Skip to content

Commit 7ce76e4

Browse files
authored
Merge pull request #97370 from shdeshpa07/OADP-6498-dita-oadp-rosa
Dita vale fixes for OADP ROSA
2 parents ee627f2 + 8a9fe2e commit 7ce76e4

File tree

6 files changed

+9
-9
lines changed

6 files changed

+9
-9
lines changed

backup_and_restore/application_backup_and_restore/oadp-rosa/oadp-rosa-backing-up-applications.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ include::_attributes/common-attributes.adoc[]
1111

1212
toc::[]
1313

14+
[role="_abstract"]
1415
You can use {oadp-first} with {product-rosa} (ROSA) clusters to back up and restore application data.
1516

1617
ifndef::openshift-rosa,openshift-rosa-hcp[]

modules/cleanup-a-backup-oadp-rosa-sts.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
[id="cleanup-a-backup-oadp-rosa-sts_{context}"]
77
= Cleaning up a cluster after a backup with OADP and ROSA STS
88

9+
[role="_abstract"]
910
If you need to uninstall the {oadp-first} Operator together with the backups and the S3 bucket from this example, follow these instructions.
1011

1112
.Procedure

modules/installing-oadp-rosa-sts.adoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
[id="installing-oadp-rosa-sts_{context}"]
77
= Installing the OADP Operator and providing the IAM role
88

9+
[role="_abstract"]
910
AWS Security Token Service (AWS STS) is a global web service that provides short-term credentials for IAM or federated users. {product-title} (ROSA) with {sts-short} is the recommended credential mode for ROSA clusters. This document describes how to install {oadp-first} on ROSA with {aws-short} {sts-short}.
1011

1112

@@ -67,9 +68,7 @@ $ oc -n openshift-adp create secret generic cloud-credentials \
6768
+
6869
[NOTE]
6970
====
70-
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM)
71-
and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above
72-
secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.
71+
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM) and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.
7372
7473
The preceding secret is created automatically by CCO.
7574
====

modules/performing-a-backup-oadp-rosa-sts.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@
66
[id="performing-a-backup-oadp-rosa-sts_{context}"]
77
= Performing a backup with OADP and ROSA STS
88

9-
The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup with {oadp-first} with {product-rosa} (ROSA) STS.
9+
[role="_abstract"]
10+
The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup by using {oadp-first} with {product-rosa} (ROSA) STS.
1011

1112
Either Data Protection Application (DPA) configuration will work.
1213

@@ -161,6 +162,6 @@ Hello OpenShift!
161162

162163
[NOTE]
163164
====
164-
For troubleshooting tips, see the OADP team’s link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
165+
For troubleshooting tips, see the link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
165166
====
166167

modules/preparing-aws-credentials-for-oadp.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
[id="preparing-aws-credentials-for-oadp_{context}"]
88
= Preparing AWS credentials for OADP
99

10+
[role="_abstract"]
1011
An {aws-full} account must be prepared and configured to accept an {oadp-first} installation.
1112

1213
.Procedure

modules/updating-role-arn-oadp-rosa-sts.adoc

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
[id="updating-role-arn-oadp-rosa-sts_{context}"]
77
= Updating the IAM role ARN in the {oadp-short} Operator subscription
88

9+
[role="_abstract"]
910
While installing the {oadp-short} Operator on a ROSA Security Token Service (STS) cluster, if you provide an incorrect IAM role Amazon Resource Name (ARN), the `openshift-adp-controller` pod gives an error. The credential requests that are generated contain the wrong IAM role ARN. To update the credential requests object with the correct IAM role ARN, you can edit the {oadp-short} Operator subscription and patch the IAM role ARN with the correct value. By editing the {oadp-short} Operator subscription, you do not have to uninstall and reinstall {oadp-short} to update the IAM role ARN.
1011

1112
.Prerequisites
@@ -157,7 +158,3 @@ $ oc get {oadp-bsl-api} -n openshift-adp
157158
NAME PHASE LAST VALIDATED AGE DEFAULT
158159
ts-dpa-1 Available 3s 6s true
159160
----
160-
161-
162-
163-

0 commit comments

Comments
 (0)