You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/cluster-cloud-controller-manager-operator.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,9 +46,9 @@ The status of this Operator is General Availability for {aws-first}, {gcp-first}
46
46
The Operator is available as a link:https://access.redhat.com/support/offerings/techpreview[Technology Preview] for {ibm-power-server-name}.
47
47
====
48
48
49
-
The Cloud Controller Manager Operator manages and updates the cloud controller managers deployed on top of {product-title}. The Operator is based on the Kubebuilder framework and `controller-runtime` libraries. It is installed via the Cluster Version Operator (CVO).
49
+
The Cloud Controller Manager Operator manages and updates the cloud controller managers deployed on top of {product-title}. The Operator is based on the Kubebuilder framework and `controller-runtime` libraries. You can install the Cloud Controller Manager Operator by using the Cluster Version Operator (CVO).
50
50
51
-
It contains the following components:
51
+
The Cloud Controller Manager Operator includes the following components:
Copy file name to clipboardExpand all lines: modules/configuration-externalip.adoc
+12-3Lines changed: 12 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,9 @@
6
6
[id="configuration-externalip_{context}"]
7
7
= Configuration for ExternalIP
8
8
9
-
Use of an external IP address in {product-title} is governed by the following parameters in the `Network.config.openshift.io` custom resource (CR) that is named `cluster`:
9
+
The following parameters in the `Network.config.openshift.io` custom resource (CR) govern the use of an external IP address in {product-title}:
10
10
11
-
* `spec.externalIP.autoAssignCIDRs` defines an IP address block used by the load balancer when choosing an external IP address for the service. {product-title} supports only a single IP address block for automatic assignment. This configuration requires less steps than manually assigning ExternalIPs to services, which requires managing the port space of a limited number of shared IP addresses. If you enable automatic assignment, a `Service` object with `spec.type=LoadBalancer`is allocated an external IP address.
11
+
* `spec.externalIP.autoAssignCIDRs` defines an IP address block used by the load balancer when choosing an external IP address for the service. {product-title} supports only a single IP address block for automatic assignment. This configuration requires less steps than manually assigning ExternalIPs to services, which requires managing the port space of a limited number of shared IP addresses. If you enable automatic assignment, the Cloud Controller Manager Operator allocates an external IP address to a `Service` object with `spec.type=LoadBalancer`defind in its configuration.
12
12
13
13
* `spec.externalIP.policy` defines the permissible IP address blocks when manually specifying an IP address. {product-title} does not apply policy rules to IP address blocks that you defined in the `spec.externalIP.autoAssignCIDRs` parameter.
14
14
@@ -19,7 +19,7 @@ If routed correctly, external traffic from the configured external IP address bl
19
19
As a cluster administrator, you must configure routing to externalIPs. You must also ensure that the IP address block you assign terminates at one or more nodes in your cluster. For more information, see link:https://kubernetes.io/docs/concepts/services-networking/service/#external-ips[Kubernetes External IPs].
20
20
====
21
21
22
-
{product-title} supports both the automatic and manual assignment of IP addresses, where each address is guaranteed to be assigned to a maximum of one service. This configuration ensures that each service can expose its chosen ports regardless of the ports exposed by other services.
22
+
{product-title} supports both automatic and manual IP address assignment. This support guarantees that each address gets assigned to a maximum of one service and that each service can expose its chosen ports regardless of the ports exposed by other services.
23
23
24
24
[NOTE]
25
25
====
@@ -56,3 +56,12 @@ status:
56
56
- ip: 192.168.132.253
57
57
# ...
58
58
----
59
+
60
+
If you run a private cluster on a cloud-provider platform, you can change the publishing scope to `internal` for the load balancer of the Ingress Controller by running the following `patch` command:
Copy file name to clipboardExpand all lines: modules/installation-initializing-manual.adoc
+13-20Lines changed: 13 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ ifdef::aws-china,aws-secret[]
99
99
* You have uploaded a custom RHCOS AMI.
100
100
endif::aws-china,aws-secret[]
101
101
ifndef::ibm-cloud-restricted[]
102
-
* You have an SSH public key on your local machine to provide to the installation program. The key will be used for SSH authentication onto your cluster nodes for debugging and disaster recovery.
102
+
* You have an SSH public key on your local machine for use with the installation program. You can use the key for SSH authentication onto your cluster nodes for debugging and disaster recovery.
103
103
endif::ibm-cloud-restricted[]
104
104
* You have obtained the {product-title} installation program and the pull secret for your
You must create a directory. Some installation assets, like bootstrap X.509
128
-
certificates have short expiration intervals, so you must not reuse an
129
-
installation directory. If you want to reuse individual files from another
130
-
cluster installation, you can copy them into your directory. However, the file
131
-
names for the installation assets might change between releases. Use caution
132
-
when copying installation files from an earlier {product-title} version.
127
+
You must create a directory. Some installation assets, such as bootstrap X.509 certificates have short expiration intervals, so you must not reuse an installation directory. If you want to reuse individual files from another cluster installation, you can copy them into your directory. However, the file names for the installation assets might change between releases. Use caution when copying installation files from an earlier {product-title} version.
133
128
====
134
129
135
-
. Customize the sample `install-config.yaml` file template that is provided and save
136
-
it in the `<installation_directory>`.
130
+
. Customize the provided sample `install-config.yaml` file template and save the file in the `<installation_directory>`.
137
131
ifdef::ibm-cloud-restricted[]
138
132
+
139
133
[NOTE]
@@ -142,18 +136,16 @@ You must name this configuration file `install-config.yaml`.
142
136
====
143
137
+
144
138
When customizing the sample template, be sure to provide the information that is required for an installation in a restricted network:
145
-
139
+
+
146
140
.. Update the `pullSecret` value to contain the authentication information for your registry:
For `<mirror_host_name>`, specify the registry domain name
154
-
that you specified in the certificate for your mirror registry, and for
155
-
`<credentials>`, specify the base64-encoded user name and password for
156
-
your mirror registry.
147
+
For `<mirror_host_name>`, specify the registry domain name that you specified in the certificate for your mirror registry, and for `<credentials>`, specify the base64-encoded user name and password for your mirror registry.
148
+
+
157
149
.. Add the `additionalTrustBundle` parameter and value.
158
150
+
159
151
[source,yaml]
@@ -165,6 +157,7 @@ additionalTrustBundle: |
165
157
----
166
158
+
167
159
The value must be the contents of the certificate file that you used for your mirror registry. The certificate file can be an existing, trusted certificate authority, or the self-signed certificate that you generated for the mirror registry.
160
+
+
168
161
.. Define the network and subnets for the VPC to install the cluster in under the parent `platform.ibmcloud` field:
For `platform.ibmcloud.vpcName`, specify the name for the existing {ibm-cloud-title} Virtual Private Cloud (VPC) network. For `platform.ibmcloud.controlPlaneSubnets` and `platform.ibmcloud.computeSubnets`, specify the existing subnets to deploy the control plane machines and compute machines, respectively.
171
+
+
178
172
.. Add the image content resources, which resemble the following YAML excerpt:
179
173
+
180
174
[source,yaml]
@@ -189,6 +183,7 @@ imageContentSources:
189
183
----
190
184
+
191
185
For these values, use the `imageContentSourcePolicy.yaml` file that was created when you mirrored the registry.
186
+
+
192
187
.. If network restrictions limit the use of public endpoints to access the required {ibm-cloud-name} services, add the `serviceEndpoints` stanza to `platform.ibmcloud` to specify an alternate service endpoint.
193
188
+
194
189
[NOTE]
@@ -219,6 +214,7 @@ serviceEndpoints:
219
214
url: <global_tagging_alternate_endpoint_url>
220
215
# ...
221
216
----
217
+
+
222
218
.. Optional: Set the publishing strategy to `Internal`:
** Unless you use a registry that {op-system} trusts by default, such as
248
-
`docker.io`, you must provide the contents of the certificate for your mirror
249
-
repository in the `additionalTrustBundle` section. In most cases, you must
250
-
provide the certificate for your mirror.
243
+
** Unless you use a registry that {op-system} trusts by default, such as `docker.io`, you must provide the contents of the certificate for your mirror repository in the `additionalTrustBundle` section. In most cases, you must provide the certificate for your mirror.
251
244
** You must include the `imageContentSources` section from the output of the command to
. If you are installing a three-node cluster, modify the `install-config.yaml` file by setting the `compute.replicas` parameter to `0`. This ensures that the cluster's control planes are schedulable. For more information, see "Installing a three-node cluster on {platform}".
316
309
endif::vsphere-upi-vsphere[]
317
310
318
-
. Back up the `install-config.yaml` file so that you can use it to install multiple clusters.
311
+
. Back up the `install-config.yaml` file so that you can use it to install many clusters.
319
312
+
320
313
[IMPORTANT]
321
314
====
322
-
The `install-config.yaml` file is consumed during the next step of the installation process. You must back it up now.
315
+
Back up the `install-config.yaml` file now, because the installation process consumes the file in the next step.
0 commit comments