Skip to content

Commit e3d8017

Browse files
authored
Merge pull request #97003 from dfitzmau/OSDOCS-3467-14
[enterprise-4.14]OSDOCS-3467-14: Updated configuration-externalip.adoc for private cluster
2 parents 90a4a55 + 83f7d32 commit e3d8017

File tree

4 files changed

+27
-30
lines changed

4 files changed

+27
-30
lines changed

modules/cluster-cloud-controller-manager-operator.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ The status of this Operator is General Availability for Amazon Web Services (AWS
1212
The Operator is available as a link:https://access.redhat.com/support/offerings/techpreview[Technology Preview] for Alibaba Cloud, Google Cloud Platform (GCP), and {ibm-cloud-name} Power VS.
1313
====
1414

15-
The Cluster Cloud Controller Manager Operator manages and updates the cloud controller managers deployed on top of {product-title}. The Operator is based on the Kubebuilder framework and `controller-runtime` libraries. It is installed via the Cluster Version Operator (CVO).
15+
The Cluster Cloud Controller Manager Operator manages and updates the cloud controller managers deployed on top of {product-title}. The Operator is based on the Kubebuilder framework and `controller-runtime` libraries. You can install the Cloud Controller Manager Operator by using the Cluster Version Operator (CVO).
1616

17-
It contains the following components:
17+
The Cloud Controller Manager Operator includes the following components:
1818

1919
* Operator
2020
* Cloud configuration observer

modules/configuration-externalip.adoc

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@
66
[id="configuration-externalip_{context}"]
77
= Configuration for ExternalIP
88

9-
Use of an external IP address in {product-title} is governed by the following parameters in the `Network.config.openshift.io` custom resource (CR) that is named `cluster`:
9+
The following parameters in the `Network.config.openshift.io` custom resource (CR) govern the use of an external IP address in {product-title}:
1010

11-
* `spec.externalIP.autoAssignCIDRs` defines an IP address block used by the load balancer when choosing an external IP address for the service. {product-title} supports only a single IP address block for automatic assignment. This configuration requires less steps than manually assigning ExternalIPs to services, which requires managing the port space of a limited number of shared IP addresses. If you enable automatic assignment, a `Service` object with `spec.type=LoadBalancer` is allocated an external IP address.
11+
* `spec.externalIP.autoAssignCIDRs` defines an IP address block used by the load balancer when choosing an external IP address for the service. {product-title} supports only a single IP address block for automatic assignment. This configuration requires less steps than manually assigning ExternalIPs to services, which requires managing the port space of a limited number of shared IP addresses. If you enable automatic assignment, the Cloud Controller Manager Operator allocates an external IP address to a `Service` object with `spec.type=LoadBalancer` defind in its configuration.
1212
1313
* `spec.externalIP.policy` defines the permissible IP address blocks when manually specifying an IP address. {product-title} does not apply policy rules to IP address blocks that you defined in the `spec.externalIP.autoAssignCIDRs` parameter.
1414
@@ -19,7 +19,7 @@ If routed correctly, external traffic from the configured external IP address bl
1919
As a cluster administrator, you must configure routing to externalIPs. You must also ensure that the IP address block you assign terminates at one or more nodes in your cluster. For more information, see link:https://kubernetes.io/docs/concepts/services-networking/service/#external-ips[Kubernetes External IPs].
2020
====
2121

22-
{product-title} supports both the automatic and manual assignment of IP addresses, where each address is guaranteed to be assigned to a maximum of one service. This configuration ensures that each service can expose its chosen ports regardless of the ports exposed by other services.
22+
{product-title} supports both automatic and manual IP address assignment. This support guarantees that each address gets assigned to a maximum of one service and that each service can expose its chosen ports regardless of the ports exposed by other services.
2323

2424
[NOTE]
2525
====
@@ -56,3 +56,12 @@ status:
5656
- ip: 192.168.132.253
5757
# ...
5858
----
59+
60+
If you run a private cluster on a cloud-provider platform, you can change the publishing scope to `internal` for the load balancer of the Ingress Controller by running the following `patch` command:
61+
62+
[source,terminal]
63+
----
64+
$ oc -n openshift-ingress-operator patch ingresscontrollers/ingress-controller-with-nlb --type=merge --patch='{"spec":{"endpointPublishingStrategy":{"loadBalancer":{"scope":"Internal"}}}}'
65+
----
66+
67+
After you run this command, the Ingress Controller restricts access to routes for {product-title} applications to internal networks only.

modules/installation-initializing-manual.adoc

Lines changed: 6 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ endif::gcp-shared[]
109109
ifdef::aws-china,aws-secret[]
110110
* You have uploaded a custom RHCOS AMI.
111111
endif::aws-china,aws-secret[]
112-
* You have an SSH public key on your local machine to provide to the installation program. The key will be used for SSH authentication onto your cluster nodes for debugging and disaster recovery.
112+
* You have an SSH public key on your local machine for use with the installation program. You can use the key for SSH authentication onto your cluster nodes for debugging and disaster recovery.
113113
* You have obtained the {product-title} installation program and the pull secret for your
114114
cluster.
115115
ifdef::restricted,restricted-upi[]
@@ -129,16 +129,10 @@ $ mkdir <installation_directory>
129129
+
130130
[IMPORTANT]
131131
====
132-
You must create a directory. Some installation assets, like bootstrap X.509
133-
certificates have short expiration intervals, so you must not reuse an
134-
installation directory. If you want to reuse individual files from another
135-
cluster installation, you can copy them into your directory. However, the file
136-
names for the installation assets might change between releases. Use caution
137-
when copying installation files from an earlier {product-title} version.
132+
You must create a directory. Some installation assets, such as bootstrap X.509 certificates have short expiration intervals, so you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier {product-title} version.
138133
====
139134

140-
. Customize the sample `install-config.yaml` file template that is provided and save
141-
it in the `<installation_directory>`.
135+
. Customize the provided sample `install-config.yaml` file template and save the file in the `<installation_directory>`.
142136
+
143137
[NOTE]
144138
====
@@ -147,10 +141,7 @@ You must name this configuration file `install-config.yaml`.
147141

148142
ifdef::restricted,restricted-upi[]
149143

150-
** Unless you use a registry that {op-system} trusts by default, such as
151-
`docker.io`, you must provide the contents of the certificate for your mirror
152-
repository in the `additionalTrustBundle` section. In most cases, you must
153-
provide the certificate for your mirror.
144+
** Unless you use a registry that {op-system} trusts by default, such as `docker.io`, you must provide the contents of the certificate for your mirror repository in the `additionalTrustBundle` section. In most cases, you must provide the certificate for your mirror.
154145
** You must include the `imageContentSources` section from the output of the command to
155146
mirror the repository.
156147

@@ -218,13 +209,11 @@ ifdef::vsphere-upi-vsphere[]
218209
. If you are installing a three-node cluster, modify the `install-config.yaml` file by setting the `compute.replicas` parameter to `0`. This ensures that the cluster's control planes are schedulable. For more information, see "Installing a three-node cluster on {platform}".
219210
endif::vsphere-upi-vsphere[]
220211

221-
. Back up the `install-config.yaml` file so that you can use it to install
222-
multiple clusters.
212+
. Back up the `install-config.yaml` file so that you can use it to install many clusters.
223213
+
224214
[IMPORTANT]
225215
====
226-
The `install-config.yaml` file is consumed during the next step of the
227-
installation process. You must back it up now.
216+
Back up the `install-config.yaml` file now, because the installation process consumes the file in the next step.
228217
====
229218

230219
ifeval::["{context}" == "installing-azure-government-region"]

networking/configuring_ingress_cluster_traffic/configuring-externalip.adoc

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
As a cluster administrator, you can designate an IP address block that is external to the cluster that can send traffic to services in the cluster.
9+
As a cluster administrator, you can select an IP address block that is external to the cluster that can send traffic to services in the cluster.
1010

1111
This functionality is generally most useful for clusters installed on bare-metal hardware.
1212

@@ -17,13 +17,6 @@ This functionality is generally most useful for clusters installed on bare-metal
1717
// About ExternalIP
1818
include::modules/nw-externalip-about.adoc[leveloffset=+1]
1919

20-
[id="additional-resources_{context}"]
21-
== Additional resources
22-
23-
* xref:../../networking/configuring-ipfailover.adoc#configuring-ipfailover[Configuring IP failover]
24-
25-
* xref:../../networking/metallb/about-metallb.adoc#about-metallb[About MetalLB and the MetalLB Operator]
26-
2720
// Configuration for ExternalIP
2821
include::modules/configuration-externalip.adoc[leveloffset=+1]
2922

@@ -39,6 +32,12 @@ include::modules/nw-externalip-object.adoc[leveloffset=+1]
3932
// Configure external IP address blocks for your cluster
4033
include::modules/nw-externalip-configuring.adoc[leveloffset=+1]
4134

35+
[role="_additional-resources"]
36+
== Additional resources
37+
38+
* xref:../../networking/configuring-ipfailover.adoc#configuring-ipfailover[Configuring IP failover]
39+
* xref:../../networking/metallb/about-metallb.adoc#about-metallb[About MetalLB and the MetalLB Operator]
40+
4241
[id="configuring-externalip-next-steps"]
4342
== Next steps
4443

0 commit comments

Comments
 (0)