You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/create-aws-cluster.adoc
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,6 @@
5
5
[id="create-aws-cluster_{context}"]
6
6
= Creating a cluster on AWS
7
7
8
-
9
8
You can create an {product-title} cluster on {AWS} using a standard cloud account owned by Red Hat or with your own cloud account using the Customer Cloud Subscription (CCS) model.
10
9
11
10
Using the CCS model to deploy and manage {product-title} into your AWS account requires several prerequisites to be met.
@@ -64,7 +63,6 @@ Revoking these credentials in AWS will result in a loss of access to any cluster
64
63
.... Host Prefix: /23
65
64
66
65
... Select your preferred cluster privacy. *Public* is selected by default.
67
-
68
66
+
69
67
[IMPORTANT]
70
68
====
@@ -73,6 +71,15 @@ CIDR configurations cannot be changed later. Confirm your selections with your n
73
71
If the cluster privacy is set to *Private*, you will not be able to access your cluster until you configure private connections in your cloud provider.
74
72
====
75
73
74
+
. Optional: Select *Enable etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. The option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
75
+
+
76
+
[IMPORTANT]
77
+
====
78
+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
79
+
====
80
+
81
+
. Leave *Enable user workload monitoring* selected to monitor your own projects in isolation from Red Hat Site Reliability Engineer (SRE) platform metrics. The option is enabled by default.
82
+
76
83
. Select your cluster update method.
77
84
** *Manual* is selected by default. With this option, you are responsible for updating your cluster. If your cluster version falls too far behind, it will be automatically updated.
78
85
** Select *Automatic* if you want your cluster to be automatically upgraded when new versions are available. If you opt for automatic upgrades, you must specify the preferred day of the week and the time (UTC) for the upgrade to start.
Copy file name to clipboardExpand all lines: modules/create-gcp-cluster.adoc
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,6 @@
5
5
[id="create-gcp-cluster_{context}"]
6
6
= Creating a cluster on GCP
7
7
8
-
9
8
You can create an {product-title} cluster on {GCP} using a standard cloud account owned by Red Hat or with your own cloud account using the Customer Cloud Subscription (CCS) model.
10
9
11
10
Using the CCS model to deploy and manage {product-title} into your GCP account requires several prerequisites to be met.
@@ -69,7 +68,6 @@ The project name must be 10 characters or less.
69
68
.... Host Prefix: /23
70
69
71
70
... If you are creating a CCS {product-title} cluster, you can enable private clusters. This option is not available for standard clusters. Select your preferred cluster privacy. *Private* is selected by default.
72
-
73
71
+
74
72
[IMPORTANT]
75
73
====
@@ -78,7 +76,14 @@ CIDR configurations cannot be changed later. Confirm your selections with your n
78
76
If the cluster privacy is set to *Private*, you will not be able to access your cluster until you configure private connections in your cloud provider.
79
77
====
80
78
79
+
. Optional: Select *Enable etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. The option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
80
+
+
81
+
[IMPORTANT]
82
+
====
83
+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
84
+
====
81
85
86
+
. Leave *Enable user workload monitoring* selected to monitor your own projects in isolation from Red Hat Site Reliability Engineer (SRE) platform metrics. The option is enabled by default.
82
87
83
88
. Select your cluster update method.
84
89
** *Manual* is selected by default. With this option, you are responsible for updating your cluster. If your cluster version falls too far behind, it will be automatically updated.
Copy file name to clipboardExpand all lines: modules/rosa-sdpolicy-security.adoc
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,6 @@
1
-
2
1
// Module included in the following assemblies:
3
2
//
4
-
// * assemblies/rosa-service-definition.adoc
3
+
// * rosa_policy/rosa-service-definition.adoc
5
4
6
5
[id="rosa-sdpolicy-security_{context}"]
7
6
= Security
@@ -63,17 +62,17 @@ With {product-title}, AWS provides a standard DDoS protection on all load balanc
63
62
64
63
In {product-title}, the control plane storage is encrypted at rest by default and this includes encryption of the etcd volumes. This storage-level encryption is provided through the storage layer of the cloud provider.
65
64
66
-
You can also enable etcd encryption, which encrypts the key values in etcd state, but not the keys. If you enable etcd encryption, the following Kubernetes API server and OpenShift API server resources are encrypted:
65
+
You can also enable etcd encryption, which encrypts the key values in etcd, but not the keys. If you enable etcd encryption, the following Kubernetes API server and OpenShift API server resources are encrypted:
67
66
68
67
* Secrets
69
68
* Config maps
70
69
* Routes
71
70
* OAuth access tokens
72
71
* OAuth authorize tokens
73
72
74
-
The etcd encryption feature is not enabled by default and it can be enabled only at cluster installation time.
73
+
The etcd encryption feature is not enabled by default and it can be enabled only at cluster installation time. Even with etcd encryption enabled, the etcd key values are accessible to anyone with access to the control plane nodes or `cluster-admin` privileges.
75
74
76
75
[IMPORTANT]
77
76
====
78
-
By enabling etcd encryption for the key values in etcd state, you might incur a performance overhead of approximately 20%. Red Hat only recommends that you enable etcd encryption in addition to the default storage-level encryption if you specifically require this for your use case.
77
+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
I: To view a list of clusters and their status, run 'rosa list clusters'
132
134
I: Cluster '<cluster_name>' has been created.
133
135
I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.
@@ -138,13 +140,18 @@ I: To watch your cluster installation logs, run 'rosa logs install -c <cluster_n
138
140
<2> If more than one matching set of account-wide roles are available in your account for a cluster version, an interactive list of options is provided.
139
141
<3> Multiple availability zones are recommended for production workloads. The default is a single availability zone.
140
142
<4> Enable this option if you are using your own AWS KMS key to encrypt the control plane data volumes and the PVs for your applications. Specify the ARN for the KMS key that you added the account-wide role ARN to in the preceding step.
141
-
<5> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
143
+
<5> Enable this option only if your use case requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted, but not the keys.
142
144
+
143
-
[NOTE]
145
+
[IMPORTANT]
144
146
====
145
-
As an alternative to using the `--interactive` mode, you can specify the customization options directly when you run `rosa create cluster`. Run `rosa create cluster --help` to view a list of available CLI options.
147
+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
146
148
====
147
149
+
150
+
<6> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
151
+
--
152
+
+
153
+
As an alternative to using the `--interactive` mode, you can specify the customization options directly when you run `rosa create cluster`. Run `rosa create cluster --help` to view a list of available CLI options.
154
+
+
148
155
[IMPORTANT]
149
156
====
150
157
You must complete the following steps to create the Operator IAM roles and the OpenID Connect (OIDC) provider to move the state of the cluster to `ready`.
Copy file name to clipboardExpand all lines: modules/rosa-sts-interactive-mode-reference.adoc
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@
8
8
You can create a {product-title} cluster with the AWS Security Token Service (STS) by using the interactive mode. You can enable the mode by specifying the `--interactive` option when you run `rosa create cluster`. The following table describes the interactive mode options.
9
9
10
10
.`--interactive` mode options
11
-
[cols="1,2",options="header"]
11
+
[cols=".^2,.^3a",options="header"]
12
12
|===
13
13
14
14
|Field|Description
@@ -64,6 +64,14 @@ You can create a {product-title} cluster with the AWS Security Token Service (ST
64
64
|`Host prefix`
65
65
|Specify the subnet prefix length assigned to pods scheduled to individual machines. The host prefix determines the pod IP address pool for each machine. For example, if the host prefix is set to `/23`, each machine is assigned a `/23` subnet from the pod CIDR address range. The default is `/23`, allowing 512 cluster nodes and 512 pods per node, both of which are beyond our supported maximums. For information on the supported maximums, see the Additional Resources section below.
66
66
67
+
|`Encrypt etcd data (optional)`
68
+
|In {product-title}, the control plane storage is encrypted at rest by default and this includes encryption of the etcd volumes. You can additionally enable the `Encrypt etcd data` option to encrypt the key values for some resources in etcd, but not the keys.
69
+
70
+
[IMPORTANT]
71
+
====
72
+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
73
+
====
74
+
67
75
|`Disable workload monitoring`
68
76
|Disable monitoring for user-defined projects. Monitoring for user-defined projects is enabled by default.
Copy file name to clipboardExpand all lines: modules/sdpolicy-security.adoc
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,6 @@
1
-
2
1
// Module included in the following assemblies:
3
2
//
4
-
// * assemblies/osd-service-definition.adoc
3
+
// * osd_policy/osd-service-definition.adoc
5
4
6
5
[id="sdpolicy-security_{context}"]
7
6
= Security
@@ -66,17 +65,17 @@ With {product-title} on AWS, AWS provides a standard DDoS protection on all Load
66
65
67
66
In {product-title}, the control plane storage is encrypted at rest by default and this includes encryption of the etcd volumes. This storage-level encryption is provided through the storage layer of the cloud provider.
68
67
69
-
You can also enable etcd encryption, which encrypts the key values in etcd state, but not the keys. If you enable etcd encryption, the following Kubernetes API server and OpenShift API server resources are encrypted:
68
+
You can also enable etcd encryption, which encrypts the key values in etcd, but not the keys. If you enable etcd encryption, the following Kubernetes API server and OpenShift API server resources are encrypted:
70
69
71
70
* Secrets
72
71
* Config maps
73
72
* Routes
74
73
* OAuth access tokens
75
74
* OAuth authorize tokens
76
75
77
-
The etcd encryption feature is not enabled by default and it can be enabled only at cluster installation time.
76
+
The etcd encryption feature is not enabled by default and it can be enabled only at cluster installation time. Even with etcd encryption enabled, the etcd key values are accessible to anyone with access to the control plane nodes or `cluster-admin` privileges.
78
77
79
78
[IMPORTANT]
80
79
====
81
-
By enabling etcd encryption for the key values in etcd state, you might incur a performance overhead of approximately 20%. Red Hat only recommends that you enable etcd encryption in addition to the default storage-level encryption if you specifically require this for your use case.
80
+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
* For more information about etcd encryption, see the xref:../osd_policy/osd-service-definition.adoc#etcd-encryption_osd-service-definition[etcd encryption service definition].
* For more information about etcd encryption, see the xref:../osd_policy/osd-service-definition.adoc#etcd-encryption_osd-service-definition[etcd encryption service definition].
Copy file name to clipboardExpand all lines: rosa_getting_started_sts/rosa_creating_a_cluster_with_sts/rosa-sts-creating-a-cluster-with-customizations.adoc
* For an overview of the options that are presented when you create a cluster using interactive mode, see xref:../../rosa_getting_started_sts/rosa_creating_a_cluster_with_sts/rosa-sts-interactive-mode-reference.adoc#rosa-sts-interactive-mode-reference[Interactive cluster creation mode reference].
23
23
* For information about the prerequisites to installing ROSA with STS, see xref:../../rosa_getting_started_sts/rosa-sts-aws-prereqs.adoc#rosa-sts-aws-prerequisites[AWS prerequisites for ROSA with STS].
24
24
* For more information about using OpenID Connect (OIDC) identity providers in AWS IAM, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html[Creating OpenID Connect (OIDC) identity providers] in the AWS documentation.
25
+
* For more information about etcd encryption, see the xref:../../rosa_policy/rosa-service-definition.adoc#rosa-sdpolicy-etcd-encryption_rosa-service-definition[etcd encryption service definition].
25
26
* For more information about troubleshooting ROSA cluster deployments, see xref:../../rosa_support/rosa-troubleshooting-deployments.adoc#rosa-troubleshooting-cluster-deployments[Troubleshooting cluster deployments].
* For a list of the supported maximums, see xref:../../rosa_planning/rosa-limits-scalability.adoc#tested-cluster-maximums_rosa-limits-scalability[ROSA tested cluster maximums].
15
15
* For detailed steps to quickly create a ROSA cluster with STS, including the AWS IAM resources, see xref:../../rosa_getting_started_sts/rosa_creating_a_cluster_with_sts/rosa-sts-creating-a-cluster-quickly.adoc#rosa-sts-creating-a-cluster-quickly[Creating a ROSA cluster with STS quickly].
16
16
* For detailed steps to create a ROSA cluster with STS using customizations, including the AWS IAM resources, see xref:../../rosa_getting_started_sts/rosa_creating_a_cluster_with_sts/rosa-sts-creating-a-cluster-with-customizations.adoc#rosa-sts-creating-a-cluster-with-customizations[Creating a ROSA cluster with STS using customizations].
17
+
* For more information about etcd encryption, see the xref:../../rosa_policy/rosa-service-definition.adoc#rosa-sdpolicy-etcd-encryption_rosa-service-definition[etcd encryption service definition].
0 commit comments