You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Starting with version 4.3, you can install an {product-title} cluster that uses FIPS Validated / Modules in Process cryptographic libraries.
8
+
You can install an {product-title} cluster that uses FIPS Validated / Modules in Process cryptographic libraries on the `x86_64` architecture.
9
9
10
10
For the {op-system-first} machines in your cluster, this change is applied when the machines are deployed based on the status of an option in the `install-config.yaml` file, which governs the cluster options that a user can change during cluster deployment. With {op-system-base-full} machines, you must enable FIPS mode when you install the operating system on the machines that you plan to use as worker machines. These configuration methods ensure that your cluster meet the requirements of a FIPS compliance audit: only FIPS Validated / Modules in Process cryptography packages are enabled before the initial system boot.
11
11
@@ -37,6 +37,9 @@ Because FIPS must be enabled before the operating system that your cluster uses
37
37
|Use of FIPS compatible golang compiler.
38
38
|TLS FIPS support is not complete but is planned for future {product-title} releases.
39
39
40
+
|FIPS support across multiple architectures.
41
+
|FIPS is currently only supported on {product-title} deployments using the `x86_64` architecture.
Copy file name to clipboardExpand all lines: installing/installing-preparing.adoc
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,12 @@ If you need to deploy your cluster to an xref:../installing/installing_aws/insta
68
68
69
69
ifndef::openshift-origin[]
70
70
You can also configure the cluster machines to use xref:../installing/installing-fips.adoc#installing-fips[FIPS Validated / Modules in Process cryptographic libraries] during installation.
71
+
72
+
[IMPORTANT]
73
+
====
74
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
Copy file name to clipboardExpand all lines: modules/installation-aws-config-yaml.adoc
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -242,6 +242,11 @@ host must trust the certificate.
242
242
<10> The ID of your existing Route 53 private hosted zone. Providing an existing hosted zone requires that you supply your own VPC and the hosted zone is already associated with the VPC prior to installing your cluster. If undefined, the installation program creates a new hosted zone.
243
243
ifndef::openshift-origin[]
244
244
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
245
+
+
246
+
[IMPORTANT]
247
+
====
248
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
249
+
====
245
250
<12> You can optionally provide the `sshKey` value that you use to access the
246
251
machines in your cluster.
247
252
endif::openshift-origin[]
@@ -258,6 +263,11 @@ an unknown AWS region. The endpoint URL must use the `https` protocol and the
258
263
host must trust the certificate.
259
264
ifndef::openshift-origin[]
260
265
<9> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
266
+
+
267
+
[IMPORTANT]
268
+
====
269
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
270
+
====
261
271
<10> You can optionally provide the `sshKey` value that you use to access the
Copy file name to clipboardExpand all lines: modules/installation-azure-config-yaml.adoc
+22-2Lines changed: 22 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,10 +101,10 @@ endif::private,gov[]
101
101
ifdef::private,gov[]
102
102
outboundType: UserDefinedRouting <13>
103
103
endif::private,gov[]
104
-
ifndef::gov[]
104
+
ifndef::gov[]
105
105
cloudName: AzurePublicCloud
106
106
endif::gov[]
107
-
ifdef::gov[]
107
+
ifdef::gov[]
108
108
cloudName: AzureUSGovernmentCloud <14>
109
109
endif::gov[]
110
110
pullSecret: '{"auths": ...}' <1>
@@ -200,6 +200,11 @@ endif::gov[]
200
200
ifdef::vnet[]
201
201
ifndef::openshift-origin[]
202
202
<13> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
203
+
+
204
+
[IMPORTANT]
205
+
====
206
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
207
+
====
203
208
<14> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
204
209
endif::openshift-origin[]
205
210
ifdef::openshift-origin[]
@@ -209,6 +214,11 @@ endif::vnet[]
209
214
ifdef::private[]
210
215
ifndef::openshift-origin[]
211
216
<14> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
217
+
+
218
+
[IMPORTANT]
219
+
====
220
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
221
+
====
212
222
<15> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
213
223
endif::openshift-origin[]
214
224
ifdef::openshift-origin[]
@@ -218,6 +228,11 @@ endif::private[]
218
228
ifdef::gov[]
219
229
ifndef::openshift-origin[]
220
230
<15> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
231
+
+
232
+
[IMPORTANT]
233
+
====
234
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
235
+
====
221
236
<16> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
222
237
endif::openshift-origin[]
223
238
ifdef::openshift-origin[]
@@ -227,6 +242,11 @@ endif::gov[]
227
242
ifndef::vnet,private,gov[]
228
243
ifndef::openshift-origin[]
229
244
<9> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
245
+
+
246
+
[IMPORTANT]
247
+
====
248
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
249
+
====
230
250
<10> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
Copy file name to clipboardExpand all lines: modules/installation-bare-metal-config-yaml.adoc
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -238,6 +238,11 @@ ifdef::ibm-power[IBM Power Systems infrastructure.]
238
238
ifdef::rhv[RHV infrastructure.]
239
239
ifndef::openshift-origin[]
240
240
<11> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
241
+
+
242
+
[IMPORTANT]
243
+
====
244
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
Copy file name to clipboardExpand all lines: modules/installation-configuration-parameters.adoc
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -272,6 +272,10 @@ Not all CCO modes are supported for all cloud providers. For more information on
272
272
ifndef::openshift-origin[]
273
273
|`fips`
274
274
|Enable or disable FIPS mode. The default is `false` (disabled). If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
275
+
[IMPORTANT]
276
+
====
277
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
278
+
====
275
279
[NOTE]
276
280
====
277
281
If you are using Azure File storage, you cannot enable FIPS mode.
Copy file name to clipboardExpand all lines: modules/installation-gcp-config-yaml.adoc
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -196,6 +196,11 @@ endif::restricted[]
196
196
ifdef::vpc[]
197
197
ifndef::openshift-origin[]
198
198
<9> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
199
+
+
200
+
[IMPORTANT]
201
+
====
202
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
203
+
====
199
204
<10> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
200
205
endif::openshift-origin[]
201
206
ifdef::openshift-origin[]
@@ -205,6 +210,11 @@ endif::vpc[]
205
210
ifdef::restricted[]
206
211
ifndef::openshift-origin[]
207
212
<10> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
213
+
+
214
+
[IMPORTANT]
215
+
====
216
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
217
+
====
208
218
<11> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
209
219
endif::openshift-origin[]
210
220
ifdef::openshift-origin[]
@@ -214,6 +224,11 @@ endif::restricted[]
214
224
ifndef::vpc,restricted[]
215
225
ifndef::openshift-origin[]
216
226
<6> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
227
+
+
228
+
[IMPORTANT]
229
+
====
230
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
231
+
====
217
232
<7> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
Copy file name to clipboardExpand all lines: modules/installation-gcp-user-infra-shared-vpc-config-yaml.adoc
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,10 +76,15 @@ endif::openshift-origin[]
76
76
====
77
77
If you disable simultaneous multithreading, ensure that your capacity planning accounts for the dramatically decreased machine performance. Use larger machine types, such as `n1-standard-8`, for your machines if you disable simultaneous multithreading.
78
78
====
79
-
<5> Specify the main project where the VM instances reside.
79
+
<5> Specify the main project where the VM instances reside.
80
80
<6> Specify the region that your VPC network is in.
81
81
ifndef::openshift-origin[]
82
82
<7> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
83
+
+
84
+
[IMPORTANT]
85
+
====
86
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
87
+
====
83
88
<8> You can optionally provide the `sshKey` value that you use to access the machines in your cluster.
Copy file name to clipboardExpand all lines: modules/installation-vsphere-config-yaml.adoc
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,6 +141,11 @@ in vSphere.
141
141
<12> Optional: For installer-provisioned infrastructure, the absolute path of an existing folder where the installation program creates the virtual machines, for example, `/<datacenter_name>/vm/<folder_name>/<subfolder_name>`. If you do not provide this value, the installation program creates a top-level folder in the datacenter virtual machine folder that is named with the infrastructure ID. If you are providing the infrastructure for the cluster, omit this parameter.
142
142
ifndef::openshift-origin[]
143
143
<13> Whether to enable or disable FIPS mode. By default, FIPS mode is not enabled. If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with {op-system} instead.
144
+
+
145
+
[IMPORTANT]
146
+
====
147
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
Copy file name to clipboardExpand all lines: modules/machine-config-overview.adoc
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,6 +43,11 @@ The kinds of components that MCO can change include:
43
43
* **kernelType**: Optionally identify a non-standard kernel to use instead of the standard kernel. Use `realtime` to use the RT kernel (for RAN). This is only supported on select platforms.
44
44
ifndef::openshift-origin[]
45
45
* **fips**: Enable link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/security_hardening/index#using-the-system-wide-cryptographic-policies_security-hardening[FIPS] mode. FIPS should be set at installation-time setting and not a post-installation procedure.
46
+
47
+
[IMPORTANT]
48
+
====
49
+
The use of FIPS Validated / Modules in Process cryptographic libraries is only supported on {product-title} deployments on the `x86_64` architecture.
50
+
====
46
51
endif::openshift-origin[]
47
52
* **extensions**: Extend {op-system} features by adding selected pre-packaged software. For this feature, available extensions include link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/security_hardening/index#protecting-systems-against-intrusive-usb-devices_security-hardening[usbguard] and kernel modules.
48
53
* **Custom resources (for `ContainerRuntime` and `Kubelet`)**: Outside of machine configs, MCO manages two special custom resources for modifying CRI-O container runtime settings (`ContainerRuntime` CR) and the Kubelet service (`Kubelet` CR).
0 commit comments