Skip to content

Commit 0f11f22

Browse files
authored
Merge pull request #99155 from EricPonvelle/OSDOCS-14508_Networking-Pruning
OSDOCS-14508: Prune networking
2 parents 94c2e94 + 0ec1112 commit 0f11f22

File tree

39 files changed

+104
-193
lines changed

39 files changed

+104
-193
lines changed

_attributes/attributes-openshift-dedicated.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656
:hcp-title: ROSA with HCP
5757
:rosa-classic-title: Red Hat OpenShift Service on AWS (classic architecture)
5858
:rosa-classic-short: ROSA (classic)
59-
:rosa-title: Red Hat OpenShift Service on AWS (ROSA) with hosted control planes (HCP)
59+
:rosa-title: Red Hat OpenShift Service on AWS
6060
:rosa-short: ROSA with HCP
6161
:egress-zero: egress zero
6262
:egress-zero-title: {product-title} clusters with {egress-zero}

_topic_maps/_topic_map_rosa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1005,7 +1005,7 @@ Topics:
10051005
File: configuring-egress-ips-ovn
10061006
- Name: Migrating from OpenShift SDN network plugin to OVN-Kubernetes network plugin
10071007
File: migrate-from-openshift-sdn
1008-
- Name: Configuring a cluster-wide proxy during installation
1008+
- Name: Configuring a cluster-wide proxy
10091009
File: configuring-cluster-wide-proxy
10101010
- Name: OpenShift SDN network plugin
10111011
Dir: ovn_kubernetes_network_provider

_topic_maps/_topic_map_rosa_hcp.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1041,7 +1041,7 @@ Topics:
10411041
# File: configuring-egress-ips-ovn
10421042
# - Name: Migrating from OpenShift SDN network plugin to OVN-Kubernetes network plugin
10431043
# File: migrate-from-openshift-sdn
1044-
- Name: Configuring a cluster-wide proxy during installation
1044+
- Name: Configuring a cluster-wide proxy
10451045
File: configuring-cluster-wide-proxy
10461046
#- Name: OpenShift SDN network plugin
10471047
# Dir: ovn_kubernetes_network_provider

modules/albo-installation.adoc

Lines changed: 1 addition & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -68,33 +68,12 @@ $ aws iam create-role --role-name "${CLUSTER_NAME}-alb-operator" \
6868
----
6969
+
7070
Take note of the Operator role ARN in the output. This is referred to as the `$OPERATOR_ROLE_ARN` for the remainder of this process.
71-
7271
.. Associate the Operator role and policy:
7372
+
7473
----
7574
$ aws iam attach-role-policy --role-name "${CLUSTER_NAME}-alb-operator" \
7675
--policy-arn $OPERATOR_POLICY_ARN
7776
----
78-
////
79-
. Create a secret for the AWS Load Balancer Operator to assume our newly created AWS IAM role:
80-
+
81-
[source,terminal]
82-
----
83-
$ cat << EOF | oc apply -f -
84-
apiVersion: v1
85-
kind: Secret
86-
metadata:
87-
name: aws-load-balancer-operator
88-
namespace: aws-load-balancer-operator
89-
stringData:
90-
credentials: |
91-
[default]
92-
role_arn = $ROLE_ARN
93-
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token
94-
EOF
95-
----
96-
////
97-
+
9877
. Install the AWS Load Balancer Operator by creating an `OperatorGroup` and a `Subscription`:
9978
+
10079
[source,terminal,subs="quotes,verbatim"]
@@ -170,7 +149,7 @@ $ cat <<EOF > ${SCRATCH}/controller-trust-policy.json
170149
EOF
171150
----
172151

173-
. Create the Controller role using the trust policy:
152+
.. Create the Controller role using the trust policy:
174153
+
175154
[source,terminal]
176155
----

modules/albo-prerequisites.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,8 +121,8 @@ aws ec2 create-tags \
121121
122122
EOF
123123
----
124-
+
125-
.. Run the script:
124+
125+
. Run the script:
126126
+
127127
[source,bash]
128128
----

modules/configmap-removing-ca.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="configmap-removing-ca_{context}"]
77
= Removing certificate authorities on a {product-title} cluster
88

9-
You can remove certificate authorities (CA) from your cluster with the {product-title} (ROSA) CLI, `rosa`.
9+
You can remove certificate authorities (CA) from your cluster with the ROSA CLI, `rosa`.
1010

1111
.Prerequisites
1212

modules/configuring-a-proxy-after-installation-cli.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="configuring-a-proxy-after-installation-cli_{context}"]
77
= Configuring a proxy after installation using the CLI
88

9-
You can use the {product-title} (ROSA) CLI (`rosa`) to add a cluster-wide proxy configuration to an existing ROSA cluster in a Virtual Private Cloud (VPC).
9+
You can use the ROSA CLI (`rosa`) to add a cluster-wide proxy configuration to an existing ROSA cluster in a Virtual Private Cloud (VPC).
1010

1111
You can also use `rosa` to update an existing cluster-wide proxy configuration. For example, you might need to update the network address for the proxy or replace the additional trust bundle if any of the certificate authorities for the proxy expire.
1212

@@ -18,7 +18,7 @@ The cluster applies the proxy configuration to the control plane and compute nod
1818
.Prerequisites
1919

2020
* You have installed and configured the latest ROSA (`rosa`) and OpenShift (`oc`) CLIs on your installation host.
21-
* You have a ROSA cluster that is deployed in a VPC.
21+
* You have a {product-title} cluster that is deployed in a VPC.
2222
2323
.Procedure
2424

modules/configuring-a-proxy-during-installation-cli.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="configuring-a-proxy-during-installation-cli_{context}"]
77
= Configuring a proxy during installation using the CLI
88

9-
If you are installing a {product-title} (ROSA) cluster into an existing Virtual Private Cloud (VPC), you can use the ROSA CLI (`rosa`) to enable a cluster-wide HTTP or HTTPS proxy during installation.
9+
If you are installing a {product-title} cluster into an existing Virtual Private Cloud (VPC), you can use the ROSA CLI (`rosa`) to enable a cluster-wide HTTP or HTTPS proxy during installation.
1010

1111
The following procedure provides details about the ROSA CLI (`rosa`) arguments that are used to configure a cluster-wide proxy during installation.
1212

modules/configuring-a-proxy-during-installation-ocm.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ If you are installing
1010
ifdef::openshift-dedicated[]
1111
an {product-title}
1212
endif::openshift-dedicated[]
13-
ifdef::openshift-rosa[]
14-
a {product-title} (ROSA)
15-
endif::openshift-rosa[]
13+
ifdef::openshift-rosa,openshift-rosa-hcp[]
14+
a {product-title}
15+
endif::openshift-rosa,openshift-rosa-hcp[]
1616
cluster into an existing Virtual Private Cloud (VPC), you can use {cluster-manager-first} to enable a cluster-wide HTTP or HTTPS proxy during installation.
1717
ifdef::openshift-dedicated[]
1818
You can enable a proxy only for clusters that use the Customer Cloud Subscription (CCS) model.

modules/modifying-template-for-new-projects.adoc

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,18 +7,17 @@
77
[id="modifying-template-for-new-projects_{context}"]
88
= Modifying the template for new projects
99

10-
As a cluster administrator, you can modify the default project template so that
11-
new projects are created using your custom requirements.
10+
As a cluster administrator, you can modify the default project template so that new projects are created using your custom requirements.
1211

1312
To create your own custom project template:
1413

1514
.Prerequisites
16-
ifndef::openshift-rosa,openshift-dedicated[]
15+
ifndef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
1716
* You have access to an {product-title} cluster using an account with `cluster-admin` permissions.
18-
endif::openshift-rosa,openshift-dedicated[]
19-
ifdef::openshift-rosa,openshift-dedicated[]
20-
* You have access to an {product-title} cluster using an account with `dedicated-admin` permissions.
21-
endif::openshift-rosa,openshift-dedicated[]
17+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
18+
ifdef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
19+
* You have access to a {product-title} cluster using an account with `dedicated-admin` permissions.
20+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
2221

2322
.Procedure
2423

0 commit comments

Comments
 (0)