You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: reference-architectures/deploy-arch-ibm-slz-ocp-quickstart.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,14 @@
2
2
3
3
copyright:
4
4
years: 2024
5
-
lastupdated: "2024-03-04"
5
+
lastupdated: "2024-03-11"
6
6
7
7
keywords:
8
8
9
9
subcollection: deployable-reference-architectures
10
10
11
11
authors:
12
-
- name: "Vincent Burckhardt"
12
+
- name: "Todd Giguere"
13
13
14
14
# The release that the reference architecture describes
15
15
version: 5.16.0
@@ -68,10 +68,10 @@ The following table outlines the requirements that are addressed in this archite
68
68
69
69
| Aspect | Requirements |
70
70
|---|---|
71
-
| Compute |Red Hat OpenShift cluster deployment with minimal machine size and nodes, suitable for low-cost demonstration and development |
72
-
| Storage |Red Hat OpenShift required storage only, no additional storage supplied|
73
-
| Networking | * Two VPCs deployed to demonstrate the concept of a "management-workload" relationship with a transit gateway. \n * All inbound and outbound traffic is allowed to VPCs. \n * Red Hat OpenShift cluster deployed with public administration endpoint to allow easy access to APIs and web console. \n * Load Balancer for cluster workload services. \n * Public Gateways on workload subnets to facilitate outbound internet access from cluster. \n * Transit Gateway to connect the management and workload VPCs. |
74
-
| Security | * Encrypt all application data in transit and at rest to protect from unauthorized disclosure. \n * Encryption keys stored in IBM Cloud Key Protect service. * \n Protect cluster administration access through IBM Cloud security protocols. |
71
+
| Compute |Kubernetes cluster with minimal machine size and nodes, suitable for low-cost demonstration and development |
| Networking | * Multiple VPCs for network isolation. \n * All public inbound and outbound traffic allowed to VPCs. \n * Administration of cluster allowed from public endpoint and web console. \n * Load balancer for cluster workload services. \n * Outbound internet access from cluster. \n * Private network connection between VPCs. |
74
+
| Security | * Encryption of all application data in transit and at rest to protect from unauthorized disclosure. \n * Storage and management of all encryption keys. \n * Protect cluster administration access through IBM Cloud security protocols. |
75
75
| Service Management | Automated deployment of infrastructure with IBM Cloud catalog |
@@ -83,7 +83,7 @@ The following table outlines the products or services used in the architecture f
83
83
| Aspects | Architecture components | How the component is used |
84
84
|---|---|---|
85
85
| Compute | Red Hat OpenShift Container Platform | Container execution |
86
-
| Storage | Cloud Object Storage |Requirement for Red Hat OpenShift deployment|
87
-
| Networking | * VPC Load Balancers \n * Public Gateway \n * Transit Gateway | * Application load Balancing for cluster workloads \n * For cluster access to the internet \n * For private network connectivity between VPCs |
| Storage |IBM Cloud Object Storage |Registry backup for Red Hat OpenShift |
87
+
| Networking | * VPC Load Balancer \n * Public Gateway \n * Transit Gateway | * Application load Balancing for cluster workloads (automatically created by OpenShift service for multi-zone cluster) \n * Cluster access to the internet \n * Private network connectivity between management and workload VPCs |
88
+
| Security | * IAM \n * Key Protect | * IBM Cloud Identity and Access Management \n * Management of encryption keys used by Red Hat OpenShift Container Platform|
0 commit comments