Skip to content

Commit e9b97d8

Browse files
committed
OSDOCS-16614: Documented VIP optional with user-managed LB feature
1 parent 0f1e986 commit e9b97d8

File tree

6 files changed

+63
-2
lines changed

6 files changed

+63
-2
lines changed

installing/installing_bare_metal/upi/installing-bare-metal-network-customizations.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ include::modules/installation-dns-user-infra.adoc[leveloffset=+2]
6969

7070
* xref:../../../installing/installing_bare_metal/upi/installing-bare-metal-network-customizations.adoc#installation-user-provisioned-validating-dns_installing-bare-metal-network-customizations[Validating DNS resolution for user-provisioned infrastructure]
7171

72+
include::modules/installation-bare-metal-dns-record-type.adoc[leveloffset=+2]
73+
7274
include::modules/installation-load-balancing-user-infra.adoc[leveloffset=+2]
7375

7476
// Creating a manifest object that includes a customized `br-ex` bridge

installing/installing_bare_metal/upi/installing-bare-metal.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@ include::modules/installation-dns-user-infra.adoc[leveloffset=+2]
7474

7575
* xref:../../../installing/installing_bare_metal/upi/installing-bare-metal.adoc#installation-user-provisioned-validating-dns_installing-bare-metal[Validating DNS resolution for user-provisioned infrastructure]
7676

77+
include::modules/installation-bare-metal-dns-record-type.adoc[leveloffset=+2]
78+
7779
// Load balancing requirements for user-provisioned infrastructure
7880
include::modules/installation-load-balancing-user-infra.adoc[leveloffset=+2]
7981

installing/installing_bare_metal/upi/installing-restricted-networks-bare-metal.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,8 @@ include::modules/installation-dns-user-infra.adoc[leveloffset=+2]
8484

8585
* xref:../../../installing/installing_bare_metal/upi/installing-restricted-networks-bare-metal.adoc#installation-user-provisioned-validating-dns_installing-restricted-networks-bare-metal[Validating DNS resolution for user-provisioned infrastructure]
8686

87+
include::modules/installation-bare-metal-dns-record-type.adoc[leveloffset=+2]
88+
8789
include::modules/installation-load-balancing-user-infra.adoc[leveloffset=+2]
8890

8991
// Creating a manifest object that includes a customized `br-ex` bridge
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * installing/installing_bare_metal/upi/installing-bare-metal-network-customizations.adoc
4+
// * installing/installing_bare_metal/upi/installing-bare-metal.adoc
5+
// * installing/installing_bare_metal/upi/installing-restricted-networks-bare-metal.adoc
6+
7+
:_mod-docs-content-type: CONCEPT
8+
[id="installation-bare-metal-dns-record-type_{context}"]
9+
= Configuring the DnsRecordsType parameter
10+
11+
[role="_abstract"]
12+
During cluster installation, you can specify the `DnsRecordsType` parameter in the `install-config.yaml` file to set if the internal DNS service or an external source provides the necessary records for `api`, `api-int`, and `ingress` DNS records.
13+
14+
:FeatureName: Configuring the DnsRecordsType parameter
15+
include::snippets/technology-preview.adoc[]
16+
17+
The `dnsRecordsType` parameter supports the following values:
18+
19+
* `Internal`: The default value. Setting this value causes the cluster infrastructure to automatically create and maintain the necessary DNS records.
20+
* `External`: You can use this value only if you set the `loadBalancer.type` parameter to `UserManaged`. The cluster does not manage the DNS records. You must manually configure DNS records on an external DNS server.
21+
22+
.Prerequisites
23+
24+
* You created DNS records, such as `api`, `api-int`, or `\*.apps`.
25+
* You configured a user-managed load balancer for your cluster.
26+
* If you intend on setting `dnsRecordsType.External` in the `infrastructure.config.openshift.io` CR , you must initially configure cluster nodes to use the specific external server for DNS resolution.
27+
28+
.Procedure
29+
30+
* During cluster installation, specify `CustomNoUpgrade` for the `featureSet` parameter and specify `External` for the `dnsRecordsType` parameter in the `install-config.yaml` file:
31+
+
32+
[source,yaml]
33+
----
34+
apiVersion: v1
35+
baseDomain: example.com
36+
metadata:
37+
name: dev-cluster
38+
# ...
39+
featureSet: CustomNoUpgrade
40+
pullSecret: '{"auths":{"<local_registry>": {"auth": "<credentials>","email": "you@example.com"}}}'
41+
sshKey: 'ssh-ed25519 AAAA...'
42+
# ...
43+
spec:
44+
platformSpec:
45+
baremetal:
46+
dnsRecordsType: External
47+
# ...
48+
----

modules/nw-dns-forward.adoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,11 @@ endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
2020
* Provide a list of upstream DNS servers (`spec.upstreamResolvers`).
2121
* Change the default forwarding policy.
2222
23-
[NOTE]
24-
====
2523
A DNS forwarding configuration for the default domain can have both the default servers specified in the `/etc/resolv.conf` file and the upstream DNS servers.
24+
25+
[IMPORTANT]
26+
====
27+
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must recreate the container for changes to take effect.
2628
====
2729

2830
.Procedure

modules/virt-example-nmstate-IP-management.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,11 @@ The following example shows a default situation that stores DNS values globally:
139139

140140
* Configure a static DNS without a network interface. Note that when updating the `/etc/resolv.conf` file on a host node, you do not need to specify an interface, IPv4 or IPv6, in the `NodeNetworkConfigurationPolicy` (NNCP) manifest.
141141
+
142+
[IMPORTANT]
143+
====
144+
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must recreate the container for changes to take effect.
145+
====
146+
+
142147
Example of a DNS configuration for a network interface that globally stores DNS values:
143148
+
144149
[source,yaml]

0 commit comments

Comments
 (0)