-
Feature
-
Resolution: Done
-
Major
-
None
Feature Overview
- As a Cluster Administrator, I want to opt-out of certain operators at deployment time using any of the supported installation methods (UPI, IPI, Assisted Installer, Agent-based Installer) from UI (e.g. OCP Console, OCM, Assisted Installer), CLI (e.g. oc, rosa), and API.
- As a Cluster Administrator, I want to opt-in to previously-disabled operators (at deployment time) from UI (e.g. OCP Console, OCM, Assisted Installer), CLI (e.g. oc, rosa), and API.
- As a ROSA service administrator, I want to exclude/disable Cluster Monitoring when I deploy OpenShift with HyperShift — using any of the supported installation methods including the ROSA wizard in OCM and rosa cli — since I get cluster metrics from the control plane. This configuration should be persisted through not only through initial deployment but also through cluster lifecycle operations like upgrades.
- As a ROSA service administrator, I want to exclude/disable Ingress Operator when I deploy OpenShift with HyperShift — using any of the supported installation methods including the ROSA wizard in OCM and rosa cli — as I want to use my preferred load balancer (i.e. AWS load balancer). This configuration should be persisted through not only through initial deployment but also through cluster lifecycle operations like upgrades.
Goals
- Make it possible for customers and Red Hat teams producing OCP distributions/topologies/experiences to enable/disable some CVO components while still keeping their cluster supported.
Scenarios
- This feature must consider the different deployment footprints including self-managed and managed OpenShift, connected vs. disconnected (restricted and air-gapped), supported topologies (standard HA, compact cluster, SNO), etc.
- Enabled/disabled configuration must persist throughout cluster lifecycle including upgrades.
- If there's any risk/impact of data loss or service unavailability (for Day 2 operations), the System must provide guidance on what the risks are and let user decide if risk worth undertaking.
Requirements
- This Section:* A list of specific needs or objectives that a Feature must deliver to satisfy the Feature.. Some requirements will be flagged as MVP. If an MVP gets shifted, the feature shifts. If a non MVP requirement slips, it does not shift the feature.
Requirement | Notes | isMvp? |
---|---|---|
CI - MUST be running successfully with test automation | This is a requirement for ALL features. | YES |
Release Technical Enablement | Provide necessary release enablement details and documents. | YES |
(Optional) Use Cases
This Section:
- Main success scenarios - high-level user stories
- Alternate flow/scenarios - high-level user stories
- ...
Questions to answer…
- ...
Out of Scope
- …
Background, and strategic fit
This part of the overall multiple release Composable OpenShift (OCPPLAN-9638 effort), which is being delivered in multiple phases:
Phase 1 (OpenShift 4.11): OCPPLAN-7589 Provide a way with CVO to allow disabling and enabling of operators
CORS-1873Installer to allow users to select OpenShift components to be included/excludedOTA-555Provide a way with CVO to allow disabling and enabling of operatorsOLM-2415Make the marketplace operator optionalSO-11Make samples operator optional- METAL-162 Make cluster baremetal operator optional
OCPPLAN-8286CI Job for disabled optional capabilities
Phase 2 (OpenShift 4.12): OCPPLAN-7589 Provide a way with CVO to allow disabling and enabling of operators
CONSOLE-3160Make console operator optional- CCXDEV-8079 Make Insights operator optional
- CNF-5645 Make storage operator optional
- CNF-5646 Make csi-snapshot-controller optional
Phase 3 (OpenShift 4.13): OCPPLAN-9693 (this feature)
OTA-554Make oc aware of cluster capabilitiesPSAP-741Make Node Tuning Operator (including PAO controllers) optional
Post-Phase 3 and Beyond: OCPBU-236 OpenShift Optional Capabilities (Phase 4)
CCO-186ccoctl support for credentialing optional capabilitiesIR-230Make node-ca managed by CVONE-1101Make Ingress Operator optional- CNF-5642 Make cluster autoscaler optional
- CNF-5643 - Make machine-api operator optional
- OBSDA-242 Make Cluster Monitoring Operator optional
CNV-16274 OpenShift Virtualization on the Red Hat Application Cloud (not applicable)
References
Assumptions
- ...
Customer Considerations
- ...
Documentation Considerations
Questions to be addressed:
- What educational or reference material (docs) is required to support this product feature? For users/admins? Other functions (security officers, etc)?
- Does this feature have doc impact?
- New Content, Updates to existing content, Release Note, or No Doc Impact
- If unsure and no Technical Writer is available, please contact Content Strategy.
- What concepts do customers need to understand to be successful in [action]?
- How do we expect customers will use the feature? For what purpose(s)?
- What reference material might a customer want/need to complete [action]?
- Is there source material that can be used as reference for the Technical Writer in writing the content? If yes, please link if available.
- What is the doc impact (New Content, Updates to existing content, or Release Note)?
- incorporates
-
OBSDA-242 Make Cluster Monitoring Operator optional
- To Do
- is related to
-
OCPSTRAT-1308 OpenShift Optional Capabilities (Phase 7)
- New
-
OCPPLAN-9555 Platform Operators
- In Progress
-
OCPSTRAT-36 OpenShift Optional Capabilities (Phase 4)
- Closed
-
OCPSTRAT-346 Make Ingress Operator optional
- Closed
-
OCPSTRAT-421 OpenShift Optional Capabilities (Phase 5)
- Closed
-
OCPSTRAT-731 OpenShift Optional Capabilities (Phase 6)
- Closed
- relates to
-
OCPSTRAT-542 [Phase Next] Add a new platform type ("external") to identify clusters with non-integrated partner components enabled
- New
-
OCPSTRAT-339 [Phase 2] Add a new platform type ("external") to identify clusters with non-integrated partner components enabled
- Closed
-
OCPSTRAT-516 [Phase 1] Add a new platform type ("external") to identify clusters with non-integrated partner components enabled
- Closed