1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

Dita vale fixes for OADP ROSA

Signed-off-by: Shruti Deshpande <shdeshpa@redhat.com>
This commit is contained in:
Shruti Deshpande
2025-08-11 16:15:23 +05:30
committed by openshift-cherrypick-robot
parent fbdeeb0bc3
commit 07d0855acd
6 changed files with 9 additions and 9 deletions

View File

@@ -11,6 +11,7 @@ include::_attributes/common-attributes.adoc[]
toc::[]
[role="_abstract"]
You can use {oadp-first} with {product-rosa} (ROSA) clusters to back up and restore application data.
ifndef::openshift-rosa,openshift-rosa-hcp[]

View File

@@ -6,6 +6,7 @@
[id="cleanup-a-backup-oadp-rosa-sts_{context}"]
= Cleaning up a cluster after a backup with OADP and ROSA STS
[role="_abstract"]
If you need to uninstall the {oadp-first} Operator together with the backups and the S3 bucket from this example, follow these instructions.
.Procedure

View File

@@ -6,6 +6,7 @@
[id="installing-oadp-rosa-sts_{context}"]
= Installing the OADP Operator and providing the IAM role
[role="_abstract"]
AWS Security Token Service (AWS STS) is a global web service that provides short-term credentials for IAM or federated users. {product-title} (ROSA) with {sts-short} is the recommended credential mode for ROSA clusters. This document describes how to install {oadp-first} on ROSA with {aws-short} {sts-short}.
@@ -67,9 +68,7 @@ $ oc -n openshift-adp create secret generic cloud-credentials \
+
[NOTE]
====
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM)
and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above
secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM) and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.
The preceding secret is created automatically by CCO.
====

View File

@@ -6,7 +6,8 @@
[id="performing-a-backup-oadp-rosa-sts_{context}"]
= Performing a backup with OADP and ROSA STS
The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup with {oadp-first} with {product-rosa} (ROSA) STS.
[role="_abstract"]
The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup by using {oadp-first} with {product-rosa} (ROSA) STS.
Either Data Protection Application (DPA) configuration will work.
@@ -161,6 +162,6 @@ Hello OpenShift!
[NOTE]
====
For troubleshooting tips, see the OADP teams link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
For troubleshooting tips, see the link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
====

View File

@@ -7,6 +7,7 @@
[id="preparing-aws-credentials-for-oadp_{context}"]
= Preparing AWS credentials for OADP
[role="_abstract"]
An {aws-full} account must be prepared and configured to accept an {oadp-first} installation.
.Procedure

View File

@@ -6,6 +6,7 @@
[id="updating-role-arn-oadp-rosa-sts_{context}"]
= Updating the IAM role ARN in the {oadp-short} Operator subscription
[role="_abstract"]
While installing the {oadp-short} Operator on a ROSA Security Token Service (STS) cluster, if you provide an incorrect IAM role Amazon Resource Name (ARN), the `openshift-adp-controller` pod gives an error. The credential requests that are generated contain the wrong IAM role ARN. To update the credential requests object with the correct IAM role ARN, you can edit the {oadp-short} Operator subscription and patch the IAM role ARN with the correct value. By editing the {oadp-short} Operator subscription, you do not have to uninstall and reinstall {oadp-short} to update the IAM role ARN.
.Prerequisites
@@ -157,7 +158,3 @@ $ oc get {oadp-bsl-api} -n openshift-adp
NAME PHASE LAST VALIDATED AGE DEFAULT
ts-dpa-1 Available 3s 6s true
----