This is a cache of https://docs.openshift.com/dedicated/osd_cluster_admin/osd_private_connections/aws-private-connections.html. It is a snapshot of the page at 2024-11-27T05:12:16.849+0000.
Configuring private connections for AWS - Configuring private connections | Cluster administration | OpenShift Dedicated
×

Understanding AWS cloud infrastructure access

AWS cloud infrastructure access does not apply to the Customer Cloud Subscription (CCS) infrastructure type that is chosen when you create a cluster because CCS clusters are deployed onto your account.

Amazon Web Services (AWS) infrastructure access permits Customer Portal Organization Administrators and cluster owners to enable AWS Identity and Access Management (IAM) users to have federated access to the AWS Management Console for their OpenShift Dedicated cluster. AWS access can be granted for customer AWS users, and private cluster access can be implemented to suit the needs of your OpenShift Dedicated environment.

  1. Get started with configuring AWS infrastructure access for your OpenShift Dedicated cluster. By creating an AWS user and account and providing that user with access to the OpenShift Dedicated AWS account.

  2. After you have access to the OpenShift Dedicated AWS account, use one or more of the following methods to establish a private connection to your cluster:

    • Configuring AWS VPC peering: Enable VPC peering to route network traffic between two private IP addresses.

    • Configuring AWS VPN: Establish a Virtual Private Network to securely connect your private network to your Amazon Virtual Private Cloud.

    • Configuring AWS Direct Connect: Configure AWS Direct Connect to establish a dedicated network connection between your private network and an AWS Direct Connect location.

After configuring your cloud infrastructure access, learn more about Configuring a private cluster.

Configuring AWS infrastructure access

Amazon Web Services (AWS) infrastructure access allows Customer Portal Organization Administrators and cluster owners to enable AWS Identity and Access Management (IAM) users to have federated access to the AWS Management Console for their OpenShift Dedicated cluster. Administrators can select between Network Management or Read-only access options.

Prerequisites
  • An AWS account with IAM permissions.

Procedure
  1. Log in to your AWS account. If necessary, you can create a new AWS account by following the AWS documentation.

  2. Create an IAM user with STS:AllowAssumeRole permissions within the AWS account.

    1. Open the IAM dashboard of the AWS Management Console.

    2. In the Policies section, click Create Policy.

    3. Select the JSON tab and replace the existing text with the following:

      {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                "Action": "sts:AssumeRole",
                "Resource": "*"
            }
        ]
      }
    4. Click Next:Tags.

    5. Optional: Add tags. Click Next:Review

    6. Provide an appropriate name and description, then click Create Policy.

    7. In the users section, click Add user.

    8. Provide an appropriate user name.

    9. Select AWS Management Console access as the AWS access type.

    10. Adjust the password requirements as necessary for your organization, then click Next:Permissions.

    11. Click the Attach existing policies directly option. Search for and check the policy created in previous steps.

      It is not recommended to set a permissions boundary.

    12. Click Next: Tags, then click Next: Review. Confirm the configuration is correct.

    13. Click Create user, a success page appears.

    14. Gather the IAM user’s Amazon Resource Name (ARN). The ARN will have the following format: arn:aws:iam::000111222333:user/username. Click Close.

  3. Open OpenShift Cluster Manager in your browser and select the cluster you want to allow AWS infrastructure access.

  4. Select the Access control tab, and scroll to the AWS Infrastructure Access section.

  5. Paste the AWS IAM ARN and select Network Management or Read-only permissions, then click Grant role.

  6. Copy the AWS OSD console URL to your clipboard.

  7. Sign in to your AWS account with your Account ID or alias, IAM user name, and password.

  8. In a new browser tab, paste the AWS OSD Console URL that will be used to route to the AWS Switch Role page.

  9. Your account number and role will be filled in already. Choose a display name if necessary, then click Switch Role.

Verification
  • You now see VPC under Recently visited services.

Configuring AWS VPC peering

A Virtual Private Cloud (VPC) peering connection is a networking connection between two VPCs that enables you to route traffic between them using private IPv4 addresses or IPv6 addresses. You can configure an Amazon Web Services (AWS) VPC containing an OpenShift Dedicated cluster to peer with another AWS VPC network.

Before you attempt to uninstall a cluster, you must remove any VPC peering connections from the cluster’s VPC. Failure to do so might result in a cluster not completing the uninstall process.

AWS supports inter-region VPC peering between all commercial regions excluding China.

Prerequisites
  • Gather the following information about the Customer VPC that is required to initiate the peering request:

    • Customer AWS account number

    • Customer VPC ID

    • Customer VPC Region

    • Customer VPC CIDR

  • Check the CIDR block used by the OpenShift Dedicated Cluster VPC. If it overlaps or matches the CIDR block for the Customer VPC, then peering between these two VPCs is not possible; see the Amazon VPC Unsupported VPC peering configurations documentation for details. If the CIDR blocks do not overlap, you can proceed with the procedure.

Additional resources
  • For more information and troubleshooting help, see the AWS VPC guide.

Configuring an AWS VPN

You can configure an Amazon Web Services (AWS) OpenShift Dedicated cluster to use a customer’s on-site hardware Virtual Private Network (VPN) device. By default, instances that you launch into an AWS Virtual Private Cloud (VPC) cannot communicate with your own (remote) network. You can enable access to your remote network from your VPC by creating an AWS Site-to-Site VPN connection, and configuring routing to pass traffic through the connection.

AWS VPN does not currently provide a managed option to apply NAT to VPN traffic. See the AWS Knowledge Center for more details.

Routing all traffic, for example 0.0.0.0/0, through a private connection is not supported. This requires deleting the internet gateway, which disables SRE management traffic.

Prerequisites
  • Hardware VPN gateway device model and software version, for example Cisco ASA running version 8.3. See the AWS documentation to confirm whether your gateway device is supported by AWS.

  • Public, static IP address for the VPN gateway device.

  • BGP or static routing: if BGP, the ASN is required. If static routing, you must configure at least one static route.

  • Optional: IP and port/protocol of a reachable service to test the VPN connection.

Procedure
  1. Create a customer gateway to configure the VPN connection.

  2. If you do not already have a Virtual Private Gateway attached to the intended VPC, create and attach a Virtual Private Gateway.

  3. Configure routing and enable VPN route propagation.

  4. Update your security group.

  5. Establish the Site-to-Site VPN connection.

    Note the VPC subnet information, which you must add to your configuration as the remote network.

Additional resources
  • For more information and troubleshooting help, see the AWS VPN guide.

Configuring AWS Direct Connect

Amazon Web Services (AWS) Direct Connect requires a hosted Virtual Interface (VIF) connected to a Direct Connect Gateway (DXGateway), which is in turn associated to a Virtual Gateway (VGW) or a Transit Gateway in order to access a remote Virtual Private Cloud (VPC) in the same or another account.

If you do not have an existing DXGateway, the typical process involves creating the hosted VIF, with the DXGateway and VGW being created in your AWS account.

If you have an existing DXGateway connected to one or more existing VGWs, the process involves your AWS account sending an Association Proposal to the DXGateway owner. The DXGateway owner must ensure that the proposed CIDR will not conflict with any other VGWs they have associated.

Prerequisites
  • Confirm the CIDR range of the OpenShift Dedicated VPC will not conflict with any other VGWs you have associated.

  • Gather the following information:

    • The Direct Connect Gateway ID.

    • The AWS Account ID associated with the virtual interface.

    • The BGP ASN assigned for the DXGateway. Optional: the Amazon default ASN may also be used.

Procedure
  1. Create a VIF or view your existing VIFs to determine the type of direct connection you need to create.

  2. Create your gateway.

    1. If the Direct Connect VIF type is Private, create a virtual private gateway.

    2. If the Direct Connect VIF is Public, create a Direct Connect gateway.

  3. If you have an existing gateway you want to use, create an association proposal and send the proposal to the DXGateway owner for approval.

    When connecting to an existing DXGateway, you are responsible for the costs.

Additional resources