Skip to content

Commit 75afb85

Browse files
committed
standard-non-ccs
1 parent b78b0d8 commit 75afb85

File tree

5 files changed

+21
-15
lines changed

5 files changed

+21
-15
lines changed

modules/sdpolicy-am-aws-compute-types-non-ccs.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
// * osd_architecture/osd_policy/osd-service-definition.adoc
44
:_mod-docs-content-type: CONCEPT
55
[id="aws-instance-types-non-ccs_{context}"]
6-
= AWS instance types for standard clusters
6+
= AWS instance types for non-CCS clusters
77

88
{product-title} offers the following worker node types and sizes on AWS:
99

modules/sdpolicy-am-billing.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,10 +39,10 @@ Cloud provider for consumption of cloud infrastructure
3939
Customers that use their own cloud infrastructure account, referred to as Customer Cloud Subscription (CSS), are responsible to pre-purchase or provide Reserved Instance (RI) compute instances to ensure lower cloud infrastructure costs.
4040
====
4141

42-
Additional resources can be purchased for an OpenShift Dedicated Cluster, including:
42+
Additional resources can be purchased for an OpenShift Dedicated cluster, including:
4343

4444
* Additional nodes (can be different types and sizes through the use of machine pools)
4545
* Middleware (JBoss EAP, JBoss Fuse, and so on) - additional pricing based on specific middleware component
46-
* Additional storage in increments of 500 GB (standard only; 100 GB included)
47-
* Additional 12 TiB Network I/O (standard only; 12 TB included)
48-
* Load Balancers for Services are available in bundles of 4; enables non-HTTP/SNI traffic or non-standard ports (standard only)
46+
* Additional storage in increments of 500 GB (non-CCS only; 100 GB included)
47+
* Additional 12 TiB Network I/O (non-CCS only; 12 TB included)
48+
* Load Balancers for Services are available in bundles of 4; enables non-HTTP/SNI traffic or non-standard ports (non-CCS only)

modules/sdpolicy-am-compute.adoc

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,22 @@
55
[id="instance-types_{context}"]
66
= Instance types
77

8-
Single availability zone clusters require a minimum of 2 worker nodes for Customer Cloud Subscription (CCS) clusters deployed to a single availability zone. A minimum of 4 worker nodes is required for standard clusters. These 4 worker nodes are included in the base subscription.
8+
Single availability zone clusters require a minimum of 2 worker nodes for Customer Cloud Subscription (CCS) clusters deployed to a single availability zone. A minimum of 4 worker nodes is required for non-CCS clusters. These 4 worker nodes are included in the base subscription.
99

10-
Multiple availability zone clusters require a minimum of 3 worker nodes for Customer Cloud Subscription (CCS) clusters, 1 deployed to each of 3 availability zones. A minimum of 9 worker nodes are required for standard clusters. These 9 worker nodes are included in the base subscription, and additional nodes must be purchased in multiples of 3 to maintain proper node distribution.
10+
Multiple availability zone clusters require a minimum of 3 worker nodes for Customer Cloud Subscription (CCS) clusters, 1 deployed to each of 3 availability zones. A minimum of 9 worker nodes are required for non-CCS clusters. These 9 worker nodes are included in the base subscription, and additional nodes must be purchased in multiples of 3 to maintain proper node distribution.
1111

1212
[NOTE]
1313
====
1414
All worker nodes within a single {product-title} machine pool must be of the same type and size. However, worker nodes across multiple machine pools within an {product-title} cluster can be of different types and sizes.
1515
====
1616

17-
Control plane and infrastructure nodes are also provided by Red Hat. There are at least 3 control plane nodes that handle etcd and API-related workloads. There are at least 2 infrastructure nodes that handle metrics, routing, the web console, and other workloads. You must not run any workloads on the control plane and infrastructure nodes. Any workloads you intend to run must be deployed on worker nodes. See the Red Hat Operator support section below for more information about Red Hat workloads that must be deployed on worker nodes.
17+
Control plane and infrastructure nodes are deployed and managed by Red{nbsp}Hat. There are at least 3 control plane nodes that handle etcd and API-related workloads. There are at least 2 infrastructure nodes that handle metrics, routing, the web console, and other workloads. You must not run any workloads on the control plane and infrastructure nodes. Any workloads you intend to run must be deployed on worker nodes.
18+
[IMPORTANT]
19+
====
20+
Shutting down the underlying infrastructure through the cloud provider console is unsupported and can lead to data loss.
21+
====
22+
23+
For more information about Red{nbsp}Hat workloads that must be deployed on worker nodes, see the _Red{nbsp}Hat Operator support_ section below.
1824

1925
[NOTE]
2026
====

modules/sdpolicy-networking.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,15 @@ Custom domains and subdomains are not available for the platform service routes,
3232
{product-title} uses up to 5 different load balancers:
3333

3434
* Internal control plane load balancer that is internal to the cluster and used to balance traffic for internal cluster communications.
35-
* External control plane load balancer that is used for accessing the {OCP} and Kubernetes APIs. This load balancer can be disabled in {cluster-manager-first}. If this load balancer is disabled, Red Hat reconfigures the API DNS to point to the internal control load balancer.
36-
* External control plane load balancer for Red Hat that is reserved for cluster management by Red Hat. Access is strictly controlled, and communication is only possible from allowlisted bastion hosts.
35+
* External control plane load balancer that is used for accessing the {OCP} and Kubernetes APIs. This load balancer can be disabled in {cluster-manager-first}. If this load balancer is disabled, Red{nbsp}Hat reconfigures the API DNS to point to the internal control load balancer.
36+
* External control plane load balancer for Red{nbsp}Hat that is reserved for cluster management by Red{nbsp}Hat. Access is strictly controlled, and communication is only possible from allowlisted bastion hosts.
3737
* Default router/ingress load balancer that is the default application load balancer, denoted by `apps` in the URL. The default load balancer can be configured in {cluster-manager} to be either publicly accessible over the internet, or only privately accessible over a pre-existing private connection. All application routes on the cluster are exposed on this default router load balancer, including cluster services such as the logging UI, metrics API, and registry.
3838
* Optional: Secondary router/ingress load balancer that is a secondary application load balancer, denoted by `apps2` in the URL. The secondary load balancer can be configured in {cluster-manager} to be either publicly accessible over the internet, or only privately accessible over a pre-existing private connection. If a 'Label match' is configured for this router load balancer, then only application routes matching this label will be exposed on this router load balancer, otherwise all application routes are also exposed on this router load balancer.
39-
* Optional: Load balancers for services that can be mapped to a service running on {product-title} to enable advanced ingress features, such as non-HTTP/SNI traffic or the use of non-standard ports. These can be purchased in groups of 4 for standard clusters, or they can be provisioned without charge in Customer Cloud Subscription (CCS) clusters; however, each AWS account has a quota that link:https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-limits.html[limits the number of Classic Load Balancers] that can be used within each cluster.
39+
* Optional: Load balancers for services that can be mapped to a service running on {product-title} to enable advanced ingress features, such as non-HTTP/SNI traffic or the use of non-standard ports. These can be purchased in groups of 4 for non-CCS clusters, or they can be provisioned through the cloud provider console in Customer Cloud Subscription (CCS) clusters; however, each AWS account has a quota that link:https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-limits.html[limits the number of Classic Load Balancers] that can be used within each cluster.
4040

4141
[id="network-usage{context}"]
4242
== Network usage
43-
For standard {product-title} clusters, network usage is measured based on data transfer between inbound, VPC peering, VPN, and AZ traffic. On a standard {product-title} base cluster, 12 TB of network I/O is provided. Additional network I/O can be purchased in 12 TB increments. For CCS {product-title} clusters, network usage is not monitored, and is billed directly by the cloud provider.
43+
For non-CCS {product-title} clusters, network usage is measured based on data transfer between inbound, VPC peering, VPN, and AZ traffic. On a non-CCS {product-title} base cluster, 12 TB of network I/O is provided. Additional network I/O can be purchased in 12 TB increments. For CCS {product-title} clusters, network usage is not monitored, and is billed directly by the cloud provider.
4444

4545
[id="cluster-ingress_{context}"]
4646
== Cluster ingress
@@ -79,7 +79,7 @@ $ oc run ip-lookup --image=busybox -i -t --restart=Never --rm -- /bin/sh -c "/bi
7979

8080
[IMPORTANT]
8181
====
82-
Red Hat SREs do not monitor private network connections. Monitoring these connections is the responsibility of the customer.
82+
Red{nbsp}Hat SREs do not monitor private network connections. Monitoring these connections is the responsibility of the customer.
8383
====
8484

8585
[id="dns-forwarding_{context}"]

modules/sdpolicy-storage.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ EBS volumes used for persistent volumes (PVs) are encrypted-at-rest by default.
1616

1717
[id="block-storage_{context}"]
1818
== Block storage (RWO)
19-
Persistent volumes (PVs) are backed by AWS EBS and Google Cloud persistent disk block storage, which uses the ReadWriteOnce (RWO) access mode. On a standard {product-title} base cluster, 100 GB of block storage is provided for PVs, which is dynamically provisioned and recycled based on application requests. Additional persistent storage can be purchased in 500 GB increments.
19+
Persistent volumes (PVs) are backed by AWS EBS and Google Cloud persistent disk block storage, which uses the ReadWriteOnce (RWO) access mode. On a non-CCS {product-title} base cluster, 100 GB of block storage is provided for PVs, which is dynamically provisioned and recycled based on application requests. Additional persistent storage can be purchased in 500 GB increments.
2020

2121
PVs can only be attached to a single node at a time and are specific to the availability zone in which they were provisioned, but they can be attached to any node in the availability zone.
2222

@@ -25,4 +25,4 @@ Each cloud provider has its own limits for how many PVs can be attached to a sin
2525
[id="shared-storage_{context}"]
2626
== Shared storage (RWX)
2727

28-
The AWS CSI Driver can be used to provide RWX support for {product-title} on AWS. A community Operator is provided to simplify setup. See link:https://access.redhat.com/articles/5025181[AWS EFS Setup for OpenShift Dedicated and Red Hat OpenShift Service on AWS] for details.
28+
The AWS CSI Driver can be used to provide RWX support for {product-title} on AWS. A community Operator is provided to simplify setup. For more information, see link:https://access.redhat.com/articles/5025181[AWS EFS Setup for OpenShift Dedicated and Red Hat OpenShift Service on AWS].

0 commit comments

Comments
 (0)