You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/rosa-sts-creating-a-cluster-using-defaults-ocm.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ If your AWS account ID is not listed, check that you have successfully associate
43
43
44
44
. Click *Next*.
45
45
46
-
. On the *Cluster details* page, enter a *Cluster name*. Leave the default values in the remaining fields and click *Next*.
46
+
. On the *Cluster details* page, provide a name for your cluster in the *Cluster name* field. Leave the default values in the remaining fields and click *Next*.
Copy file name to clipboardExpand all lines: modules/rosa-sts-creating-a-cluster-with-customizations-ocm.adoc
+18-18Lines changed: 18 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -203,22 +203,11 @@ To customize the subdomain, select the *Create custom domain prefix* checkbox, a
203
203
.. Select a cloud provider region from the *Region* drop-down menu.
204
204
.. Select a *Single zone* or *Multi-zone* configuration.
205
205
.. Leave *Enable user workload monitoring* selected to monitor your own projects in isolation from Red{nbsp}Hat Site Reliability Engineer (SRE) platform metrics. This option is enabled by default.
206
-
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
207
-
+
208
-
[NOTE]
209
-
====
210
-
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
211
-
====
212
-
.. Optional: Select *Encrypt persistent volumes with customer keys* if you want to provide your own AWS Key Management Service (KMS) key Amazon Resource Name (ARN). The key is used for encryption of persistent volumes in your cluster.
213
-
+
214
-
[IMPORTANT]
215
-
====
216
-
Only persistent volumes (PVs) created from the default storage class are encrypted by default.
217
-
218
-
PVs created by using any other storage class are only encrypted if the storage class is configured to be encrypted.
219
-
====
220
-
+
221
-
... Optional. To create a customer managed KMS key, follow the procedure for link:https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html#create-symmetric-cmk[Creating symmetric encryption KMS keys].
206
+
.. Optional: Expand *Advanced Encryption* to make changes to encryption settings.
207
+
... Accept the default setting *Use default KMS Keys* to use your default AWS KMS key, or select *Use Custom KMS keys* to use a custom KMS key.
208
+
.... With *Use Custom KMS keys* selected, enter the AWS Key Management Service (KMS) custom key Amazon Resource Name (ARN) ARN in the *Key ARN* field.
209
+
The key is used for encrypting all control plane, infrastructure, worker node root volumes, and persistent volumes in your cluster.
210
+
.... Optional: To create a customer managed KMS key, follow the procedure for link:https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html#create-symmetric-cmk[Creating symmetric encryption KMS keys].
222
211
+
223
212
[IMPORTANT]
224
213
====
@@ -233,7 +222,18 @@ For more information about the policies and permissions that the cluster Operato
233
222
234
223
After you create your Operator roles, you must edit the _Key Policy_ in the link:https://console.aws.amazon.com/kms[*Key Management Service (KMS)* page of the AWS Console] to add the roles.
235
224
====
236
-
225
+
... Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
226
+
+
227
+
[NOTE]
228
+
====
229
+
If *Enable FIPS cryptography* is selected, *Enable additional etcd encryption* is enabled by default and cannot be disabled. You can select *Enable additional etcd encryption* without selecting *Enable FIPS cryptography*.
230
+
====
231
+
... Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but the keys are not. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
232
+
+
233
+
[NOTE]
234
+
====
235
+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
236
+
====
237
237
.. Click *Next*.
238
238
239
239
. On the *Default machine pool* page, select a *Compute node instance type*.
@@ -382,7 +382,7 @@ You can review the end-of-life dates in the update life cycle documentation for
382
382
+
383
383
[NOTE]
384
384
====
385
-
In the event of critical security concerns that significantly impact the security or stability of a cluster, Red{nbsp}Hat Site Reliability Engineering (SRE) might schedule automatic updates to the latest z-stream version that is not impacted. The updates are applied within 48 hours after customer notifications are provided. For a description of the critical impact security rating, see link:https://access.redhat.com/security/updates/classification[Understanding Red{nbsp}Hat security ratings].
385
+
If there are critical security concerns that significantly impact the security or stability of a cluster, Red{nbsp}Hat Site Reliability Engineering (SRE) might schedule automatic updates to the latest z-stream version that is not impacted. The updates are applied within 48 hours after customer notifications are provided. For a description of the critical impact security rating, see link:https://access.redhat.com/security/updates/classification[Understanding Red{nbsp}Hat security ratings].
386
386
====
387
387
388
388
. Review the summary of your selections and click *Create cluster* to start the cluster installation.
0 commit comments