Skip to content
This repository has been archived by the owner on Oct 22, 2024. It is now read-only.

Verify mandatory ROSA Load Balancers #14

Open
mjlshen opened this issue Dec 8, 2022 · 0 comments
Open

Verify mandatory ROSA Load Balancers #14

mjlshen opened this issue Dec 8, 2022 · 0 comments
Assignees

Comments

@mjlshen
Copy link
Owner

mjlshen commented Dec 8, 2022

The ROSA docs mention these load balancers that are expected in all cases (depending on the type of cluster):

  • ALWAYS An internal control plane load balancer that is internal to the cluster and used to balance traffic for internal cluster communications.
  • non-PrivateLink, non-STS external An external control plane load balancer that is used for accessing the OpenShift and Kubernetes APIs. This load balancer can be disabled in OpenShift Cluster Manager. If this load balancer is disabled, Red Hat reconfigures the API DNS to point to the internal control plane load balancer.
  • non-STS, internal An external control plane load balancer for Red Hat that is reserved for cluster management by Red Hat. Access is strictly controlled, and communication is only possible from whitelisted bastion hosts.
  • ALWAYS A default external router/ingress load balancer that is the default application load balancer, denoted by apps in the URL. The default load balancer can be configured in OpenShift Cluster Manager to be either publicly accessible over the Internet or only privately accessible over a pre-existing private connection. All application routes on the cluster are exposed on this default router load balancer, including cluster services such as the logging UI, metrics API, and registry.

Mirrosa should validate them

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant