Skip to content

Commit e0ea123

Browse files
DNS considerations from BPG to Planning considerations
1 parent eb1c29f commit e0ea123

5 files changed

+79
-5
lines changed

_topic_map.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2073,8 +2073,8 @@ Topics:
20732073
- Name: Differences between OKD 3 and 4
20742074
File: planning-migration-3-4
20752075
Distros: openshift-origin
2076-
# - Name: Planning considerations
2077-
# File: planning-considerations-3-4
2076+
- Name: Planning considerations
2077+
File: planning-considerations-3-4
20782078
- Name: About MTC
20792079
File: about-mtc-3-4
20802080
- Name: Installing MTC

migrating_from_ocp_3_to_4/planning-considerations-3-4.adoc

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ toc::[]
77

88
This section describes considerations and strategies for planning your migration from {product-title} 3 to 4.
99

10-
// content:
11-
// https://bugzilla.redhat.com/show_bug.cgi?id=1968377
12-
// https://bugzilla.redhat.com/show_bug.cgi?id=1968352
10+
include::modules/migration-DNS-considerations.adoc[leveloffset=+2]
11+
include::modules/migration-isolating-dns-domain-of-target-cluster-from-clients.adoc[leveloffset=+2]
12+
include::modules/migration-setting-up-target-cluster-to-accept-source-dns-domain.adoc[leveloffset=+2]
13+
14+
.Additional resources
15+
16+
* See xref:../security/certificates/replacing-default-ingress-certificate.adoc#replacing-default-ingress[Replacing the default ingress certificate] for more information.
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * migrating_from_ocp_3_to_4/planning-considerations-3-4.adoc
4+
5+
[id="migration-dns-considerations_{context}"]
6+
= DNS considerations
7+
8+
The DNS domain of the {product-title} 4 target cluster is different from the domain of the {product-title} 3 source cluster. By default, applications get FQDNs of the {product-title} 4 cluster after migration.
9+
10+
To preserve the source DNS domain of migrated applications, select one of the two options described below.
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * migrating_from_ocp_3_to_4/planning-considerations-3-4.adoc
4+
5+
[id="isolating-dns-domain-of-target-cluster-from-clients_{context}"]
6+
== Isolating the DNS domain of the target cluster from the clients
7+
8+
You can allow the clients' requests sent to the DNS domain of the source cluster to reach the DNS domain of the target cluster without exposing the target cluster to the clients.
9+
10+
.Procedure
11+
. Place an exterior network component, such as an application load balancer or a reverse proxy, between the clients and the OpenShift Container Platform 4 cluster.
12+
13+
. Update the original application FQDN (`app1.apps.ocp3.example.com`) in the DNS server to return the IP address of the exterior network component.
14+
15+
. Configure the network component to send requests received for the application in the source domain to the load balancer in the target {product-title} 4 cluster domain.
16+
17+
. Create a wildcard DNS record for the `*.apps.ocp3.example.com` domain that points to the IP address of the load balancer of the source cluster.
18+
19+
. Create a specific DNS record for each application that points to the IP address of the exterior network component in front of the target cluster. A specific DNS record has higher priority than a wildcard record, so no conflict arises when the application FQDN is resolved.
20+
21+
[NOTE]
22+
====
23+
* The exterior network component must terminate all secure TLS connections. If the connections pass through to the {product-title} 4 load balancer, the FQDN of the target application is exposed to the client and certificate errors occur.
24+
25+
* The applications must not return links referencing the target cluster domain to the clients. Otherwise, parts of the application might not load or work properly.
26+
====
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * migrating_from_ocp_3_to_4/planning-considerations-3-4.adoc
4+
5+
[id="setting-up-target-cluster-to-accept-source-dns-domain_{context}"]
6+
== Setting up the target cluster to accept the source DNS domain
7+
8+
You can set up the target cluster to accept requests for migrated applications in the DNS domain of the source cluster.
9+
10+
.Procedure
11+
12+
For both non-secure HTTP access and secure HTTPS access, perform the following steps:
13+
14+
. Create a route in the application’s project for the hostname that applications used in the source cluster:
15+
+
16+
[source,terminal]
17+
----
18+
$ oc expose svc app1-svc --hostname app1.apps.ocp3.example.com \
19+
-n app1-namespace
20+
----
21+
+
22+
With this new route in place, the server accepts any request for that FQDN and sends it to the corresponding application pods.
23+
In addition, when you migrate the application, another route is created in the target cluster domain (`app1.apps.ocp4.example.com`). Requests can reach the migrated application using both of these hostnames.
24+
25+
. Create a specific DNS record for the FQDN in the route hostname parameter that points to the IP address of the default load balancer of the target cluster. Specific DNS records take priority over wildcard records.
26+
+
27+
The FQDN of the application resolves to the load balancer of the target cluster. The default ingress controller router accept requests for that FQDN because a route for that hostname is exposed.
28+
29+
For secure HTTPS access, perform the following additional step:
30+
31+
. Replace the x509 certificate of the default ingress controller created during the installation process with a custom certificate.
32+
. Configure this certificate to include the wildcard DNS domains for both the source and target clusters in the `subjectAltName` field.
33+
+
34+
The new certificate is valid for securing connections made using either of the two DNS domains.

0 commit comments

Comments
 (0)