Skip to content

Commit 29e55e6

Browse files
authored
fix: update DA diagram link(#52)
1 parent 0d11975 commit 29e55e6

File tree

3 files changed

+2
-2
lines changed

3 files changed

+2
-2
lines changed

ibm_catalog.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@
126126
{
127127
"diagram": {
128128
"caption": "Red Hat OpenShift cluster with OpenShift Virtualization for IBM Cloud",
129-
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-ocp-virtualization/main/reference-architecture/deployable-architecture-ocp-virtualization-quickstart.svg",
129+
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-ocp-virtualization/main/reference-architectures/deployable-architecture-ocp-virtualization-quickstart.svg",
130130
"type": "image/svg+xml"
131131
},
132132
"description": "This architecture enables the deployment of a <b>Red Hat OpenShift cluster</b> with bare metal worker nodes on IBM Cloud, within a Virtual Private Cloud (VPC) environment.<br><br>The VPC is configured within a specific region and organized under a designated resource group. OpenShift is deployed within the VPC and spread across a zone, hosting multiple Bare Metal Worker Nodes. These nodes offer high-performance, dedicated compute resources ideal for VM workloads.<br><br>To support internal image storage and management, a <b>Cloud Object Storage (COS)</b> instance is integrated. Within this COS instance, a Registry bucket is provisioned to serve as the internal image registry for the OpenShift cluster.<br><br>To support <b>OpenShift Virtualization</b>, the following add-ons are installed: <b>OpenShift Data Foundation (ODF)</b> and the <b>vpc-file-csi-driver</b>.<br><br><b>OpenShift Data Foundation</b> provides integrated, software-defined storage that enables persistent storage for virtual machines (VMs) and applications within OpenShift. It supports block, file, and object storage across hybrid environments, ensuring high availability, scalability, and data resilience for virtualized workloads.<br><br>The <b>vpc-file-csi-driver</b> is a Container Storage Interface (CSI) driver that allows OpenShift clusters to dynamically mount <b>IBM Cloud VPC File Storage</b> volumes. This enables scalable, high-performance file storage integration with OpenShift workloads, including virtual machines.<br><br>These add-ons form a critical part of the virtualization stack, offering persistent and resilient storage infrastructure required for deploying and managing VMs within the OpenShift cluster.<br><br>This architecture provides a robust and quick foundation for deploying and managing your Red Hat OpenShift cluster, enabling seamless Openshift Virtualization."
@@ -507,7 +507,7 @@
507507
{
508508
"diagram": {
509509
"caption": "Red Hat OpenShift cluster with OpenShift Virtualization for IBM Cloud.",
510-
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-ocp-ai/main/reference-architecture/deployable-architecture-ocp-virtualization-fully-configurable.svg",
510+
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-ocp-ai/main/reference-architectures/deployable-architecture-ocp-virtualization-fully-configurable.svg",
511511
"type": "image/svg+xml"
512512
},
513513
"description": "This deployable architecture illustrates the deployment of a Red Hat OpenShift cluster on IBM Cloud with bare-metal worker nodes, showcasing the key components and their interactions for openshift virtualization support.<br><br>You can create a fully-configured <b>VPC</b> by selecting the [Cloud automation for VPC](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-vpc-2af61763-f8ef-4527-a815-b92166f29bc8-global) dependency or you can use an existing VPC. The VPC can be provisioned either in a single-zone or multi-zone configuration, depending on your availability requirements. By default, the VPC add-on provisions a single-zone VPC, forming the foundation for your OpenShift cluster. <br><br>To utilize the capabilities of <b>Openshift Virtualization</b>, you must configure <b>at least one bare-metal worker pool</b> within your cluster. The architecture supports a flexible compute environment, allowing you to deploy a mix of <b>bare-metal</b> and <b>vpc</b> nodes across different worker pools. This solution offers single worker pool that are spread across a single zone, along with the following add-ons installed: <b>OpenShift Data Foundation (ODF)</b> and the <b>vpc-file-csi-driver</b>.<br><br>A <b>Cloud Object Storage (COS)</b> instance is required for the OpenShift cluster. Within this instance, an Object Storage bucket is created, which serves as the internal registry storage for the OpenShift cluster. The [Cloud automation for Object Storage](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-cos-68921490-2778-4930-ac6d-bae7be6cd958-global) deployable architecture can be used to create a COS instance. Additionally, the storage bucket can be encrypted using <b>Key Management Services(KMS)</b> to enhance security.<br><br>For logging and monitoring needs, you can enable <b>Observability</b> for your cluster. [Cloud automation for Observability](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-observability-a3137d28-79e0-479d-8a24-758ebd5a0eab-global) provides advanced monitoring, logging, and operational insights into the performance and health of your deployment.<br><br><b>Secrets Manager</b> Integration can also be enabled by using [Cloud automation for Secrets Manager](https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-secrets-manager-6d6ebc76-7bbd-42f5-8bc7-78f4fabd5944-global) for centrally managing Ingress subdomain certificates, ensuring the secure management of sensitive credentials.<br><br>This architecture provides a robust and quick foundation for deploying and managing your Red Hat OpenShift cluster, enabling seamless Openshift Virtualization."

0 commit comments

Comments
 (0)