> How to publish the user-facing endpoints of your cluster. Set `publish` to `Internal` to deploy a private cluster, which cannot be accessed from the internet. The default value is `External`.
369
366
endif::openshift-origin[]
370
367
ifdef::openshift-origin[]
371
-
<13> How to publish the user-facing endpoints of your cluster. Set `publish` to `Internal` to deploy a private cluster, which cannot be accessed from the internet. The default value is `External`.
368
+
<14> How to publish the user-facing endpoints of your cluster. Set `publish` to `Internal` to deploy a private cluster, which cannot be accessed from the internet. The default value is `External`.
372
369
endif::openshift-origin[]
373
370
endif::private[]
374
371
ifdef::secret[]
375
372
ifndef::openshift-origin[]
376
-
<15> The custom CA certificate. This is required when deploying to the SC2S or C2S Regions because the AWS API requires a custom CA trust bundle.
373
+
<16> The custom CA certificate. This is required when deploying to the SC2S or C2S Regions because the AWS API requires a custom CA trust bundle.
377
374
endif::openshift-origin[]
378
375
ifdef::openshift-origin[]
379
-
<14> The custom CA certificate. This is required when deploying to the SC2S or C2S Regions because the AWS API requires a custom CA trust bundle.
376
+
<15> The custom CA certificate. This is required when deploying to the SC2S or C2S Regions because the AWS API requires a custom CA trust bundle.
380
377
endif::openshift-origin[]
381
378
endif::secret[]
382
379
ifdef::restricted[]
383
380
ifndef::openshift-origin[]
384
-
<14> For `<local_registry>`, specify the registry domain name, and optionally the
381
+
<15> For `<local_registry>`, specify the registry domain name, and optionally the
385
382
port, that your mirror registry uses to serve content. For example
386
383
`registry.example.com` or `registry.example.com:5000`. For `<credentials>`,
387
384
specify the base64-encoded user name and password for your mirror registry.
388
-
<15> Provide the contents of the certificate file that you used for your mirror registry.
389
-
<16> Provide the `imageContentSources` section from the output of the command to mirror the repository.
385
+
<16> Provide the contents of the certificate file that you used for your mirror registry.
386
+
<17> Provide the `imageContentSources` section from the output of the command to mirror the repository.
390
387
endif::openshift-origin[]
391
388
ifdef::openshift-origin[]
392
-
<13> For `<local_registry>`, specify the registry domain name, and optionally the
389
+
<14> For `<local_registry>`, specify the registry domain name, and optionally the
393
390
port, that your mirror registry uses to serve content. For example
394
391
`registry.example.com` or `registry.example.com:5000`. For `<credentials>`,
395
392
specify the base64-encoded user name and password for your mirror registry.
396
-
<14> Provide the contents of the certificate file that you used for your mirror registry.
397
-
<15> Provide the `imageContentSources` section from the output of the command to mirror the repository.
393
+
<15> Provide the contents of the certificate file that you used for your mirror registry.
394
+
<16> Provide the `imageContentSources` section from the output of the command to mirror the repository.
0 commit comments