Skip to content

Commit ee5802b

Browse files
authored
Merge pull request #65135 from bhardesty/osdocs-7854-image-registry
OSDOCS-7854: Remove registry config for OSD/ROSA
2 parents 8ee7a5e + 60988e8 commit ee5802b

File tree

6 files changed

+35
-15
lines changed

6 files changed

+35
-15
lines changed

_topic_maps/_topic_map_osd.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -306,8 +306,8 @@ Topics:
306306
File: configuring-registry-operator
307307
- Name: Accessing the registry
308308
File: accessing-the-registry
309-
- Name: Exposing the registry
310-
File: securing-exposing-registry
309+
# - Name: Exposing the registry
310+
# File: securing-exposing-registry
311311
---
312312
Name: Networking
313313
Dir: networking

_topic_maps/_topic_map_rosa.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -408,16 +408,16 @@ Topics:
408408
---
409409
Name: Registry
410410
Dir: registry
411-
Distros: openshift-rosa-portal
411+
Distros: openshift-rosa,openshift-rosa-portal
412412
Topics:
413413
- Name: Registry overview
414414
File: index
415415
- Name: Image Registry Operator in Red Hat OpenShift Service on AWS
416416
File: configuring-registry-operator
417417
- Name: Accessing the registry
418418
File: accessing-the-registry
419-
- Name: Exposing the registry
420-
File: securing-exposing-registry
419+
# - Name: Exposing the registry
420+
# File: securing-exposing-registry
421421
---
422422
Name: Networking
423423
Dir: networking

modules/registry-checking-the-status-of-registry-pods.adoc

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,26 @@
66
[id="checking-the-status-of-registry-pods_{context}"]
77
= Checking the status of the registry pods
88

9-
As a cluster administrator, you can list the image registry pods running in the `openshift-image-registry` project and check their status.
9+
ifndef::openshift-dedicated,openshift-rosa[]
10+
As a cluster administrator,
11+
endif::openshift-dedicated,openshift-rosa[]
12+
ifdef::openshift-dedicated,openshift-rosa[]
13+
As an administrator with the `dedicated-admin` role,
14+
endif::openshift-dedicated,openshift-rosa[]
15+
you can list the image registry pods running in the `openshift-image-registry` project and check their status.
1016

1117
.Prerequisites
1218

19+
ifndef::openshift-dedicated,openshift-rosa[]
1320
* You have access to the cluster as a user with the `cluster-admin` role.
21+
endif::openshift-dedicated,openshift-rosa[]
22+
ifdef::openshift-dedicated,openshift-rosa[]
23+
* You have access to the cluster as a user with the `dedicated-admin` role.
24+
endif::openshift-dedicated,openshift-rosa[]
1425

1526
.Procedure
1627

17-
. List the pods in the `openshift-image-registry` project and view their status:
28+
* List the pods in the `openshift-image-registry` project and view their status:
1829
+
1930
[source,terminal]
2031
----

modules/registry-viewing-logs.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ You can view the logs for the registry by using the `oc logs` command.
1010

1111
.Procedure
1212

13-
. Use the `oc logs` command with deployments to view the logs for the container
13+
* Use the `oc logs` command with deployments to view the logs for the container
1414
image registry:
1515
+
1616
[source,terminal]

registry/accessing-the-registry.adoc

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9+
ifndef::openshift-dedicated,openshift-rosa[]
910
Use the following sections for instructions on accessing the registry, including
1011
viewing logs and metrics, as well as securing and exposing the registry.
1112

@@ -14,10 +15,16 @@ you to push images to or pull them from the integrated registry directly using
1415
operations like `podman push` or `podman pull`. To do so, you must be logged in
1516
to the registry using the `podman login` command. The operations you can perform
1617
depend on your user permissions, as described in the following sections.
18+
endif::openshift-dedicated,openshift-rosa[]
1719

20+
ifdef::openshift-dedicated,openshift-rosa[]
21+
In {product-title}, Red Hat Site Reliability Engineering (SRE) manages the registry for you. However, you can check the status of the registry pods and view the registry logs.
22+
endif::openshift-dedicated,openshift-rosa[]
23+
24+
ifndef::openshift-dedicated,openshift-rosa[]
1825
== Prerequisites
1926

20-
* You have access to the cluster as a user with the cluster-admin role.
27+
* You have access to the cluster as a user with the `cluster-admin` role.
2128
* You must have configured an identity provider (IDP).
2229
* For pulling images, for example when using the `podman pull` command,
2330
the user must have the `registry-viewer` role. To add this role, run the following command:
@@ -36,17 +43,19 @@ $ oc policy add-role-to-user registry-editor <user_name>
3643
----
3744
+
3845
** Your cluster must have an existing project where the images can be pushed to.
46+
endif::openshift-dedicated,openshift-rosa[]
3947
48+
ifndef::openshift-dedicated,openshift-rosa[]
4049
include::modules/registry-accessing-directly.adoc[leveloffset=+1]
50+
endif::openshift-dedicated,openshift-rosa[]
4151

4252
include::modules/registry-checking-the-status-of-registry-pods.adoc[leveloffset=+1]
4353

4454
include::modules/registry-viewing-logs.adoc[leveloffset=+1]
4555

56+
ifndef::openshift-dedicated,openshift-rosa[]
4657
include::modules/registry-accessing-metrics.adoc[leveloffset=+1]
4758

48-
// These additional resources may be relevant to OSD/ROSA, but they xref topics that don't currently exist in the OSD/ROSA distros.
49-
ifndef::openshift-dedicated,openshift-rosa[]
5059
[id="accessing-the-registry-additional-resources"]
5160
[role="_additional-resources"]
5261
== Additional resources

registry/configuring-registry-operator.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ If insufficient information is available to define a complete `configs.imageregi
3131

3232
The Image Registry Operator runs in the `openshift-image-registry` namespace, and manages the registry instance in that location as well. All configuration and workload resources for the registry reside in that namespace.
3333

34+
ifndef::openshift-dedicated,openshift-rosa[]
3435
[IMPORTANT]
3536
====
3637
The Image Registry Operator's behavior for managing the pruner is orthogonal to the `managementState` specified on the `ClusterOperator` object for the Image Registry Operator. If the Image Registry Operator is not in the `Managed` state, the image pruner can still be configured and managed by the `Pruning` custom resource.
@@ -40,22 +41,22 @@ However, the `managementState` of the Image Registry Operator alters the behavio
4041
* `Managed`: the `--prune-registry` flag for the image pruner is set to `true`.
4142
* `Removed`: the `--prune-registry` flag for the image pruner is set to `false`, meaning it only prunes image metatdata in etcd.
4243
====
44+
endif::openshift-dedicated,openshift-rosa[]
4345
4446
ifndef::openshift-dedicated,openshift-rosa[]
4547
[id="image-registry-on-bare-metal-vsphere"]
4648
== Image Registry on bare metal, Nutanix, and vSphere
4749

4850
include::modules/registry-removed.adoc[leveloffset=+2]
49-
endif::openshift-dedicated,openshift-rosa[]
5051

5152
include::modules/registry-operator-distribution-across-availability-zones.adoc[leveloffset=+1]
5253

53-
ifndef::openshift-dedicated,openshift-rosa,openshift-rosa-portal[]
54+
ifndef::openshift-rosa-portal[]
5455
[role="_additional-resources"]
5556
== Additional resources
5657
5758
* xref:../nodes/scheduling/nodes-scheduler-pod-topology-spread-constraints.adoc#nodes-scheduler-pod-topology-spread-constraints[Configuring pod topology spread constraints]
58-
endif::openshift-dedicated,openshift-rosa,openshift-rosa-portal[]
59+
endif::openshift-rosa-portal[]
5960
6061
include::modules/registry-operator-configuration-resource-overview.adoc[leveloffset=+1]
6162
@@ -65,7 +66,6 @@ include::modules/images-configuration-cas.adoc[leveloffset=+1]
6566
6667
include::modules/registry-operator-config-resources-storage-credentials.adoc[leveloffset=+1]
6768
68-
ifndef::openshift-dedicated,openshift-rosa[]
6969
[role="_additional-resources"]
7070
== Additional resources
7171

0 commit comments

Comments
 (0)