-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change RHCOS booting for AWS to work like GCP/Azure #2906
Comments
We want enhanced networking in AWS. Now, it turns out that today we have this in fact because `ore` in the latest https://github.com/coreos/coreos-assembler turns this on explicitly. And when Terraform goes to copy AMI with encryption, it preserves the value of that variable. But, in the future we want to drop the AMIs from the RHCOS pipeline and just upload a blob (like Azure/GCP), so let's add this reminder to ourselves that we need to enable ENA when we do that. xref openshift#2906
/label platform/aws |
Also xref this comment: coreos/mantle#1168 (comment) Basically...today the *COS pipelines only sanity check in AWS - for RHCOS it's convenient because we have AMIs, but as soon as we don't, this section will break: Basically as the issue notes we want |
Although as of lately, #3293 landed which pushes things back towards using AMIs. So...I guess we should close this. |
For GCP and Azure and other clouds, all we upload is a blob to storage. The installer creates "bootable images" from that.
But for historical reasons, the RHCOS pipeline creates AMIs directly - the installer just uses them for the bootstrap node, creating a separate encrypted AMI for the actual cluster.
I think we should do the encryption bit before launching the bootstrap, and then RHCOS can stop publishing AMIs, and things will work more consistently across clouds.
The text was updated successfully, but these errors were encountered: