Skip to content

Commit d523451

Browse files
committed
OSDOCS-14094: Applied changes to Preparing your Environment
1 parent ed42879 commit d523451

12 files changed

+155
-51
lines changed

modules/mos-network-prereqs-min-bandwidth.adoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,13 @@
77
[id="mos-network-prereqs-min-bandwidth_{context}"]
88
= Minimum bandwidth
99

10-
During cluster deployment, {product-title} requires a minimum bandwidth of 120{nbsp}Mbps between cluster infrastructure and the public internet or private network locations that provide deployment artifacts and resources. When network connectivity is slower than 120{nbsp}Mbps (for example, when connecting through a proxy) the cluster installation process times out and deployment fails.
10+
During cluster deployment,
11+
ifdef::openshift-rosa[]
12+
{rosa-classic-short}
13+
endif::openshift-rosa[]
14+
ifdef::openshift-rosa-hcp[]
15+
{rosa-short}
16+
endif::openshift-rosa-hcp[]
17+
requires a minimum bandwidth of 120{nbsp}Mbps between cluster infrastructure and the public internet or private network locations that provide deployment artifacts and resources. When network connectivity is slower than 120{nbsp}Mbps (for example, when connecting through a proxy) the cluster installation process times out and deployment fails.
1118

1219
After cluster deployment, network requirements are determined by your workload. However, a minimum bandwidth of 120{nbsp}Mbps helps to ensure timely cluster and operator upgrades.

modules/rosa-aws-provisioned.adoc

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,14 @@
66
[id="rosa-aws-policy-provisioned_{context}"]
77
= Provisioned AWS Infrastructure
88

9-
This is an overview of the provisioned {AWS} components on a deployed {product-title} (ROSA) cluster.
9+
This is an overview of the provisioned {AWS} components on a deployed
10+
ifdef::openshift-rosa[]
11+
{rosa-classic-short}
12+
endif::openshift-rosa[]
13+
ifdef::openshift-rosa-hcp[]
14+
{rosa-short}
15+
endif::openshift-rosa[]
16+
cluster.
1017

1118
[id="rosa-ec2-instances_{context}"]
1219
== EC2 instances
@@ -15,7 +22,13 @@ AWS EC2 instances are required to deploy
1522
ifndef::openshift-rosa-hcp[]
1623
the control plane and data plane functions for
1724
endif::openshift-rosa-hcp[]
18-
{product-title}.
25+
ifdef::openshift-rosa[]
26+
{rosa-classic-short}
27+
endif::openshift-rosa[]
28+
ifdef::openshift-rosa-hcp[]
29+
{rosa-short}
30+
endif::openshift-rosa[]
31+
.
1932

2033
ifndef::openshift-rosa-hcp[]
2134
Instance types can vary for control plane and infrastructure nodes, depending on the worker node count.
@@ -201,4 +214,11 @@ can add additional custom security groups during cluster creation. Custom securi
201214

202215
* You must create the custom security groups in AWS before you create the cluster. For more information, see link:https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html[Amazon EC2 security groups for Linux instances].
203216
* You must associate the custom security groups with the VPC that the cluster will be installed into. Your custom security groups cannot be associated with another VPC.
204-
* You might need to request additional quota for your VPC if you are adding additional custom security groups. For information on AWS quota requirements for ROSA, see _Required AWS service quotas_ in _Prepare your environment_. For information on requesting an AWS quota increase, see link:https://docs.aws.amazon.com/servicequotas/latest/userguide/request-quota-increase.html[Requesting a quota increase].
217+
* You might need to request additional quota for your VPC if you are adding additional custom security groups. For information on AWS quota requirements for
218+
ifdef::openshift-rosa[]
219+
{rosa-classic-short},
220+
endif::openshift-rosa[]
221+
ifdef::openshift-rosa-hcp[]
222+
{rosa-short},
223+
endif::openshift-rosa[]
224+
see _Required AWS service quotas_ in _Prepare your environment_. For information on requesting an AWS quota increase, see link:https://docs.aws.amazon.com/servicequotas/latest/userguide/request-quota-increase.html[Requesting a quota increase].

modules/rosa-hcp-firewall-prerequisites.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
[id="rosa-hcp-firewall-prerequisites_{context}"]
99
= Firewall prerequisites for {hcp-title}
1010

11-
* If you are using a firewall to control egress traffic from {hcp-title-first}, your Virtual Private Cloud (VPC) must be able to complete requests from the cluster to the Amazon S3 service, for example, via an Amazon S3 gateway.
11+
* If you are using a firewall to control egress traffic from {rosa-title}, your Virtual Private Cloud (VPC) must be able to complete requests from the cluster to the Amazon S3 service, for example, via an Amazon S3 gateway.
1212

1313
* You must also configure your firewall to grant access to the following domain and port combinations.
1414
//TODO OSDOCS-11789: From your deploy machine? From your cluster?

modules/rosa-requirements-deploying-in-opt-in-regions.adoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,14 @@
55
[id="rosa-requirements-deploying-in-opt-in-regions_{context}"]
66
= Requirements for deploying a cluster in an opt-in region
77

8-
An AWS opt-in region is a region that is not enabled in your AWS account by default. If you want to deploy a {product-title} (ROSA) cluster that uses the AWS Security Token Service (STS) in an opt-in region, you must meet the following requirements:
8+
An AWS opt-in region is a region that is not enabled in your AWS account by default. If you want to deploy a
9+
ifdef::openshift-rosa[]
10+
{rosa-classic-short}
11+
endif::openshift-rosa[]
12+
ifdef::openshift-rosa-hcp[]
13+
{rosa-short}
14+
endif::openshift-rosa[]
15+
cluster that uses the AWS Security Token Service (STS) in an opt-in region, you must meet the following requirements:
916

1017
* The region must be enabled in your AWS account. For more information about enabling opt-in regions, see link:https://docs.aws.amazon.com/general/latest/gr/rande-manage.html[Managing AWS Regions] in the AWS documentation.
1118
* The security token version in your AWS account must be set to version 2. You cannot use version 1 security tokens for opt-in regions.

modules/rosa-setting-the-aws-security-token-version.adoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,14 @@
66
[id="rosa-setting-the-aws-security-token-version_{context}"]
77
= Setting the AWS security token version
88

9-
If you want to create a {product-title} (ROSA) cluster with the AWS Security Token Service (STS) in an AWS opt-in region, you must set the security token version to version 2 in your AWS account.
9+
If you want to create a
10+
ifdef::openshift-rosa[]
11+
{rosa-classic-short}
12+
endif::openshift-rosa[]
13+
ifdef::openshift-rosa-hcp[]
14+
{rosa-short}
15+
endif::openshift-rosa[]
16+
cluster with the AWS Security Token Service (STS) in an AWS opt-in region, you must set the security token version to version 2 in your AWS account.
1017

1118
.Prerequisites
1219

modules/rosa-sts-associating-your-aws-account.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -21,13 +21,13 @@ ifeval::["{context}" == "rosa-sts-creating-a-cluster-quickly"]
2121
endif::[]
2222

2323
Before using {cluster-manager-first} on the {hybrid-console-url} to create
24-
ifdef::rosa-hcp[]
25-
{hcp-title} clusters
26-
endif::rosa-hcp[]
27-
ifndef::rosa-hcp[]
28-
{product-title} (ROSA) clusters
29-
endif::rosa-hcp[]
30-
that use the AWS Security Token Service (STS), create an {cluster-manager} IAM role and link it to your Red{nbsp}Hat organization. Then, create a user IAM role and link it to your Red{nbsp}Hat user account in the same Red{nbsp}Hat organization.
24+
ifdef::openshift-rosa[]
25+
{rosa-classic-short}
26+
endif::openshift-rosa[]
27+
ifdef::openshift-rosa-hcp[]
28+
{rosa-short}
29+
endif::openshift-rosa[]
30+
clusters that use the AWS Security Token Service (STS), create an {cluster-manager} IAM role and link it to your Red{nbsp}Hat organization. Then, create a user IAM role and link it to your Red{nbsp}Hat user account in the same Red{nbsp}Hat organization.
3131

3232
ifdef::quick-install[]
3333
.Prerequisites

modules/rosa-sts-aws-requirements-association-concept.adoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,13 @@
66
[id="rosa-associating-concept_{context}"]
77
= AWS account association
88

9-
When you provision {product-title} (ROSA) using {cluster-manager} (`console.redhat.com`), you must associate the `ocm-role` and `user-role` IAM roles with your AWS account using your Amazon Resource Name (ARN). This association process is also known as _account linking_.
9+
When you provision
10+
ifdef::openshift-rosa[]
11+
{rosa-classic-short}
12+
endif::openshift-rosa[]
13+
ifdef::openshift-rosa-hcp[]
14+
{rosa-short}
15+
endif::openshift-rosa[]
16+
using {cluster-manager} (`console.redhat.com`), you must associate the `ocm-role` and `user-role` IAM roles with your AWS account using your Amazon Resource Name (ARN). This association process is also known as _account linking_.
1017

1118
The `ocm-role` ARN is stored as a label in your Red{nbsp}Hat organization while the `user-role` ARN is stored as a label inside your Red{nbsp}Hat user account. Red{nbsp}Hat uses these ARN labels to confirm that the user is a valid account holder and that the correct permissions are available to perform provisioning tasks in the AWS account.

modules/rosa-sts-aws-requirements-creating-multi-association.adoc

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,14 @@
77
[id="rosa-associating-multiple-account_{context}"]
88
= Associating multiple AWS accounts with your Red{nbsp}Hat organization
99

10-
You can associate multiple AWS accounts with your Red{nbsp}Hat organization. Associating multiple accounts lets you create {product-title} (ROSA) clusters on any of the associated AWS accounts from your Red{nbsp}Hat organization.
10+
You can associate multiple AWS accounts with your Red{nbsp}Hat organization. Associating multiple accounts lets you create
11+
ifdef::openshift-rosa[]
12+
{rosa-classic-short}
13+
endif::openshift-rosa[]
14+
ifdef::openshift-rosa-hcp[]
15+
{rosa-short}
16+
endif::openshift-rosa[]
17+
clusters on any of the associated AWS accounts from your Red{nbsp}Hat organization.
1118

1219
With this capability, you can create clusters on different AWS profiles according to characteristics that make sense for your business, for example, by using one AWS profile for each region to create region-bound environments.
1320

@@ -17,7 +24,13 @@ With this capability, you can create clusters on different AWS profiles accordin
1724
* You are using {cluster-manager-url} to create clusters.
1825
* You have the permissions required to install AWS account-wide roles.
1926
* You have installed and configured the latest AWS (`aws`) and ROSA (`rosa`) CLIs on your installation host.
20-
* You have created the `ocm-role` and `user-role` IAM roles for ROSA.
27+
* You have created the `ocm-role` and `user-role` IAM roles for
28+
ifdef::openshift-rosa[]
29+
{rosa-classic-short}.
30+
endif::openshift-rosa[]
31+
ifdef::openshift-rosa-hcp[]
32+
{rosa-short}.
33+
endif::openshift-rosa[]
2134
2235
.Procedure
2336

modules/rosa-sts-aws-requirements-security-req.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,7 @@
77
= Security requirements
88
//TODO OSDOCS-11789: Red Hat as in RHSRE? Red Hat as in RH services in the cluster?
99
* Red{nbsp}Hat must have ingress access to EC2 hosts and the API server from allow-listed IP addresses.
10-
* Red{nbsp}Hat must have egress allowed to the domains documented in the "Firewall prerequisites" section. Clusters with {zero-egress} are exempt from this requirement.
10+
* Red{nbsp}Hat must have egress allowed to the domains documented in the "Firewall prerequisites" section.
11+
ifdef::openshift-rosa-hcp[]
12+
Clusters with {egress-zero} are exempt from this requirement.
13+
endif::openshift-rosa-hcp[]

modules/rosa-sts-aws-requirements-support-req.adoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,11 @@
77
* Red{nbsp}Hat recommends that the customer have at least link:https://aws.amazon.com/premiumsupport/plans/[Business Support] from AWS.
88
* Red{nbsp}Hat may have permission from the customer to request AWS support on their behalf.
99
* Red{nbsp}Hat may have permission from the customer to request AWS resource limit increases on the customer's account.
10-
* Red{nbsp}Hat manages the restrictions, limitations, expectations, and defaults for all {product-title} clusters in the same manner, unless otherwise specified in this requirements section.
10+
* Red{nbsp}Hat manages the restrictions, limitations, expectations, and defaults for all
11+
ifdef::openshift-rosa[]
12+
{rosa-classic-short}
13+
endif::openshift-rosa[]
14+
ifdef::openshift-rosa-hcp[]
15+
{rosa-short}
16+
endif::openshift-rosa-hcp[]
17+
clusters in the same manner, unless otherwise specified in this requirements section.

0 commit comments

Comments
 (0)