Skip to content

Commit e084702

Browse files
committed
OSDOCS-3798 - Removing OCM CLI references and adding proxy content for OSD and ROSA
1 parent 751a4a0 commit e084702

23 files changed

+416
-220
lines changed

_topic_maps/_topic_map_osd.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ Topics:
204204
Topics:
205205
- Name: Enabling multicast for a project
206206
File: enabling-multicast
207-
- Name: Configuring a cluster-wide proxy during installation
207+
- Name: Configuring a cluster-wide proxy
208208
File: configuring-cluster-wide-proxy
209209
- Name: CIDR range definitions
210210
File: cidr-range-definitions

_topic_maps/_topic_map_rosa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ Topics:
308308
Topics:
309309
- Name: Enabling multicast for a project
310310
File: enabling-multicast
311-
- Name: Configuring a cluster-wide proxy during installation
311+
- Name: Configuring a cluster-wide proxy
312312
File: configuring-cluster-wide-proxy
313313
- Name: CIDR range definitions
314314
File: cidr-range-definitions

adding_service_cluster/adding-service.adoc

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,12 @@ include::_attributes/attributes-openshift-dedicated.adoc[]
66

77
toc::[]
88

9+
You can add, access, and remove add-on services for your {product-title}
10+
ifdef::openshift-rosa[]
11+
(ROSA)
12+
endif::openshift-rosa[]
13+
cluster by using {cluster-manager-first}.
14+
915
ifdef::openshift-rosa[]
1016
== Prerequisites
1117
* For the Amazon CloudWatch service, you must first install the `cluster-logging-operator` using the `rosa` CLI.
@@ -14,7 +20,7 @@ endif::[]
1420
include::modules/adding-service-existing.adoc[leveloffset=+1]
1521
include::modules/access-service.adoc[leveloffset=+1]
1622
include::modules/deleting-service.adoc[leveloffset=+1]
17-
include::modules/deleting-service-cli.adoc[leveloffset=+1]
23+
//include::modules/deleting-service-cli.adoc[leveloffset=+1]
1824

1925
ifdef::openshift-rosa[]
2026
[role="_additional-resources"]

modules/access-service.adoc

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,13 @@
55
:_content-type: PROCEDURE
66
[id="access-service_{context}"]
77

8-
= Accessing installed services on your cluster
8+
= Accessing installed add-on services on your cluster
99

10-
After you successfully install a service on your cluster, you can access the service through the OpenShift console.
10+
After you successfully install an add-on service on your {product-title}
11+
ifdef::openshift-rosa[]
12+
(ROSA)
13+
endif::openshift-rosa[]
14+
cluster, you can access the service by using the OpenShift web console.
1115

1216
.Prerequisites
1317

@@ -21,9 +25,9 @@ After you successfully install a service on your cluster, you can access the ser
2125

2226
. Navigate to the *Add-ons* tab, and locate the installed service that you want to access.
2327

24-
. Click *View on console* from the service option to open the OpenShift console.
28+
. Click *View on console* from the service option to open the OpenShift web console.
2529

26-
. Enter your credentials to log in to the OpenShift console.
30+
. Enter your credentials to log in to the OpenShift web console.
2731

2832
. Click the *Red Hat Applications* menu by clicking the three-by-three matrix icon in the upper right corner of the main screen.
2933

modules/adding-service-existing.adoc

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,13 @@
55
:_content-type: PROCEDURE
66
[id="adding-service-existing_{context}"]
77

8-
= Adding a service to a cluster
9-
10-
11-
You can add a service to an existing {product-title} cluster through {cluster-manager-first}.
8+
= Adding an add-on service to a cluster
129

10+
You can add an add-on service to an existing {product-title}
11+
ifdef::openshift-rosa[]
12+
(ROSA)
13+
endif::openshift-rosa[]
14+
cluster by using {cluster-manager-first}.
1315

1416
.Prerequisites
1517

modules/cluster-wide-proxy-preqs.adoc

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,31 +2,36 @@
22
//
33
// * networking/configuring-cluster-wide-proxy.adoc
44

5-
:_content-type: PROCEDURE
5+
:_content-type: CONCEPT
66
[id="cluster-wide-proxy-prereqs_{context}"]
77
= Prerequisites for configuring a cluster-wide proxy
88

9-
To configure a cluster-wide proxy, you must meet the following requirements. These requirements are valid for both fresh installation and post installation proxy configuration.
9+
To configure a cluster-wide proxy, you must meet the following requirements. These requirements are valid when you configure a proxy during installation or post-installation.
1010

11+
[discrete]
1112
[id="cluster-wide-proxy-general-prereqs_{context}"]
1213
== General requirements
1314

1415
* You are the cluster owner.
1516
* Your account has sufficient privileges.
16-
* You have added the `ec2.<region>.amazonaws.com`, `elasticloadbalancing.<region>.amazonaws.com`, and `s3.<region>.amazonaws.com` endpoints to your virtual private cloud (VPC) endpoint. These endpoints are required to complete requests from the nodes to the AWS EC2 API. Because the proxy works on the container level, not the node level, you must route these requests to the AWS EC2 API through the AWS private network. Adding the public IP address of the EC2 API to your allowlist in your proxy server is not sufficient.
1717
ifdef::openshift-rosa[]
18-
* You have the `rosa` CLI installed and configured.
19-
endif::[]
18+
* You have an existing Virtual Private Cloud (VPC) for your cluster.
19+
endif::openshift-rosa[]
2020
ifdef::openshift-dedicated[]
21-
* You must have a Customer Cloud Subscription (CCS) cluster with a VPC that the proxy can access.
22-
* You have the `ocm` CLI installed and configured.
23-
endif::[]
21+
* You have an existing Virtual Private Cloud (VPC) for your cluster.
22+
* You are using the Customer Cloud Subscription (CCS) model for your cluster.
23+
endif::openshift-dedicated[]
24+
* The proxy can access the VPC for the cluster and the private subnets of the VPC. The proxy is also accessible from the VPC for the cluster and from the private subnets of the VPC.
25+
* You have added the `ec2.<region>.amazonaws.com`, `elasticloadbalancing.<region>.amazonaws.com`, and `s3.<region>.amazonaws.com` endpoints to your VPC endpoint. These endpoints are required to complete requests from the nodes to the AWS EC2 API. Because the proxy works at the container level and not at the node level, you must route these requests to the AWS EC2 API through the AWS private network. Adding the public IP address of the EC2 API to your allowlist in your proxy server is not enough.
2426

27+
[discrete]
2528
[id="cluster-wide-proxy-network-prereqs_{context}"]
2629
== Network requirements
2730

2831
* If your proxy re-encyrpts egress traffic, you must create exclusions to the domain and port combinations. The following table offers guidance into these exceptions.
29-
** Allowlist the following OpenShift URLs for re-encryption.
32+
+
33+
--
34+
** Add the following OpenShift URLs to your allowlist for re-encryption.
3035
+
3136
[cols="6,1,6",options="header"]
3237
|===
@@ -40,7 +45,7 @@ endif::[]
4045
|The https://cloud.redhat.com/openshift site uses authentication from sso.redhat.com to download the cluster pull secret and use Red Hat SaaS solutions to facilitate monitoring of your subscriptions, cluster inventory, and chargeback reporting.
4146
|===
4247
+
43-
** Allowlist the following site reliability engineering (SRE) and management URLs for re-encryption.
48+
** Add the following site reliability engineering (SRE) and management URLs to your allowlist for re-encryption.
4449
+
4550
[cols="6,1,6",options="header"]
4651
|===
@@ -70,3 +75,11 @@ endif::[]
7075
|https/443
7176
|Used by the splunk-forwarder-operator as a log forwarding endpoint to be used by Red Hat SRE for log-based alerting.
7277
|===
78+
--
79+
+
80+
[IMPORTANT]
81+
====
82+
The use of a proxy server to perform TLS re-encryption is currently not supported if the server is acting as a transparent forward proxy where it is not configured on-cluster via the `--http-proxy` or `--https-proxy` arguments.
83+
84+
A transparent forward proxy intercepts the cluster traffic, but it is not actually configured on the cluster itself.
85+
====

modules/cluster-wide-proxy-updates.adoc

Lines changed: 0 additions & 89 deletions
This file was deleted.

modules/cluster-wide-proxy.adoc

Lines changed: 0 additions & 43 deletions
This file was deleted.
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * networking/configuring-cluster-wide-proxy.adoc
4+
5+
:_content-type: PROCEDURE
6+
[id="configuring-a-proxy-after-installation-cli_{context}"]
7+
= Configuring a proxy after installation using the CLI
8+
9+
You can use the {product-title} (ROSA) CLI (`rosa`) to add a cluster-wide proxy configuration to an existing ROSA cluster in a Virtual Private Cloud (VPC).
10+
11+
You can also use `rosa` to update an existing cluster-wide proxy configuration. For example, you might need to update the network address for the proxy or replace the additional trust bundle if any of the certificate authorities for the proxy expire.
12+
13+
[IMPORTANT]
14+
====
15+
The cluster applies the proxy configuration to the control plane and compute nodes. While applying the configuration, each cluster node is temporarily placed in an unschedulable state and drained of its workloads. Each node is restarted as part of the process.
16+
====
17+
18+
.Prerequisites
19+
20+
* You have installed and configured the latest ROSA (`rosa`) and OpenShift (`oc`) CLIs on your installation host.
21+
* You have a ROSA cluster that is deployed in a VPC.
22+
23+
.Procedure
24+
25+
* Edit the cluster configuration to add or update the cluster-wide proxy details:
26+
+
27+
[source,terminal]
28+
----
29+
$ rosa edit cluster \
30+
--cluster $CLUSTER_NAME \
31+
--additional-trust-bundle-file <path_to_ca_bundle_file> \ <1> <2> <3>
32+
--http-proxy http://<username>:<password>@<ip>:<port> \ <1> <4>
33+
--https-proxy http(s)://<username>:<password>@<ip>:<port> <1> <4>
34+
----
35+
<1> The `additional-trust-bundle-file`, `http-proxy`, and `https-proxy` arguments are all optional.
36+
<2> If you use the `additional-trust-bundle-file` argument without an `http-proxy` or `https-proxy` argument, the trust bundle is added to the trust store and used to verify cluster system egress traffic. In that scenario, the bundle is not configured to be used with a proxy.
37+
<3> The `additional-trust-bundle-file` argument is a file path pointing to a bundle of PEM-encoded X.509 certificates, which are all concatenated together. The `additionalTrustBundle` parameter is required unless the identity certificate of the proxy is signed by an authority from the {op-system} trust bundle. If you use an MITM transparent proxy network that does not require additional proxy configuration but requires additional CAs, you must provide the MITM CA certificate.
38+
<4> The `http-proxy` and `https-proxy` arguments must point to a valid URL.
39+
+
40+
[NOTE]
41+
====
42+
You should not attempt to change the proxy or additional trust bundle configuration on the cluster directly. These changes must be applied by using the ROSA CLI (`rosa`) or {cluster-manager-first}. Any changes that are made directly to the cluster will be reverted automatically.
43+
====
44+
45+
.Verification
46+
47+
. List the status of the machine config pools and verify that they are updated:
48+
+
49+
[source,terminal]
50+
----
51+
$ oc get machineconfigpools
52+
----
53+
+
54+
.Example output
55+
[source,terminal]
56+
----
57+
NAME CONFIG UPDATED UPDATING DEGRADED MACHINECOUNT READYMACHINECOUNT UPDATEDMACHINECOUNT DEGRADEDMACHINECOUNT AGE
58+
master rendered-master-d9a03f612a432095dcde6dcf44597d90 True False False 3 3 3 0 31h
59+
worker rendered-worker-f6827a4efe21e155c25c21b43c46f65e True False False 6 6 6 0 31h
60+
----
61+
62+
. Display the proxy configuration for your cluster and verify that the details are as expected:
63+
+
64+
[source,terminal]
65+
----
66+
$ oc get proxy cluster -o yaml
67+
----
68+
+
69+
.Example output
70+
[source,terminal]
71+
----
72+
apiVersion: config.openshift.io/v1
73+
kind: Proxy
74+
spec:
75+
httpProxy: http://proxy.host.domain:<port>
76+
httpsProxy: https://proxy.host.domain:<port>
77+
<...more...>
78+
status:
79+
httpProxy: http://proxy.host.domain:<port>
80+
httpsProxy: https://proxy.host.domain:<port>
81+
<...more...>
82+
----

0 commit comments

Comments
 (0)