Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ include::_attributes/common-attributes.adoc[]

toc::[]

[role="_abstract"]
You can use {oadp-first} with {product-rosa} (ROSA) clusters to back up and restore application data.

ifndef::openshift-rosa,openshift-rosa-hcp[]
Expand Down
1 change: 1 addition & 0 deletions modules/cleanup-a-backup-oadp-rosa-sts.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
[id="cleanup-a-backup-oadp-rosa-sts_{context}"]
= Cleaning up a cluster after a backup with OADP and ROSA STS

[role="_abstract"]
If you need to uninstall the {oadp-first} Operator together with the backups and the S3 bucket from this example, follow these instructions.

.Procedure
Expand Down
5 changes: 2 additions & 3 deletions modules/installing-oadp-rosa-sts.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
[id="installing-oadp-rosa-sts_{context}"]
= Installing the OADP Operator and providing the IAM role

[role="_abstract"]
AWS Security Token Service (AWS STS) is a global web service that provides short-term credentials for IAM or federated users. {product-title} (ROSA) with {sts-short} is the recommended credential mode for ROSA clusters. This document describes how to install {oadp-first} on ROSA with {aws-short} {sts-short}.


Expand Down Expand Up @@ -67,9 +68,7 @@ $ oc -n openshift-adp create secret generic cloud-credentials \
+
[NOTE]
====
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM)
and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above
secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.
In {product-title} versions 4.15 and later, the OADP Operator supports a new standardized {sts-short} workflow through the Operator Lifecycle Manager (OLM) and Cloud Credentials Operator (CCO). In this workflow, you do not need to create the above secret, you only need to supply the role ARN during the installation of OLM-managed operators using the {product-title} web console, for more information see _Installing from OperatorHub using the web console_.

The preceding secret is created automatically by CCO.
====
Expand Down
5 changes: 3 additions & 2 deletions modules/performing-a-backup-oadp-rosa-sts.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@
[id="performing-a-backup-oadp-rosa-sts_{context}"]
= Performing a backup with OADP and ROSA STS

The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup with {oadp-first} with {product-rosa} (ROSA) STS.
[role="_abstract"]
The following example `hello-world` application has no persistent volumes (PVs) attached. Perform a backup by using {oadp-first} with {product-rosa} (ROSA) STS.

Either Data Protection Application (DPA) configuration will work.

Expand Down Expand Up @@ -161,6 +162,6 @@ Hello OpenShift!

[NOTE]
====
For troubleshooting tips, see the OADP team’s link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
For troubleshooting tips, see the link:https://access.redhat.com/articles/5456281[troubleshooting documentation].
====

1 change: 1 addition & 0 deletions modules/preparing-aws-credentials-for-oadp.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
[id="preparing-aws-credentials-for-oadp_{context}"]
= Preparing AWS credentials for OADP

[role="_abstract"]
An {aws-full} account must be prepared and configured to accept an {oadp-first} installation.

.Procedure
Expand Down
5 changes: 1 addition & 4 deletions modules/updating-role-arn-oadp-rosa-sts.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
[id="updating-role-arn-oadp-rosa-sts_{context}"]
= Updating the IAM role ARN in the {oadp-short} Operator subscription

[role="_abstract"]
While installing the {oadp-short} Operator on a ROSA Security Token Service (STS) cluster, if you provide an incorrect IAM role Amazon Resource Name (ARN), the `openshift-adp-controller` pod gives an error. The credential requests that are generated contain the wrong IAM role ARN. To update the credential requests object with the correct IAM role ARN, you can edit the {oadp-short} Operator subscription and patch the IAM role ARN with the correct value. By editing the {oadp-short} Operator subscription, you do not have to uninstall and reinstall {oadp-short} to update the IAM role ARN.

.Prerequisites
Expand Down Expand Up @@ -157,7 +158,3 @@ $ oc get {oadp-bsl-api} -n openshift-adp
NAME PHASE LAST VALIDATED AGE DEFAULT
ts-dpa-1 Available 3s 6s true
----