Skip to content

Commit 77ffbf5

Browse files
committed
OSDOCS-16614: Documented VIP optional with user-managed LB feature
1 parent 3830697 commit 77ffbf5

File tree

6 files changed

+76
-2
lines changed

6 files changed

+76
-2
lines changed

installing/installing_bare_metal/upi/installing-bare-metal-network-customizations.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ include::modules/installation-dns-user-infra.adoc[leveloffset=+2]
6969

7070
* xref:../../../installing/installing_bare_metal/upi/installing-bare-metal-network-customizations.adoc#installation-user-provisioned-validating-dns_installing-bare-metal-network-customizations[Validating DNS resolution for user-provisioned infrastructure]
7171

72+
include::modules/installation-bare-metal-dns-record-type.adoc[leveloffset=+2]
73+
7274
include::modules/installation-load-balancing-user-infra.adoc[leveloffset=+2]
7375

7476
// Creating a manifest object that includes a customized `br-ex` bridge

installing/installing_bare_metal/upi/installing-bare-metal.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@ include::modules/installation-dns-user-infra.adoc[leveloffset=+2]
7777

7878
* xref:../../../installing/installing_bare_metal/upi/installing-bare-metal.adoc#installation-user-provisioned-validating-dns_installing-bare-metal[Validating DNS resolution for user-provisioned infrastructure]
7979

80+
include::modules/installation-bare-metal-dns-record-type.adoc[leveloffset=+2]
81+
8082
// Load balancing requirements for user-provisioned infrastructure
8183
include::modules/installation-load-balancing-user-infra.adoc[leveloffset=+2]
8284

installing/installing_bare_metal/upi/installing-restricted-networks-bare-metal.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,8 @@ include::modules/installation-dns-user-infra.adoc[leveloffset=+2]
8484

8585
* xref:../../../installing/installing_bare_metal/upi/installing-restricted-networks-bare-metal.adoc#installation-user-provisioned-validating-dns_installing-restricted-networks-bare-metal[Validating DNS resolution for user-provisioned infrastructure]
8686

87+
include::modules/installation-bare-metal-dns-record-type.adoc[leveloffset=+2]
88+
8789
include::modules/installation-load-balancing-user-infra.adoc[leveloffset=+2]
8890

8991
// Creating a manifest object that includes a customized `br-ex` bridge
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * installing/installing_bare_metal/upi/installing-bare-metal-network-customizations.adoc
4+
// * installing/installing_bare_metal/upi/installing-bare-metal.adoc
5+
// * installing/installing_bare_metal/upi/installing-restricted-networks-bare-metal.adoc
6+
7+
:_mod-docs-content-type: CONCEPT
8+
[id="installation-bare-metal-dns-record-type_{context}"]
9+
= Configuring the DnsRecordsType parameter
10+
11+
[role="_abstract"]
12+
You can use the `DnsRecordsType` parameter in your `infrastructure.config.openshift.io` custom resource (CR) to set if the internal DNS service or an external source provides the necessary records for `api`, `api-int`, and `ingress` DNS records.
13+
14+
:FeatureName: Configuring the DnsRecordsType parameter
15+
include::snippets/technology-preview.adoc[]
16+
17+
To use the parameter, you must enable the `OnPremDNSRecords` feature gate in the `config.yaml` file.
18+
19+
The `dnsRecordsType` parameter supports the following values:
20+
21+
* `Internal`: The default value. Setting this value causes the cluster infrastructure to automatically create and maintain the necessary DNS records.
22+
* `External`: You can use this value only if you set the `loadBalancer.type` parameter to `UserManaged`. The cluster does not manage the DNS records. You must manually configure DNS records on an external DNS server.
23+
24+
.Prerequisites
25+
26+
* If you intend on setting `dnsRecordsType.External` in the `infrastructure.config.openshift.io` CR , you must initially configure cluster nodes to use the specific external server for DNS resolution.
27+
28+
.Procedure
29+
30+
* Edit your `infrastructure.config.openshift.io` CR by setting the `OnPremDNSRecords` value for the `featureGates` parameter. Additionally, set the `dnsRecordsType` parameter to `Internal` or `External`.
31+
+
32+
[source,yaml]
33+
----
34+
apiVersion: apiextensions.k8s.io/v1
35+
name: "Infrastructure"
36+
crdName: infrastructures.config.openshift.io
37+
featureGates:
38+
- OnPremDNSRecords
39+
# ...
40+
name: cluster
41+
spec:
42+
platformSpec:
43+
type: BareMetal
44+
status:
45+
infrastructureName: <cluster_id>
46+
platform: BareMetal
47+
platformStatus:
48+
baremetal:
49+
dnsRecordsType: External
50+
loadBalancer:
51+
type: UserManaged
52+
cpuPartitioning: None
53+
infrastructureTopology: HighlyAvailable
54+
controlPlaneTopology: HighlyAvailable
55+
# ...
56+
----
57+
58+
59+
60+
61+

modules/nw-dns-forward.adoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,11 @@ endif::openshift-rosa,openshift-rosa-hcp,openshift-dedicated[]
2020
* Provide a list of upstream DNS servers (`spec.upstreamResolvers`).
2121
* Change the default forwarding policy.
2222
23-
[NOTE]
24-
====
2523
A DNS forwarding configuration for the default domain can have both the default servers specified in the `/etc/resolv.conf` file and the upstream DNS servers.
24+
25+
[IMPORTANT]
26+
====
27+
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must recreate the container for changes to take effect.
2628
====
2729

2830
.Procedure

modules/virt-example-nmstate-IP-management.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,11 @@ The following example shows a default situation that stores DNS values globally:
139139

140140
* Configure a static DNS without a network interface. Note that when updating the `/etc/resolv.conf` file on a host node, you do not need to specify an interface, IPv4 or IPv6, in the `NodeNetworkConfigurationPolicy` (NNCP) manifest.
141141
+
142+
[IMPORTANT]
143+
====
144+
During pod creation, Kubernetes uses the `/etc/resolv.conf` file that exists on a node. If you modify the `/etc/resolv.conf` file on a host node, the changes do not propagate to the `/etc/resolv.conf` file that exists in a container. You must recreate the container for changes to take effect.
145+
====
146+
+
142147
Example of a DNS configuration for a network interface that globally stores DNS values:
143148
+
144149
[source,yaml]

0 commit comments

Comments
 (0)