Skip to content

Commit c4abd39

Browse files
committed
OSDOCS-17623:Update Google Cloud firewall prereqs.
1 parent 2df8693 commit c4abd39

File tree

2 files changed

+0
-14
lines changed

2 files changed

+0
-14
lines changed

cloud_experts_osd_tutorials/cloud-experts-osd-create-new-limit-egress.adoc

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,6 @@ toc::[]
1010
[role="_abstract"]
1111
Use this guide to implement egress restrictions for {product-title} on {GCP} by using {GCP}'s Next Generation Firewall (NGFW). NGFW is a fully distributed firewall service that allows fully qualified domain name (FQDN) objects in firewall policy rules. This is necessary for many of the external endpoints that {product-title} relies on.
1212
13-
[IMPORTANT]
14-
====
15-
The ability to restrict egress traffic using a firewall or other network device is only supported with {product-title} clusters deployed using Private Service Connect (PSC). Clusters that do not use PSC require a support exception to use this functionality. For additional assistance, please open a link:https://access.redhat.com/support/cases/?extIdCarryOver=true&sc_cid=701f2000001Css5AAC#/case/new/get-support?caseCreate=true[support case].
16-
====
17-
1813
include::modules/cloud-experts-osd-limit-egress-ngfw-prereqs.adoc[leveloffset=+1]
1914
2015
include::modules/cloud-experts-osd-limit-egress-ngfw-setup-environ.adoc[leveloffset=+1]

modules/osd-gcp-psc-firewall-prerequisites.adoc

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,6 @@
88

99
If you are using a firewall to control egress traffic from {product-title} on {GCP}, you must configure your firewall to grant access to certain domains and port combinations listed in the tables below. {product-title} requires this access to provide a fully managed OpenShift service.
1010

11-
[IMPORTANT]
12-
====
13-
Only {product-title} on {GCP} clusters deployed with Private Service Connect can use a firewall to control egress traffic.
14-
====
15-
1611
// .Prerequisites
1712
// Per SMEs, no prereqs. Will confirm with QE when ticket is reviewed.
1813

@@ -70,10 +65,6 @@ Only {product-title} on {GCP} clusters deployed with Private Service Connect can
7065
|443
7166
|Required. Allows interactions between the cluster and {cluster-manager-first} to enable functionality, such as scheduling upgrades.
7267

73-
|`sso.redhat.com`
74-
|443
75-
|The `https://console.redhat.com/openshift` site uses authentication from `sso.redhat.com`.
76-
7768
|`catalog.redhat.com`
7869
|443
7970
|The `registry.access.redhat.com` and `https://registry.redhat.io` sites redirect through `catalog.redhat.com`.

0 commit comments

Comments
 (0)