Skip to content

Commit e9368ef

Browse files
authored
Merge pull request #82357 from AedinC/OSDOCS-12109
OSDOCS-12109:Added FIPS info for creating ROSA cluster using UI
2 parents 2f6aa05 + 80d94b0 commit e9368ef

File tree

2 files changed

+19
-19
lines changed

2 files changed

+19
-19
lines changed

modules/rosa-sts-creating-a-cluster-using-defaults-ocm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ If your AWS account ID is not listed, check that you have successfully associate
4343

4444
. Click *Next*.
4545

46-
. On the *Cluster details* page, enter a *Cluster name*. Leave the default values in the remaining fields and click *Next*.
46+
. On the *Cluster details* page, provide a name for your cluster in the *Cluster name* field. Leave the default values in the remaining fields and click *Next*.
4747
+
4848
[NOTE]
4949
====

modules/rosa-sts-creating-a-cluster-with-customizations-ocm.adoc

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -203,22 +203,11 @@ To customize the subdomain, select the *Create custom domain prefix* checkbox, a
203203
.. Select a cloud provider region from the *Region* drop-down menu.
204204
.. Select a *Single zone* or *Multi-zone* configuration.
205205
.. Leave *Enable user workload monitoring* selected to monitor your own projects in isolation from Red{nbsp}Hat Site Reliability Engineer (SRE) platform metrics. This option is enabled by default.
206-
.. Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but not the keys. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
207-
+
208-
[NOTE]
209-
====
210-
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
211-
====
212-
.. Optional: Select *Encrypt persistent volumes with customer keys* if you want to provide your own AWS Key Management Service (KMS) key Amazon Resource Name (ARN). The key is used for encryption of persistent volumes in your cluster.
213-
+
214-
[IMPORTANT]
215-
====
216-
Only persistent volumes (PVs) created from the default storage class are encrypted by default.
217-
218-
PVs created by using any other storage class are only encrypted if the storage class is configured to be encrypted.
219-
====
220-
+
221-
... Optional. To create a customer managed KMS key, follow the procedure for link:https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html#create-symmetric-cmk[Creating symmetric encryption KMS keys].
206+
.. Optional: Expand *Advanced Encryption* to make changes to encryption settings.
207+
... Accept the default setting *Use default KMS Keys* to use your default AWS KMS key, or select *Use Custom KMS keys* to use a custom KMS key.
208+
.... With *Use Custom KMS keys* selected, enter the AWS Key Management Service (KMS) custom key Amazon Resource Name (ARN) ARN in the *Key ARN* field.
209+
The key is used for encrypting all control plane, infrastructure, worker node root volumes, and persistent volumes in your cluster.
210+
.... Optional: To create a customer managed KMS key, follow the procedure for link:https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html#create-symmetric-cmk[Creating symmetric encryption KMS keys].
222211
+
223212
[IMPORTANT]
224213
====
@@ -233,7 +222,18 @@ For more information about the policies and permissions that the cluster Operato
233222

234223
After you create your Operator roles, you must edit the _Key Policy_ in the link:https://console.aws.amazon.com/kms[*Key Management Service (KMS)* page of the AWS Console] to add the roles.
235224
====
236-
225+
... Optional: Select *Enable FIPS cryptography* if you require your cluster to be FIPS validated.
226+
+
227+
[NOTE]
228+
====
229+
If *Enable FIPS cryptography* is selected, *Enable additional etcd encryption* is enabled by default and cannot be disabled. You can select *Enable additional etcd encryption* without selecting *Enable FIPS cryptography*.
230+
====
231+
... Optional: Select *Enable additional etcd encryption* if you require etcd key value encryption. With this option, the etcd key values are encrypted, but the keys are not. This option is in addition to the control plane storage encryption that encrypts the etcd volumes in {product-title} clusters by default.
232+
+
233+
[NOTE]
234+
====
235+
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Consider enabling etcd encryption only if you specifically require it for your use case.
236+
====
237237
.. Click *Next*.
238238

239239
. On the *Default machine pool* page, select a *Compute node instance type*.
@@ -382,7 +382,7 @@ You can review the end-of-life dates in the update life cycle documentation for
382382
+
383383
[NOTE]
384384
====
385-
In the event of critical security concerns that significantly impact the security or stability of a cluster, Red{nbsp}Hat Site Reliability Engineering (SRE) might schedule automatic updates to the latest z-stream version that is not impacted. The updates are applied within 48 hours after customer notifications are provided. For a description of the critical impact security rating, see link:https://access.redhat.com/security/updates/classification[Understanding Red{nbsp}Hat security ratings].
385+
If there are critical security concerns that significantly impact the security or stability of a cluster, Red{nbsp}Hat Site Reliability Engineering (SRE) might schedule automatic updates to the latest z-stream version that is not impacted. The updates are applied within 48 hours after customer notifications are provided. For a description of the critical impact security rating, see link:https://access.redhat.com/security/updates/classification[Understanding Red{nbsp}Hat security ratings].
386386
====
387387

388388
. Review the summary of your selections and click *Create cluster* to start the cluster installation.

0 commit comments

Comments
 (0)