You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/private-service-connect-prereqs.adoc
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -19,15 +19,15 @@ In addition to the prerequisites that you need to complete before deploying any
19
19
The subnet mask for the PSC service attachment must be /29 or larger and must be dedicated to an individual {product-title} cluster. Additionally, the subnet must be contained within the Machine CIDR range used while provisioning the {product-title} cluster.
20
20
====
21
21
+
22
-
For information on how to create a VPC on {GCP}, see link:https://cloud.google.com/vpc/docs/create-modify-vpc-networks[Create and manage VPC networks] in the Google Cloud documentation.
22
+
For information about how to create a VPC on {GCP}, see link:https://cloud.google.com/vpc/docs/create-modify-vpc-networks[Create and manage VPC networks] in the Google Cloud documentation.
23
23
24
24
* Provide a path from the OpenShift Dedicated cluster to the internet for the domains and ports listed in the _GCP firewall prerequisites_ in the _Additional resources_ section.
25
25
26
26
* Enabled link:https://console.cloud.google.com/marketplace/product/google/iap.googleapis.com?q=search&referrer=search&hl=en&project=openshift-gce-devel[Cloud Identity-Aware Proxy API] at the {GCP} project level.
27
27
28
28
In addition to the requirements listed above, clusters configured with the **Service Account authentication type** must grant the `IAP-Secured Tunnel User` role to `osd-ccs-admin` service account.
29
29
30
-
For more information on the prerequisites that must be completed before deploying an {product-title} on {GCP}, see _Additional resources_.
30
+
For more information about the prerequisites that must be completed before deploying an {product-title} on {GCP}, see _Additional resources_.
31
31
32
32
// [id="prereqs-wif-authentication_{context}"]
33
33
// == Requirements when using Workload Identity Federation authentication type
Copy file name to clipboardExpand all lines: modules/wif-overview.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Operators also need access to cloud resources. By using WIF instead of service a
25
25
// * The external application calls Google Security Token Service to exchange the account credentials for a short-lived Google Cloud access token.
26
26
// * The token can then be used to impersonate a service account and access Google Cloud resources.
27
27
28
-
For more information about Workload Identity Federation, refer to the link:https://cloud.google.com/iam/docs/workload-identity-federation[Google Cloud Platform documentation].
28
+
For more information about Workload Identity Federation, see the link:https://cloud.google.com/iam/docs/workload-identity-federation[Google Cloud Platform documentation].
The following prerequisites must be completed prior to xref:../osd_install_access_delete_cluster/creating-a-gcp-cluster-with-workload-identity-federation.adoc#create-wif-cluster-ocm_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a Workload Identity Federation cluster using OpenShift Cluster Manager] and xref:../osd_install_access_delete_cluster/creating-a-gcp-cluster-with-workload-identity-federation.adoc#create-wif-cluster-cli_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a Workload Identity Federation cluster using the OCM CLI].
13
+
You must complete the following prerequisites before xref:../osd_install_access_delete_cluster/creating-a-gcp-cluster-with-workload-identity-federation.adoc#create-wif-cluster-ocm_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a Workload Identity Federation cluster using OpenShift Cluster Manager] and xref:../osd_install_access_delete_cluster/creating-a-gcp-cluster-with-workload-identity-federation.adoc#create-wif-cluster-cli_osd-creating-a-cluster-on-gcp-with-workload-identity-federation[Creating a Workload Identity Federation cluster using the OCM CLI].
14
14
15
15
16
16
* You have confirmed your Google Cloud account has the necessary resource quotas and limits to support your desired cluster size according to the cluster resource requirements.
17
-
17
+
+
18
18
[NOTE]
19
19
====
20
20
For more information regarding resource quotas and limits, see _Additional resources_.
21
21
====
22
22
23
-
* You reviewed the xref:../osd_architecture/osd-understanding.adoc#osd-understanding[introduction to {product-title}] and the documentation on xref:../architecture/index.adoc#architecture-overview[architecture concepts].
24
-
* You reviewed the xref:../osd_getting_started/osd-understanding-your-cloud-deployment-options.adoc#osd-understanding-your-cloud-deployment-options[{product-title} cloud deployment options].
23
+
* You have reviewed the xref:../osd_architecture/osd-understanding.adoc#osd-understanding[introduction to {product-title}] and the documentation on xref:../architecture/index.adoc#architecture-overview[architecture concepts].
24
+
* You have reviewed the xref:../osd_getting_started/osd-understanding-your-cloud-deployment-options.adoc#osd-understanding-your-cloud-deployment-options[{product-title} cloud deployment options].
25
25
26
26
* You have read and completed the xref:../osd_planning/gcp-ccs.adoc#ccs-gcp-customer-procedure_gcp-ccs[Required customer procedure].
27
27
28
+
[NOTE]
29
+
====
30
+
WIF supports the deployment of a private {product-title} on {GCP} cluster with Private Service Connect (PSC). Red Hat recommends using PSC when deploying private clusters.
31
+
For more information about the prerequisites for PSC, see xref:../osd_install_access_delete_cluster/creating-a-gcp-psc-enabled-private-cluster.adoc#private-service-connect-prereqs[Prerequisites for Private Service Connect].
* For information about {product-title} clusters using a Customer Cloud Subscription (CCS) model on {GCP}, see xref:../osd_planning/gcp-ccs.adoc#ccs-gcp-customer-requirements_gcp-ccs[Customer requirements].
34
40
* For information about resource quotas, xref:../applications/quotas/quotas-setting-per-project.adoc[Resource quotas per project].
35
41
* For information about limits, xref:../osd_planning/gcp-ccs.adoc#gcp-limits_gcp-ccs[GCP account limits].
36
-
* For information about required APIs, see xref:../osd_planning/gcp-ccs.adoc#ccs-gcp-customer-procedure_gcp-ccs[Required customer procedure].
42
+
* For information about required APIs, see xref:../osd_planning/gcp-ccs.adoc#ccs-gcp-customer-procedure_gcp-ccs[Required customer procedure].
37
43
* For information about managing workload identity pools, see link:https://cloud.google.com/iam/docs/manage-workload-identity-pools-providers[Manage workload identity pools and providers].
38
44
* For information about managing roles and permissions in your Google Cloud account, see link:https://cloud.google.com/iam/docs/roles-overview[Roles and permissions].
39
-
* For a list of the supported maximums, see xref:../osd_planning/osd-limits-scalability.adoc#tested-cluster-maximums-sd_osd-limits-scalability[Cluster maximums].
45
+
* For a list of the supported maximums, see xref:../osd_planning/osd-limits-scalability.adoc#tested-cluster-maximums-sd_osd-limits-scalability[Cluster maximums].
Copy file name to clipboardExpand all lines: osd_whats_new/osd-whats-new.adoc
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -21,14 +21,14 @@ With its foundation in Kubernetes, {product-title} is a complete {OCP} cluster p
21
21
* **Workload Identity Federation (WIF) authentication type is now available.** {product-title} on Google Cloud Platform (GCP) customers can now use WIF as an authentication type when creating a cluster. WIF is a GCP Identity and Access Management (IAM) feature that provides third parties a secure method to access resources on a customer's cloud account.
22
22
WIF is Google Cloud's preferred method for credential authentication.
23
23
+
24
-
For more information see
24
+
For more information, see
25
25
xref:../osd_install_access_delete_cluster/creating-a-gcp-cluster-with-workload-identity-federation.adoc[Creating a cluster on GCP with Workload Identity Federation].
26
26
27
27
* **Private Service Connect (PSC) networking feature is now available.** You can now create a private {product-title} cluster on Google Cloud Platform (GCP) using Google Cloud's security-enhanced networking feature Private Service Connect (PSC).
28
28
+
29
29
PSC is a capability of Google Cloud networking that enables private communication between services across different GCP projects or organizations. Implementing PSC as part of your network connectivity allows you to deploy OpenShift Dedicated clusters in a private and secured environment within GCP without using any public-facing cloud resources.
30
30
+
31
-
For more information see xref:../osd_install_access_delete_cluster/creating-a-gcp-psc-enabled-private-cluster.adoc[Creating a GCP Private Service Connect enabled private cluster].
31
+
For more information, see xref:../osd_install_access_delete_cluster/creating-a-gcp-psc-enabled-private-cluster.adoc[Creating a GCP Private Service Connect enabled private cluster].
0 commit comments