Skip to content

Commit 5842b2e

Browse files
committed
OSDOCS-11830 Split Networking content for ROSA with HCP
1 parent 6e59529 commit 5842b2e

22 files changed

+213
-107
lines changed

_topic_maps/_topic_map_rosa_hcp.yml

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -853,6 +853,84 @@ Topics:
853853
# - Name: Advanced OADP features and functionalities
854854
# File: oadp-advanced-topics
855855
---
856+
Name: Networking
857+
Dir: networking
858+
Distros: openshift-rosa-hcp
859+
Topics:
860+
- Name: About networking
861+
File: about-managed-networking
862+
- Name: Networking Operators
863+
Dir: networking_operators
864+
Distros: openshift-rosa-hcp
865+
Topics:
866+
- Name: AWS Load Balancer Operator
867+
File: aws-load-balancer-operator
868+
- Name: DNS Operator in Red Hat OpenShift Service on AWS
869+
File: dns-operator
870+
# TODO OSDOCS-11830: Unable to locate in OperatorHub for ROSA with HCP cluster
871+
# - Name: Ingress Operator in Red Hat OpenShift Service on AWS
872+
# File: ingress-operator
873+
- Name: Ingress Node Firewall Operator in Red Hat OpenShift Service on AWS
874+
File: ingress-node-firewall-operator
875+
- Name: Network verification
876+
File: network-verification
877+
- Name: Configuring a cluster-wide proxy during installation
878+
File: configuring-cluster-wide-proxy
879+
- Name: CIDR range definitions
880+
File: cidr-range-definitions
881+
- Name: Network security
882+
Dir: network_security
883+
Distros: openshift-rosa-hcp
884+
Topics:
885+
- Name: Understanding network policy APIs
886+
File: network-policy-apis
887+
- Name: Admin network policy
888+
Dir: AdminNetworkPolicy
889+
Distros: openshift-rosa-hcp
890+
Topics:
891+
- Name: About AdminNetworkPolicy
892+
File: ovn-k-anp
893+
- Name: About BaselineAdminNetworkPolicy
894+
File: ovn-k-banp
895+
- Name: Network policy
896+
Dir: network_policy
897+
Distros: openshift-rosa-hcp
898+
Topics:
899+
- Name: About network policy
900+
File: about-network-policy
901+
- Name: Creating a network policy
902+
File: creating-network-policy
903+
- Name: Viewing a network policy
904+
File: viewing-network-policy
905+
- Name: Editing a network policy
906+
File: editing-network-policy
907+
- Name: Deleting a network policy
908+
File: deleting-network-policy
909+
- Name: Defining a default network policy for projects
910+
File: default-network-policy
911+
- Name: Configuring multitenant isolation with network policy
912+
File: multitenant-network-policy
913+
# Included for OSDOCS-13465
914+
- Name: Audit logging for network security
915+
File: logging-network-security
916+
- Name: Configuring the primary cluster network
917+
Dir: ovn_kubernetes_network_provider
918+
Distros: openshift-rosa-hcp
919+
Topics:
920+
- Name: About the OVN-Kubernetes network plugin
921+
File: about-ovn-kubernetes
922+
- Name: Configuring an egress IP address
923+
File: configuring-egress-ips-ovn
924+
# OpenShift SDN not supported for HCP
925+
- Name: Configuring Routes
926+
Dir: routes
927+
Distros: openshift-rosa-hcp
928+
Topics:
929+
- Name: Route configuration
930+
File: route-configuration
931+
- Name: Secured routes
932+
File: secured-routes
933+
---
856934
Name: Nodes
857935
Dir: nodes
858936
Distros: openshift-rosa-hcp

cloud_experts_tutorials/cloud-experts-aws-load-balancer-operator.adoc

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,10 @@ toc::[]
2020

2121
include::snippets/mobb-support-statement.adoc[leveloffset=+1]
2222

23-
ifndef::openshift-rosa-hcp[]
2423
[TIP]
2524
====
2625
Load Balancers created by the AWS Load Balancer Operator cannot be used for xref:../networking/routes/route-configuration.adoc#route-configuration[OpenShift Routes], and should only be used for individual services or ingress resources that do not need the full layer 7 capabilities of an OpenShift Route.
2726
====
28-
endif::openshift-rosa-hcp[]
29-
ifdef::openshift-rosa-hcp[]
30-
[TIP]
31-
====
32-
Load Balancers created by the AWS Load Balancer Operator cannot be used for link:https://docs.openshift.com/rosa/networking/routes/route-configuration.html[OpenShift Routes], and should only be used for individual services or ingress resources that do not need the full layer 7 capabilities of an OpenShift Route.
33-
====
34-
endif::openshift-rosa-hcp[]
3527

3628
The link:https://kubernetes-sigs.github.io/aws-load-balancer-controller/[AWS Load Balancer Controller] manages AWS Elastic Load Balancers for a {product-title} (ROSA) cluster. The controller provisions link:https://docs.aws.amazon.com/elasticloadbalancing/latest/application/introduction.html[AWS Application Load Balancers (ALB)] when you create Kubernetes Ingress resources and link:https://docs.aws.amazon.com/elasticloadbalancing/latest/network/introduction.html[AWS Network Load Balancers (NLB)] when implementing Kubernetes Service resources with a type of LoadBalancer.
3729

@@ -54,11 +46,12 @@ AWS ALBs require a multi-AZ cluster, as well as three public subnets split acros
5446

5547
ifndef::openshift-rosa-hcp[]
5648
* xref:../rosa_install_access_delete_clusters/rosa-sts-creating-a-cluster-quickly.adoc#rosa-sts-creating-a-cluster-quickly[A multi-AZ ROSA classic cluster]
49+
* BYO VPC cluster
50+
//Moved inside ifndef since this is always true for HCP clusters
5751
endif::openshift-rosa-hcp[]
5852
ifdef::openshift-rosa-hcp[]
59-
* link:https://docs.openshift.com/rosa-hcp/rosa_hcp/rosa-hcp-sts-creating-a-cluster-quickly.html[A multi-AZ ROSA cluster]
53+
* xref:../rosa_hcp/rosa-hcp-sts-creating-a-cluster-quickly.adoc#rosa-hcp-sts-creating-a-cluster-quickly[A multi-AZ {hcp-title} cluster]
6054
endif::openshift-rosa-hcp[]
61-
* BYO VPC cluster
6255
* AWS CLI
6356
* OC CLI
6457

@@ -123,6 +116,7 @@ $ aws ec2 create-tags \
123116
--tags Key=kubernetes.io/role/internal-elb,Value='' \
124117
--region ${REGION}
125118
----
119+
//subnets are tagged already after rosa create network
126120

127121
[id="installation_{context}"]
128122
== Installation
@@ -355,6 +349,8 @@ $ curl "http://${INGRESS}"
355349
----
356350
Hello OpenShift!
357351
----
352+
//TODO OSDOCS-11830: Couldn't get either of these validation checks to work, Andy R indicated that the related error seems to be that user is not authorized to do operation elasticloadbalancing:AddTags because "no identity based policy allows elasticloadbalancing:AddTags" however the linked policy does seem to allow that as far as I can tell: https://raw.githubusercontent.com/rh-mobb/documentation/main/content/rosa/aws-load-balancer-operator/load-balancer-operator-policy.json
353+
// That said, I'm not sure we should be getting our example policy from the rh-mobb repo
358354

359355
. Deploy an AWS NLB for your hello world application:
360356
+

modules/cluster-wide-proxy-preqs.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ifdef::openshift-dedicated[]
2121
* You have an existing Virtual Private Cloud (VPC) for your cluster.
2222
* You are using the Customer Cloud Subscription (CCS) model for your cluster.
2323
endif::openshift-dedicated[]
24-
* The proxy can access the VPC for the cluster and the private subnets of the VPC. The proxy is also accessible from the VPC for the cluster and from the private subnets of the VPC.
24+
* The proxy can access the VPC for the cluster and the private subnets of the VPC. The proxy must also be accessible from the VPC for the cluster and from the private subnets of the VPC.
2525
* You have added the following endpoints to your VPC endpoint:
2626
** `ec2.<aws_region>.amazonaws.com`
2727
** `elasticloadbalancing.<aws_region>.amazonaws.com`

modules/running-network-verification-manually-ocm.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ ROSA
3333
endif::openshift-rosa[]
3434
cluster.
3535
* You are the cluster owner or you have the cluster editor role.
36+
//TODO OSDOCS-11830 I am both of these things and I can't see anything related to this in OCM; is this only available after a specific version? upgrading test cluster to see if this appears for later cluster versions
3637
3738
.Procedure
3839

networking/about-managed-networking.adoc

Lines changed: 11 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,42 +10,30 @@ toc::[]
1010

1111
The following are some of the most commonly used {openshift-networking} features available on your cluster:
1212

13-
* Cluster Network Operator for network plugin management
14-
+
13+
* Cluster Network Operator for network plugin management.
14+
15+
ifdef::openshift-rosa-hcp[]
16+
* Primary cluster network provided by xref:../networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc#about-ovn-kubernetes[OVN-Kubernetes], the default Container Network Interface (CNI) plugin.
17+
endif::openshift-rosa-hcp[]
18+
19+
ifndef::openshift-rosa-hcp[]
1520
* Primary cluster network provided by either of the following Container Network Interface (CNI) plugins:
1621
+
1722
** xref:../networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc#about-ovn-kubernetes[OVN-Kubernetes network plugin], which is the default CNI plugin.
1823
** {OCP-short} SDN network plugin, which was deprecated in {OCP-short} 4.16 and removed in {OCP-short} 4.17.
1924

20-
ifdef::openshift-rosa[]
21-
25+
ifdef::openshift-rosa,openshift-dedicated[]
2226
[IMPORTANT]
2327
====
24-
Before upgrading {rosa-classic} clusters that are configured with the OpenShift SDN network plugin to version 4.17, you must migrate to the OVN-Kubernetes network plugin. For more information, see _Migrating from the OpenShift SDN network plugin to the OVN-Kubernetes network plugin_ in the _Additional resources_ section.
28+
Before upgrading {rosa-classic} clusters that are configured with the OpenShift SDN network plugin to version 4.17, you must migrate to the OVN-Kubernetes network plugin. For more information, see _Migrating from the OpenShift SDN network plugin to the OVN-Kubernetes network plugin_.
2529
====
26-
endif::openshift-rosa[]
27-
28-
ifdef::openshift-dedicated[]
29-
30-
[IMPORTANT]
31-
====
32-
Before upgrading {product-title} clusters that are configured with the OpenShift SDN network plugin to version 4.17, you must migrate to the OVN-Kubernetes network plugin. For more information, see _Migrating from the OpenShift SDN network plugin to the OVN-Kubernetes network plugin_ in the _Additional resources_ section.
33-
====
34-
endif::openshift-dedicated[]
35-
3630

3731
[discrete]
3832
[role="_additional-resources"]
3933
[id="additional-resources_{context}"]
4034
== Additional resources
41-
4235
* link:https://access.redhat.com/articles/7065170[{OCP-short} SDN CNI removal in OCP 4.17]
36+
endif::openshift-rosa,openshift-dedicated[]
4337
ifdef::openshift-rosa[]
4438
* xref:../networking/ovn_kubernetes_network_provider/migrate-from-openshift-sdn.adoc#migrate-from-openshift-sdn[Migrating from the OpenShift SDN network plugin to the OVN-Kubernetes network plugin]
45-
endif::openshift-rosa[]
46-
47-
ifdef::openshift-dedicated[]
48-
49-
* xref:../networking/ovn_kubernetes_network_provider/migrate-from-openshift-sdn-osd.adoc#migrate-from-openshift-sdn-osd[Migrating from the OpenShift SDN network plugin to the OVN-Kubernetes network plugin]
50-
endif::openshift-dedicated[]
51-
39+
endif::openshift-rosa[]

networking/cidr-range-definitions.adoc

Lines changed: 21 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
[id="cidr-range-definitions"]
33
= CIDR range definitions
44
include::_attributes/common-attributes.adoc[]
5-
ifdef::openshift-dedicated,openshift-rosa[]
5+
ifdef::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
66
include::_attributes/attributes-openshift-dedicated.adoc[]
7-
endif::openshift-dedicated,openshift-rosa[]
7+
endif::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
88
:context: cidr-range-definitions
99

1010
toc::[]
@@ -27,9 +27,9 @@ The following subnet types and are mandatory for a cluster that uses OVN-Kuberne
2727
You can change the join, masquerade, and transit CIDR ranges for your cluster as a post-installation task.
2828
====
2929

30-
ifdef::openshift-rosa,openshift-dedicated[]
30+
ifdef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
3131
When specifying subnet CIDR ranges, ensure that the subnet CIDR range is within the defined Machine CIDR. You must verify that the subnet CIDR ranges allow for enough IP addresses for all intended workloads depending on which platform the cluster is hosted.
32-
endif::[]
32+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
3333

3434
OVN-Kubernetes, the default network provider in {product-title} 4.14 and later versions, internally uses the following IP address subnet ranges:
3535

@@ -39,18 +39,19 @@ OVN-Kubernetes, the default network provider in {product-title} 4.14 and later v
3939
* `V6TransitSwitchSubnet`: `fd97::/64`
4040
* `defaultV4MasqueradeSubnet`: `169.254.0.0/17`
4141
* `defaultV6MasqueradeSubnet`: `fd69::/112`
42+
// TODO OSDOCS-11830 validate for HCP clusters
4243
4344
[IMPORTANT]
4445
====
4546
The previous list includes join, transit, and masquerade IPv4 and IPv6 address subnets. If your cluster uses OVN-Kubernetes, do not include any of these IP address subnet ranges in any other CIDR definitions in your cluster or infrastructure.
4647
====
4748

48-
ifndef::openshift-rosa,openshift-dedicated[]
49+
ifndef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
4950
[role="_additional-resources"]
5051
.Additional resources
5152
5253
* For more information about configuring join subnets or transit subnets, see xref:../networking/ovn_kubernetes_network_provider/configure-ovn-kubernetes-subnets.adoc#configure-ovn-kubernetes-subnets[Configuring OVN-Kubernetes internal IP address subnets].
53-
endif::[]
54+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
5455
5556
[id="machine-cidr-description"]
5657
== Machine CIDR
@@ -62,33 +63,35 @@ In the Machine classless inter-domain routing (CIDR) field, you must specify the
6263
Machine CIDR ranges cannot be changed after creating your cluster.
6364
====
6465
65-
ifdef::openshift-rosa,openshift-dedicated[]
66+
ifdef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
6667
This range must encompass all CIDR address ranges for your virtual private cloud (VPC) subnets. Subnets must be contiguous. A minimum IP address range of 128 addresses, using the subnet prefix `/25`, is supported for single availability zone deployments. A minimum address range of 256 addresses, using the subnet prefix `/24`, is supported for deployments that use multiple availability zones.
67-
endif::openshift-rosa,openshift-dedicated[]
68+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
69+
//TODO OSDOCS-11830 does this mean that machine CIDR can onky be in /25 and /24?
6870
6971
The default is `10.0.0.0/16`. This range must not conflict with any connected networks.
7072
71-
ifdef::openshift-rosa[]
73+
ifdef::openshift-rosa,openshift-rosa-hcp[]
7274
[NOTE]
7375
====
7476
When using {hcp-title}, the static IP address `172.20.0.1` is reserved for the internal Kubernetes API address. The machine, pod, and service CIDRs ranges must not conflict with this IP address.
7577
====
76-
endif::[]
78+
endif::openshift-rosa,openshift-rosa-hcp[]
7779
78-
ifndef::openshift-rosa,openshift-dedicated[]
80+
81+
ifndef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
7982
[role="_additional-resources"]
8083
.Additional resources
8184
8285
* xref:../networking/networking_operators/cluster-network-operator.adoc#nw-operator-cr_cluster-network-operator[Cluster Network Operator configuration]
83-
endif::[]
86+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
8487
8588
8689
[id="service-cidr-description"]
8790
== Service CIDR
8891
In the Service CIDR field, you must specify the IP address range for services.
89-
ifdef::openshift-rosa,openshift-dedicated[]
92+
ifdef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
9093
It is recommended, but not required, that the address block is the same between clusters. This will not create IP address conflicts.
91-
endif::openshift-rosa,openshift-dedicated[]
94+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
9295
The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `172.30.0.0/16`.
9396
9497
[id="pod-cidr-description"]
@@ -98,9 +101,9 @@ In the pod CIDR field, you must specify the IP address range for pods.
98101
ifdef::openshift-enterprise[]
99102
The pod CIDR is the same as the `clusterNetwork` CIDR and the cluster CIDR.
100103
endif::openshift-enterprise[]
101-
ifdef::openshift-rosa,openshift-dedicated[]
104+
ifdef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
102105
It is recommended, but not required, that the address block is the same between clusters. This will not create IP address conflicts.
103-
endif::openshift-rosa,openshift-dedicated[]
106+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
104107
The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `10.128.0.0/14`.
105108
ifdef::openshift-enterprise[]
106109
You can expand the range after cluster installation.
@@ -115,9 +118,9 @@ endif::openshift-enterprise[]
115118
== Host Prefix
116119
In the Host Prefix field, you must specify the subnet prefix length assigned to pods scheduled to individual machines. The host prefix determines the pod IP address pool for each machine.
117120
118-
ifdef::openshift-rosa,openshift-dedicated[]
121+
ifdef::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
119122
For example, if the host prefix is set to `/23`, each machine is assigned a `/23` subnet from the pod CIDR address range. The default is `/23`, allowing 512 cluster nodes, and 512 pods per node (both of which are beyond our maximum supported).
120-
endif::openshift-rosa,openshift-dedicated[]
123+
endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
121124
122125
ifdef::openshift-enterprise[]
123126
For example, if the host prefix is set to `/23`, each machine is assigned a `/23` subnet from the pod CIDR address range. The default is `/23`, allowing 510 cluster nodes, and 510 pod IP addresses per node.

networking/configuring-cluster-wide-proxy.adoc

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ If you are using an existing Virtual Private Cloud (VPC), you can configure a cl
1111
ifdef::openshift-rosa[]
1212
a {product-title} (ROSA)
1313
endif::openshift-rosa[]
14+
ifdef::openshift-rosa-hcp[]
15+
a {hcp-title-first} ({hcp-title})
16+
endif::openshift-rosa-hcp[]
1417
ifdef::openshift-dedicated[]
1518
an {product-title}
1619
endif::openshift-dedicated[]
@@ -32,6 +35,9 @@ include::modules/cluster-wide-proxy-preqs.adoc[leveloffset=+1]
3235
[role="_additional-resources"]
3336
.Additional resources
3437

38+
ifdef::openshift-rosa-hcp[]
39+
* xref:../rosa_planning/rosa-sts-aws-prereqs.adoc#rosa-hcp-prereqs[Prerequisites for {hcp-title}]
40+
endif::openshift-rosa-hcp[]
3541
ifdef::openshift-rosa[]
3642
* For the installation prerequisites for ROSA clusters that use the AWS Security Token Service (STS), see xref:../rosa_planning/rosa-sts-aws-prereqs.adoc#rosa-sts-aws-prerequisites[AWS prerequisites for ROSA with STS].
3743
* For the installation prerequisites for ROSA clusters that do not use STS, see xref:../rosa_install_access_delete_clusters/rosa_getting_started_iam/rosa-aws-prereqs.adoc#prerequisites[AWS prerequisites for ROSA].
@@ -50,16 +56,20 @@ You can configure an HTTP or HTTPS proxy when you install an {product-title} wit
5056

5157
include::modules/configuring-a-proxy-during-installation-ocm.adoc[leveloffset=+1]
5258
endif::openshift-dedicated[]
53-
ifdef::openshift-rosa[]
59+
ifdef::openshift-rosa,openshift-rosa-hcp[]
60+
// TODO OSDOCS-11830 confirm that these steps are identical for HCP clusters
5461
You can configure an HTTP or HTTPS proxy when you install a {product-title} (ROSA) cluster into an existing Virtual Private Cloud (VPC). You can configure the proxy during installation by using {cluster-manager-first} or the ROSA CLI (`rosa`).
5562

5663
include::modules/configuring-a-proxy-during-installation-ocm.adoc[leveloffset=+2]
5764
include::modules/configuring-a-proxy-during-installation-cli.adoc[leveloffset=+2]
58-
endif::openshift-rosa[]
65+
endif::openshift-rosa,openshift-rosa-hcp[]
5966

6067
[role="_additional-resources"]
6168
.Additional resources
6269

70+
ifdef::openshift-rosa-hcp[]
71+
* xref:../rosa_hcp/rosa-hcp-sts-creating-a-cluster-quickly.adoc#rosa-hcp-sts-creating-a-cluster-quickly[Creating a {hcp-title} cluster]
72+
endif::openshift-rosa-hcp[]
6373
ifdef::openshift-rosa[]
6474
* xref:../rosa_install_access_delete_clusters/rosa-sts-creating-a-cluster-with-customizations.adoc#rosa-sts-creating-cluster-customizations-ocm_rosa-sts-creating-a-cluster-with-customizations[Creating a cluster with customizations by using OpenShift Cluster Manager]
6575
* xref:../rosa_install_access_delete_clusters/rosa-sts-creating-a-cluster-with-customizations.adoc#rosa-sts-creating-cluster-customizations-cli_rosa-sts-creating-a-cluster-with-customizations[Creating a cluster with customizations using the CLI]
@@ -77,7 +87,7 @@ You can configure an HTTP or HTTPS proxy after you install an {product-title} wi
7787

7888
include::modules/configuring-a-proxy-after-installation-ocm.adoc[leveloffset=+1]
7989
endif::openshift-dedicated[]
80-
ifdef::openshift-rosa[]
90+
ifdef::openshift-rosa,openshift-rosa-hcp[]
8191
You can configure an HTTP or HTTPS proxy after you install a {product-title} (ROSA) cluster into an existing Virtual Private Cloud (VPC). You can configure the proxy after installation by using {cluster-manager-first} or the ROSA CLI (`rosa`).
8292

8393
include::modules/configuring-a-proxy-after-installation-ocm.adoc[leveloffset=+2]
@@ -90,4 +100,4 @@ You can remove your cluster-wide proxy by using the ROSA CLI. After removing the
90100

91101
include::modules/nw-rosa-proxy-remove-cli.adoc[leveloffset=+2]
92102
include::modules/configmap-removing-ca.adoc[leveloffset=+2]
93-
endif::openshift-rosa[]
103+
endif::openshift-rosa,openshift-rosa-hcp[]

0 commit comments

Comments
 (0)