1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

DIAGRAMS-484:Updated OSD on GCP arch model diagrams.

This commit is contained in:
AedinC
2025-05-19 12:44:34 +01:00
committed by openshift-cherrypick-robot
parent f5363153b1
commit 4551313dc0
6 changed files with 3 additions and 3 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 131 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 135 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 134 KiB

View File

@@ -16,5 +16,5 @@ Red Hat recommends using Private Service Connect (PSC) when deploying a private
Red Hat SRE management access the cluster through a public load balancer endpoint that are restricted to Red Hat IPs. The API server endpoint is private. A separate Red Hat API server endpoint is public (but restricted to Red Hat trusted IP addresses). The default ingress controller can be public or private. The following image shows network connectivity of a private cluster without Private Service Connect (PSC).
.{product-title} on {GCP} deployed on a private network without PSC
image::osd_gcp_private_no_psc_arch.png[Private without PSC architecture model]
image::484_b_Openshift_osd_gcp_private_no_psc_arch_0525.png[Private without PSC architecture model]

View File

@@ -10,4 +10,4 @@ With a private GCP Private Service Connect (PSC) network configuration, your clu
Red Hat SRE management access the cluster over the GCP PSC-enabled private connectivity. The default ingress controller are private. Additional ingress controllers can be public or private. The following diagram shows network connectivity of a private cluster with PSC.
.{product-title} on {GCP} deployed on a private network with PSC
image::osd_gcp_private_with_psc_arch.png[Private with PSC architecture model]
image::484_a_OpenShift_osd_gcp_private_psc_arch_0525.png[Private with PSC architecture model]

View File

@@ -9,5 +9,5 @@
With a public network configuration, your cluster API server endpoint and application routes are internet-facing. The default ingress controller can be public or private. The following image shows the network connectivity of a public cluster.
.{product-title} on {GCP} deployed on a public network
image::osd_gcp_public_arch.png[Public architecture model]
image::484_c_Openshift_osd_gcp_public_arch_0525.png[Public architecture model]