You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/securing_networks/creating-and-managing-tls-keys-and-certificates_securing-networks#doc-wrapper[RHEL: Creating and managing TLS keys and certificates]
24
24
25
-
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/securing_networks/using-shared-system-certificates_securing-networks#the-system-wide-trust-store_using-shared-system-certificates[The system-wide truststore] for details.
Copy file name to clipboardExpand all lines: microshift_install/microshift-greenboot.adoc
+1-6Lines changed: 1 addition & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ toc::[]
8
8
9
9
Greenboot is the generic health check framework for the `systemd` service on `rpm-ostree` systems such as {op-system-ostree-first}. This framework is included in {microshift-short} installations with the `microshift-greenboot` and `greenboot-default-health-checks` RPM packages.
10
10
11
-
Greenboot health checks run at various times to assess system health and automate a rollback to the last healthy state in the event of software trouble, for example:
11
+
Greenboot health checks run at various times to assess system health and automate a rollback on `rpm-ostree` systems to the last healthy state in cases of software trouble, for example:
12
12
13
13
* Default health check scripts run each time the system starts.
14
14
* In addition the to the default health checks, you can write, install, and configure application health check scripts to also run every time the system starts.
@@ -17,11 +17,6 @@ Greenboot health checks run at various times to assess system health and automat
17
17
18
18
A {microshift-short} application health check script is included in the `microshift-greenboot` RPM. The `greenboot-default-health-checks` RPM includes health check scripts verifying that DNS and `ostree` services are accessible. You can create your own health check scripts for the workloads you are running. You can write one that verifies that an application has started, for example.
19
19
20
-
[NOTE]
21
-
====
22
-
Rollback is not possible in the case of an update failure on a system not using `rpm-ostree`. This is true even though health checks might run.
In addition to the default OVN-Kubernetes Container Network Interface (CNI) plugin, {microshift-short}uses an implementation of the Multus CNI to chain other CNI plugins.
9
+
In addition to the default OVN-Kubernetes Container Network Interface (CNI) plugin, the {microshift-short} Multus CNI is available to chain other CNI plugins. Installing and using {microshift-short} Multus is optional.
GitOps with Argo CD for {microshift-short} has the following differences from the Red Hat OpenShift GitOps Operator:
31
31
32
32
* The `gitops-operator` component is not used with {microshift-short}.
33
-
* To maintain the small resource use of {microshift-short}, the Argo CD web console is not available. You can use the Argo CD CLI or use a pull-based approach.
33
+
* To maintain the small resource use of {microshift-short}, the Argo CD web console is not available. You can use the Argo CD CLI.
34
34
* Because {microshift-short} is single-node, there is no multi-cluster support. Each instance of {microshift-short} is paired with a local GitOps agent.
35
35
* The `oc adm must-gather` command is not available in {microshift-short}.
* xref:../microshift_install/microshift-install-rpm.adoc#microshift-installing-rpms-for-gitops_microshift-install-rpm[Installing the GitOps Argo CD manifests from an RPM package]
47
+
48
48
* xref:../microshift_support/microshift-sos-report.adoc#microshift-sos-report[Using sos reports]
49
49
50
50
* link:https://access.redhat.com/documentation/en-us/red_hat_openshift_gitops/1.12[Red Hat OpenShift GitOps]
* Logs print to the console during manual backups.
24
+
* Logs print to the terminal console during manual backups.
25
25
* Logs are automatically generated for `rpm-ostree` system automated backups as part of the {microshift-short} journal logs. You can check the logs by running the following command:
Copy file name to clipboardExpand all lines: modules/microshift-custom-ca-con.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,5 +41,5 @@ If any validation fails, the {microshift-short} service skips the custom configu
41
41
42
42
[IMPORTANT]
43
43
====
44
-
Custom server certificates have to be validated against CA data configured in the trust root of the host operating system.
44
+
Custom server certificates have to be validated against CA data configured in the trust root of the host operating system. For information, see link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/securing_networks/using-shared-system-certificates_securing-networks#the-system-wide-trust-store_using-shared-system-certificates[The system-wide truststore].
Copy file name to clipboardExpand all lines: modules/microshift-gitops-adding-apps.adoc
+10-46Lines changed: 10 additions & 46 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,51 +8,15 @@
8
8
9
9
You can create a custom YAML configuration to deploy and manage applications in your {microshift-short} service. To install the necessary packages to run GitOps applications, follow the documentation in "Installing the GitOps Argo CD manifests from an RPM package".
10
10
11
-
.Prerequisites
11
+
.Prerequisites
12
12
13
-
* You installed the `microshift-gitops` packages and the Argo CD pods are running in the `openshift-gitops` namespace.
13
+
* You installed the `microshift-gitops` packages.
14
14
15
-
.Procedure
15
+
* The Argo CD pods are running in the `openshift-gitops` namespace.
16
16
17
-
. Create a YAML file and add your customized configurations for the application:
== Use case: Additional networks for network isolation
30
30
31
-
You can use an additional network in situations where network isolation is needed, including control plane and data plane separation. You can create additional interfaces for pods to connect to that network in addition to a default. For example, you can configure an additional interface if you want pods to access a network on the host and also communicate with devices deployed to the edge. These edge devices might be on an isolated operator network or are periodically disconnected.
31
+
You can use an additional network in situations where network isolation is needed, including control plane and data plane separation. For example, you can configure an additional interface if you want pods to access a network on the host and also communicate with devices deployed to the edge. These edge devices might be on an isolated operator network or are periodically disconnected.
32
32
33
33
Isolating network traffic is useful for the following performance and security reasons:
<1> Replace `<network>` with the name of the additional network to associate with the pod. To specify more than one additional network, separate each network with a comma. Do not include whitespace between the comma. If you specify the same additional network multiple times, that pod will have multiple network interfaces attached to that network.
0 commit comments