-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
https://issues.redhat.com/browse/ACM-14417 Ver. Strategy doc #7222
Conversation
@oafischer can we also mention the strategy when creating/importing a cluster, if it is a ROSA-HCP cluster, should check if the 1.6.4 Cluster creation 1.6.5 Cluster import |
@elgnay please help take a review, thx! |
Co-authored-by: Jian Zhu <[email protected]>
Co-authored-by: Jian Zhu <[email protected]>
@zhujian7 We can add the pre-flight info but I'm not sure where a good spot for it would be. In our creating and import doc, we do not have anything related to ROSA. HCP content has also moved to OCP docs entirely in 2.12, so we don't have any HCP docs left in ACM docs where this could fit in either. When reading pre-flight info, it sounds like it applies to more than just ROSA HCP. Is that the case? |
If so, I think it's OK without the pre-flight info. @elgnay WDYT? |
@oafischer @zhujian7 I still think we need to add one more item to the prerequisites of cluster creation and cluster importing:
Since the default strategy 'UseAutoDetectedCABundle' may not work always, it necessary for the user to review the hub API server certificate verification strategy before they start creating or importing managed clusters. |
LGTM |
/lgtm |
Co-authored-by: Mikela Jackson <[email protected]>
Co-authored-by: Mikela Jackson <[email protected]>
Co-authored-by: Mikela Jackson <[email protected]>
Co-authored-by: Mikela Jackson <[email protected]>
Co-authored-by: Mikela Jackson <[email protected]>
See the examples in one of the following three strategies to learn how to manually configure a strategy: | ||
|
||
[#config-hub-strategy-auto-detect-ca] | ||
=== Configuring the strategy with `UseAutoDetectedCABundle` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here's an example of what I was talking about. Related comment: https://github.com/stolostron/rhacm-docs/pull/7222/files#r1844139775
The tricky part is adding callouts to describe the values in the YAML sample. We can probably still keep the examples, and the only line reduction would come from removing the anchors and titles
See the examples in one of the following three strategies to learn how to manually configure a strategy: | |
[#config-hub-strategy-auto-detect-ca] | |
=== Configuring the strategy with `UseAutoDetectedCABundle` | |
See the examples in one of the following three strategies to learn how to manually configure a strategy: | |
`UseAutoDetectedCABundle`:: The default configuration strategy is `UseAutoDetectedCABundle`. The {mce-short} automatically detects the certificate on the hub cluster and merges the certificate configured in the `trustedCABundles` list of config map references to the real CA bundles, if there are any. | |
`UseSystemTruststore`:: With `UseSystemTruststore`, {mce-short} does not detect any certificate and ignores the certificates configured in the `trustedCABundles` parameter section. This configuration does not pass any certificate to the managed clusters. Instead, the managed clusters use certificates from the system trusted store of the managed clusters to verify the hub cluster API server. This applies to situations where a public CA, such as `Let's Encrypt`, issues the hub cluster certificate. | |
`UseCustomCABundles`:: You can use `UseCustomCABundles` if you know the CA of the hub cluster API server and do not want {mce-short} to automatically detect it. For this strategy, {mce-short} adds your configured certificates from the `trustedCABundles` parameter to the managed clusters. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for sharing an example. As you mentioned, integrating the YAML samples will be difficult. I'm almost leaning more to keeping the titles, since those make it a bit clearer that there are steps that the user needs to do. Since there are only 3 titles , are you OK with just keeping it as is?
Co-authored-by: Mikela Jackson <[email protected]>
Co-authored-by: Mikela Jackson <[email protected]>
fixing link
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: dockerymick, oafischer, zhujian7 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@@ -30,6 +30,11 @@ spec: | |||
clusterSet: global | |||
---- | |||
|
|||
[#creating-managedclusterset-prereq] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
HI @oafischer the prerequisite is NOT for "create_clusterset", but for "create cluster", because the strategy is used for importing a cluster, and after a cluster is created, it will be imported to the hub by default. so we may need to:
- delete the prerequisite here
- instead, add the prerequisite in create_cluster_cli.adoc and create_cluster_on_prem.adoc
- add the prerequisite in "import_cli.adoc" and "import_gui.adoc" as well
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I created a task for this https://issues.redhat.com/browse/ACM-16098
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for creating the issue, I'll take care of it
Train 19