Skip to content

Commit 9a98e85

Browse files
committed
adding in a note for VPC in prep your environ and installing clusters for all repos
adding in a note for VPC in prep your environ and installing clusters adding in a note for VPC in prep your environ and installing cluster for ods gcp line160 adding in a note for VPC in prep your environ and installing cluster for osd gcp line128 adding in a note for VPC in prep your environ and installing cluster for osd gcp adding in a note for VPC in prep your environ and installing cluster for osd adding in a note for VPC in prep your environ and installing cluster adding in a note for VPC in prep your environ and installing cluster adding in a note for VPC for OSD adding in a note for VPC adding in a note adding in a notes adding in a note fixing numbering after using snippet removed snippet from rhm module as out of use
1 parent 419fa45 commit 9a98e85

12 files changed

+56
-7
lines changed

modules/ccs-aws-provisioned.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,13 +63,15 @@ Two buckets are required with a typical size of 2 TB each.
6363
== VPC
6464
Customers should expect to see one VPC per cluster. Additionally, the VPC needs the following configurations:
6565

66+
include::snippets/install-cluster-in-vpc.adoc[]
67+
6668
* *Subnets*: Two subnets for a cluster with a single availability zone, or six subnets for a cluster with multiple availability zones.
6769
+
6870
[NOTE]
6971
====
7072
A *public subnet* connects directly to the internet through an internet gateway. A *private subnet* connects to the internet through a network address translation (NAT) gateway.
7173
====
72-
+
74+
+
7375
* *Route tables*: One route table per private subnet, and one additional table per cluster.
7476

7577
* *Internet gateways*: One Internet Gateway per cluster.

modules/ccs-gcp-provisioned.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ GCP compute instances are required to deploy the control plane and data plane fu
3636
[id="gcp-policy-vpc_{context}"]
3737
== VPC
3838

39+
include::snippets/install-cluster-in-vpc.adoc[]
40+
3941
* **Subnets:** One master subnet for the control plane workloads and one worker subnet for all others.
4042
* **Router tables:** One global route table per VPC.
4143
* **Internet gateways:** One internet gateway per cluster.

modules/create-wif-cluster-ocm.adoc

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,9 @@ For more information about custom application ingress settings, click on the inf
145145

146146
. Optional: To install the cluster into a GCP Shared VPC, follow these steps.
147147
+
148+
--
149+
include::snippets/install-cluster-in-vpc.adoc[]
150+
148151
[IMPORTANT]
149152
====
150153
The VPC owner of the host project must enable a project as a host project in their Google Cloud console and add the *Computer Network Administrator*, *Compute Security Administrator*, and *DNS Administrator* roles to the following service accounts prior to cluster installation:
@@ -157,7 +160,7 @@ Failure to do so will cause the cluster go into the "Installation Waiting" state
157160
The VPC owner of the host project has 30 days to grant the listed permissions before the cluster creation fails.
158161
For more information, see link:https://cloud.google.com/vpc/docs/provisioning-shared-vpc#set-up-shared-vpc[Enable a host project] and link:https://cloud.google.com/vpc/docs/provisioning-shared-vpc#migs-service-accounts[Provision Shared VPC].
159162
====
160-
+
163+
161164
.. Select *Install into GCP Shared VPC*.
162165
.. Specify the *Host project ID*. If the specified host project ID is incorrect, cluster creation fails.
163166

@@ -169,7 +172,7 @@ You must have created the Cloud network address translation (NAT) and a Cloud ro
169172
====
170173
If you are installing a cluster into a Shared VPC, the VPC name and subnets are shared from the host project.
171174
====
172-
+
175+
--
173176
. Click *Next*.
174177
. If you opted to configure a cluster-wide proxy, provide your proxy configuration details on the *Cluster-wide proxy* page:
175178
+

modules/osd-create-cluster-ccs-aws.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,10 @@ If you are using private API endpoints, you cannot access your cluster until you
134134
====
135135
+
136136
. Optional: To install the cluster in an existing AWS Virtual Private Cloud (VPC):
137+
+
138+
--
139+
include::snippets/install-cluster-in-vpc.adoc[]
140+
137141
.. Select *Install into an existing VPC*.
138142
.. If you are installing into an existing VPC and opted to use private API endpoints, you can select *Use a PrivateLink*. This option enables connections to the cluster by Red Hat Site Reliability Engineering (SRE) using only AWS PrivateLink endpoints.
139143
+
@@ -143,6 +147,7 @@ The *Use a PrivateLink* option cannot be changed after a cluster is created.
143147
====
144148
+
145149
.. If you are installing into an existing VPC and you want to enable an HTTP or HTTPS proxy for your cluster, select *Configure a cluster-wide proxy*.
150+
--
146151
. If you opted to install the cluster in an existing AWS VPC, provide your *Virtual Private Cloud (VPC) subnet settings* and select *Next*.
147152
You must have created the Cloud network address translation (NAT) and a Cloud router. See the "Additional resources" section for information about Cloud NATs and Google VPCs.
148153
+

modules/osd-create-cluster-ccs-gcp.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
// Module included in the following assemblies:
22
//
33
// * osd_install_access_delete_cluster/creating-a-gcp-cluster.adoc
4+
// * I do not believe this is in use, confirm with Mark Letalien.
45

56

67

@@ -157,11 +158,12 @@ Private Service Connect is supported only with *Install into an existing VPC*.
157158
+
158159
.. If you are installing into an existing VPC and you want to enable an HTTP or HTTPS proxy for your cluster, select *Configure a cluster-wide proxy*.
159160
+
161+
160162
[IMPORTANT]
161163
====
162164
In order to configure a cluster-wide proxy for your cluster, you must first create the Cloud network address translation (NAT) and a Cloud router. See the _Additional resources_ section for more information.
163165
====
164-
+
166+
165167
. Accept the default application ingress settings, or to create your own custom settings, select *Custom Settings*.
166168

167169
.. Optional: Provide route selector.
@@ -171,7 +173,6 @@ In order to configure a cluster-wide proxy for your cluster, you must first crea
171173
+
172174
For more information about custom application ingress settings, click on the information icon provided for each setting.
173175

174-
+
175176
. Click *Next*.
176177

177178
. Optional: To install the cluster into a GCP Shared VPC:

modules/osd-create-cluster-ccs.adoc

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,10 @@ If you are using private API endpoints, you cannot access your cluster until you
153153
+
154154

155155
. Optional: To install the cluster in an existing GCP Virtual Private Cloud (VPC):
156+
+
157+
--
158+
include::snippets/install-cluster-in-vpc.adoc[]
159+
156160
.. Select *Install into an existing VPC*.
157161
+
158162
[IMPORTANT]
@@ -166,7 +170,7 @@ Private Service Connect is supported only with *Install into an existing VPC*.
166170
====
167171
In order to configure a cluster-wide proxy for your cluster, you must first create the Cloud network address translation (NAT) and a Cloud router. See the _Additional resources_ section for more information.
168172
====
169-
+
173+
--
170174
. Accept the default application ingress settings, or to create your own custom settings, select *Custom Settings*.
171175

172176
.. Optional: Provide route selector.
@@ -265,7 +269,6 @@ By default, clusters are created with the delete protection feature disabled.
265269
If you delete a cluster that was installed into a GCP Shared VPC, inform the VPC owner of the host project to remove the IAM policy roles granted to the service account that was referenced during cluster creation.
266270
====
267271

268-
269272
.Verification
270273

271274
* You can monitor the progress of the installation in the *Overview* page for your cluster. You can view the installation logs on the same page. Your cluster is ready when the *Status* in the *Details* section of the page is listed as *Ready*.

modules/osd-create-cluster-gcp-account.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,7 @@ Red Hat recommends using Private Service Connect when deploying a private {produ
124124
//Once PSC docs are live add link from note above.
125125
+
126126
. Optional: To install the cluster in an existing GCP Virtual Private Cloud (VPC):
127+
127128
.. Select *Install into an existing VPC*.
128129
+
129130
[IMPORTANT]

modules/osd-create-cluster-rhm-gcp-account.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,7 @@ Red Hat recommends using Private Service Connect when deploying a private {produ
124124
//Once PSC docs are live add link from note above.
125125
+
126126
. Optional: To install the cluster in an existing GCP Virtual Private Cloud (VPC):
127+
127128
.. Select *Install into an existing VPC*.
128129
+
129130
[IMPORTANT]

rosa_hcp/rosa-hcp-shared-vpc-config.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ toc::[]
88

99
You can create {hcp-title-first} clusters in shared, centrally-managed AWS virtual private clouds (VPCs).
1010

11+
include::snippets/install-cluster-in-vpc.adoc[]
12+
1113
[NOTE]
1214
====
1315
* This process requires *two separate* AWS accounts that belong to the same AWS organization. One account functions as the VPC-owning AWS account (*VPC Owner*), while the other account creates the cluster in the cluster-creating AWS account (*Cluster Creator*).

rosa_install_access_delete_clusters/rosa-shared-vpc-config.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ ifdef::openshift-rosa[]
1111
endif::openshift-rosa[]
1212
clusters in shared, centrally-managed AWS virtual private clouds (VPCs).
1313

14+
include::snippets/install-cluster-in-vpc.adoc[]
15+
1416
[NOTE]
1517
====
1618
This process requires *two separate* AWS accounts that belong to the same AWS organization. One account functions as the VPC-owning AWS account (*VPC Owner*), while the other account creates the cluster in the cluster-creating AWS account (*Cluster Creator*).

0 commit comments

Comments
 (0)