mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
Dita vale fixes for OADP ROSA
Signed-off-by: Shruti Deshpande <shdeshpa@redhat.com>
This commit is contained in:
committed by
openshift-cherrypick-robot
parent
fbdeeb0bc3
commit
07d0855acd
@@ -11,6 +11,7 @@ include::_attributes/common-attributes.adoc[]
|
||||
|
||||
toc::[]
|
||||
|
||||
[role="_abstract"]
|
||||
You can use {oadp-first} with {product-rosa} (ROSA) clusters to back up and restore application data.
|
||||
|
||||
ifndef::openshift-rosa,openshift-rosa-hcp[]
|
||||
|
||||
@@ -6,6 +6,7 @@
|
||||
[id="cleanup-a-backup-oadp-rosa-sts_{context}"]
|
||||
= Cleaning up a cluster after a backup with OADP and ROSA STS
|
||||
|
||||
[role="_abstract"]
|
||||
If you need to uninstall the {oadp-first} Operator together with the backups and the S3 bucket from this example, follow these instructions.
|
||||
|
||||
.Procedure
|
||||
|
||||
@@ -6,6 +6,7 @@
|
||||
[id="installing-oadp-rosa-sts_{context}"]
|
||||
= Installing the OADP Operator and providing the IAM role
|
||||
|
||||
[role="_abstract"]
|
||||
AWS Security Token Service (AWS STS) is a global web service that provides short-term credentials for IAM or federated users. {product-title} (ROSA) with {sts-short} is the recommended credential mode for ROSA clusters. This document describes how to install {oadp-first} on ROSA with {aws-short} {sts-short}.
|
||||
|
||||
|
||||
@@ -67,9 +68,7 @@ $ oc -n openshift-adp create secret generic cloud-credentials \
|
||||
+
|
||||
[NOTE]
|
||||
====
|
||||
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM)
|
||||
and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above
|
||||
secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.
|
||||
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM) and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.
|
||||
|
||||
The preceding secret is created automatically by CCO.
|
||||
====
|
||||
|
||||
@@ -6,7 +6,8 @@
|
||||
[id="performing-a-backup-oadp-rosa-sts_{context}"]
|
||||
= Performing a backup with OADP and ROSA STS
|
||||
|
||||
The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup with {oadp-first} with {product-rosa} (ROSA) STS.
|
||||
[role="_abstract"]
|
||||
The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup by using {oadp-first} with {product-rosa} (ROSA) STS.
|
||||
|
||||
Either Data Protection Application (DPA) configuration will work.
|
||||
|
||||
@@ -161,6 +162,6 @@ Hello OpenShift!
|
||||
|
||||
[NOTE]
|
||||
====
|
||||
For troubleshooting tips, see the OADP team’s link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
|
||||
For troubleshooting tips, see the link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
|
||||
====
|
||||
|
||||
|
||||
@@ -7,6 +7,7 @@
|
||||
[id="preparing-aws-credentials-for-oadp_{context}"]
|
||||
= Preparing AWS credentials for OADP
|
||||
|
||||
[role="_abstract"]
|
||||
An {aws-full} account must be prepared and configured to accept an {oadp-first} installation.
|
||||
|
||||
.Procedure
|
||||
|
||||
@@ -6,6 +6,7 @@
|
||||
[id="updating-role-arn-oadp-rosa-sts_{context}"]
|
||||
= Updating the IAM role ARN in the {oadp-short} Operator subscription
|
||||
|
||||
[role="_abstract"]
|
||||
While installing the {oadp-short} Operator on a ROSA Security Token Service (STS) cluster, if you provide an incorrect IAM role Amazon Resource Name (ARN), the `openshift-adp-controller` pod gives an error. The credential requests that are generated contain the wrong IAM role ARN. To update the credential requests object with the correct IAM role ARN, you can edit the {oadp-short} Operator subscription and patch the IAM role ARN with the correct value. By editing the {oadp-short} Operator subscription, you do not have to uninstall and reinstall {oadp-short} to update the IAM role ARN.
|
||||
|
||||
.Prerequisites
|
||||
@@ -157,7 +158,3 @@ $ oc get {oadp-bsl-api} -n openshift-adp
|
||||
NAME PHASE LAST VALIDATED AGE DEFAULT
|
||||
ts-dpa-1 Available 3s 6s true
|
||||
----
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user