Skip to content

Commit 983b6e3

Browse files
authored
Merge pull request #79375 from mletalie/OSDOCS-11260
[OSDOCS-11260] "Enable FIPS cryptography" option
2 parents 4db029c + 8224e65 commit 983b6e3

File tree

4 files changed

+35
-14
lines changed

4 files changed

+35
-14
lines changed

modules/osd-create-cluster-ccs.adoc

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -168,17 +168,21 @@ With *Use Custom KMS keys* selected:
168168
... Select a key name from the *Key name* drop-down menu.
169169
... Provide the *KMS Service Account*.
170170
+
171+
172+
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
173+
+
174+
[NOTE]
175+
====
176+
If *Enable FIPS cryptography* is selected, *Enable additional etcd encryption* is enabled by default and cannot be disabled. You can select *Enable additional etcd encryption* without selecting *Enable FIPS cryptography*.
177+
====
171178
endif::osd-on-gcp[]
172-
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
179+
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but the keys are not. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
173180
+
174181
[NOTE]
175182
====
176183
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
177184
====
178185
+
179-
ifdef::osd-on-gcp[]
180-
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
181-
endif::osd-on-gcp[]
182186
ifdef::osd-on-aws[]
183187
.. Optional: Select *Encrypt persistent volumes with customer keys* if you want to provide your own
184188
AWS Key Management Service (KMS) key Amazon Resource Name (ARN).

modules/osd-create-cluster-gcp-account.adoc

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,15 +64,18 @@ With *Use Custom KMS keys* selected:
6464
... Provide the *KMS Service Account*.
6565

6666
+
67-
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption.
68-
With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
67+
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
6968
+
7069
[NOTE]
7170
====
72-
By enabling etcd encryption for the key values in etcd, you incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
71+
If *Enable FIPS cryptography* is selected, *Enable additional etcd encryption* is enabled by default and cannot be disabled. You can select *Enable additional etcd encryption* without selecting *Enable FIPS cryptography*.
7372
====
73+
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but the keys are not. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
7474
+
75-
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
75+
[NOTE]
76+
====
77+
By enabling etcd encryption for the key values in etcd, you incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
78+
====
7679
+
7780
. Click *Next*.
7881

modules/osd-create-cluster-red-hat-account.adoc

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ To customize the subdomain, select the *Create custom domain prefix* checkbox, a
6464
.. Select a cluster version from the *Version* drop-down menu.
6565
.. Select a cloud provider region from the *Region* drop-down menu.
6666
.. Select a *Single zone* or *Multi-zone* configuration.
67+
.. Select a *Persistent storage* capacity for the cluster. For more information, see the _Storage_ section in the {product-title} service definition.
68+
.. Specify the number of *Load balancers* that you require for your cluster. For more information, see the _Load balancers_ section in the {product-title} service definition.
6769
+
6870
ifdef::osd-on-gcp[]
6971
.. Optional: Select *Enable Secure Boot for Shielded VMs* to use Shielded VMs when installing your cluster. For more information, see link:https://cloud.google.com/security/products/shielded-vm[Shielded VMs].
@@ -74,15 +76,24 @@ To successfully create a cluster, you must select *Enable Secure Boot support fo
7476
====
7577
+
7678
endif::osd-on-gcp[]
77-
.. Select a *Persistent storage* capacity for the cluster. For more information, see the _Storage_ section in the {product-title} service definition.
78-
.. Specify the number of *Load balancers* that you require for your cluster. For more information, see the _Load balancers_ section in the {product-title} service definition.
7979
.. Leave *Enable user workload monitoring* selected to monitor your own projects in isolation from Red Hat Site Reliability Engineer (SRE) platform metrics. This option is enabled by default.
80+
ifdef::osd-on-gcp[]
81+
. Optional: Expand *Advanced Encryption* to make changes to encryption settings.
82+
+
83+
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
84+
+
85+
[NOTE]
86+
====
87+
If *Enable FIPS cryptography* is selected, *Enable additional etcd encryption* is enabled by default and cannot be disabled. You can select *Enable additional etcd encryption* without selecting *Enable FIPS cryptography*.
88+
====
89+
endif::osd-on-gcp[]
8090
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
8191
+
8292
[NOTE]
8393
====
8494
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
8595
====
96+
+
8697
.. Click *Next*.
8798

8899
. On the *Default machine pool* page, select a *Compute node instance type* and a *Compute node count*. The number and types of nodes that are available depend on your {product-title} subscription. If you are using multiple availability zones, the compute node count is per zone.

modules/osd-create-cluster-rhm-gcp-account.adoc

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,15 +64,18 @@ With *Use Custom KMS keys* selected:
6464
... Provide the *KMS Service Account*.
6565

6666
+
67-
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption.
68-
With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
67+
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
6968
+
7069
[NOTE]
7170
====
72-
By enabling etcd encryption for the key values in etcd, you incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
71+
If *Enable FIPS cryptography* is selected, *Enable additional etcd encryption* is enabled by default and cannot be disabled. You can select *Enable additional etcd encryption* without selecting *Enable FIPS cryptography*.
7372
====
73+
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
7474
+
75-
.. Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
75+
[NOTE]
76+
====
77+
By enabling etcd encryption for the key values in etcd, you incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
78+
====
7679
+
7780
. Click *Next*.
7881

0 commit comments

Comments
 (0)