diff --git a/modules/get-started/pages/cluster-types/byoc/aws/vpc-byo-aws.adoc b/modules/get-started/pages/cluster-types/byoc/aws/vpc-byo-aws.adoc index 414c802b2..90a5b3a84 100644 --- a/modules/get-started/pages/cluster-types/byoc/aws/vpc-byo-aws.adoc +++ b/modules/get-started/pages/cluster-types/byoc/aws/vpc-byo-aws.adoc @@ -371,7 +371,7 @@ rpk cloud login \ --no-profile ``` -```bash` +```bash rpk cloud byoc aws apply \ --redpanda-id=${REDPANDA_ID} ``` diff --git a/modules/get-started/pages/cluster-types/byoc/azure/vnet-azure.adoc b/modules/get-started/pages/cluster-types/byoc/azure/vnet-azure.adoc index 6e32a21c6..a7daaab1a 100644 --- a/modules/get-started/pages/cluster-types/byoc/azure/vnet-azure.adoc +++ b/modules/get-started/pages/cluster-types/byoc/azure/vnet-azure.adoc @@ -47,7 +47,7 @@ Set environment variables for the resource group, VNet name, and Azure region. F ```bash export AZURE_RESOURCE_GROUP_NAME=sample-redpanda-rg export AZURE_VNET_NAME="sample-vnet" -export AZURE_REGION=eastus +export AZURE_REGION=centralus ``` == Create Azure resource group and VNet @@ -61,7 +61,7 @@ az group create --name ${AZURE_RESOURCE_GROUP_NAME} --location ${AZURE_REGION} az network vnet create \ --name ${AZURE_VNET_NAME} \ - --resource-group $AZURE_RESOURCE_GROUP_NAME \ + --resource-group ${AZURE_RESOURCE_GROUP_NAME} \ --location ${AZURE_REGION} \ --address-prefix 10.0.0.0/16 ``` @@ -71,8 +71,48 @@ az network vnet create \ ```bash export AZURE_SUBSCRIPTION_ID= export AZURE_TENANT_ID= -export AZURE_ZONES=[\"eastus-az2\"] +export AZURE_ZONES='["centralus-az1", "centralus-az2", "centralus-az3"]' export AZURE_RESOURCE_PREFIX=sample- +export REDPANDA_CLUSTER_NAME= +export REDPANDA_RG_ID= +export REDPANDA_THROUGHPUT_TIER=tier-1-azure-v3-x86 +export REDPANDA_VERSION=25.1 +export REDPANDA_MANAGEMENT_STORAGE_ACCOUNT_NAME=rpmgmtsa +export REDPANDA_MANAGEMENT_STORAGE_CONTAINER_NAME=rpmgmtsc +export REDPANDA_0_PODS_SUBNET_NAME=snet-rp-0-pods +export REDPANDA_0_VNET_SUBNET_NAME=snet-rp-0-vnet +export REDPANDA_1_PODS_SUBNET_NAME=snet-rp-1-pods +export REDPANDA_1_VNET_SUBNET_NAME=snet-rp-1-vnet +export REDPANDA_2_PODS_SUBNET_NAME=snet-rp-2-pods +export REDPANDA_2_VNET_SUBNET_NAME=snet-rp-2-vnet +export REDPANDA_CONNECT_PODS_SUBNET_NAME=snet-connect-pods +export REDPANDA_CONNECT_VNET_SUBNET_NAME=snet-connect-vnet +export KAFKA_CONNECT_PODS_SUBNET_NAME=snet-kafka-connect-pods +export KAFKA_CONNECT_VNET_SUBNET_NAME=snet-kafka-connect-vnet +export SYSTEM_PODS_SUBNET_NAME=snet-system-pods +export SYSTEM_VNET_SUBNET_NAME=snet-system-vnet +export REDPANDA_AGENT_SUBNET_NAME=snet-agent-private +export REDPANDA_EGRESS_SUBNET_NAME=snet-agent-public +export REDPANDA_MANAGEMENT_KEY_VAULT_NAME=redpanda-vault +export REDPANDA_CONSOLE_KEY_VAULT_NAME=rp-console-vault +export REDPANDA_AKS_SUBNET_CIDR="10.0.15.0/24" +export REDPANDA_IAM_RESOURCE_GROUP_NAME=dyu-redpanda-rg +export REDPANDA_NETWORK_RESOURCE_GROUP_NAME=dyu-redpanda-rg +export REDPANDA_RESOURCE_GROUP_NAME=dyu-redpanda-rg +export REDPANDA_STORAGE_RESOURCE_GROUP_NAME=dyu-redpanda-rg +export REDPANDA_SECURITY_GROUP_NAME=redpanda-nsg +export REDPANDA_TIERED_STORAGE_ACCOUNT_NAME=tieredsa +export REDPANDA_TIERED_STORAGE_CONTAINER_NAME=tieredsc +export REDPANDA_AGENT_USER_ASSIGNED_IDENTITY_NAME=agent-uai +export REDPANDA_AKS_USER_ASSIGNED_IDENTITY_NAME=aks-uai +export REDPANDA_CERT_MANAGER_USER_ASSIGNED_IDENTITY_NAME=cert-manager-uai +export REDPANDA_EXTERNAL_DNS_USER_ASSIGNED_IDENTITY_NAME=external-dns-uai +export REDPANDA_CLUSTER_USER_ASSIGNED_IDENTITY_NAME=cluster-uai +export REDPANDA_CONSOLE_USER_ASSIGNED_IDENTITY_NAME=console-uai +export KAFKA_CONNECT_USER_ASSIGNED_IDENTITY_NAME=kafka-connect-uai +export REDPANDA_CONNECT_USER_ASSIGNED_IDENTITY_NAME=redpanda-connect-uai +export REDPANDA_CONNECT_API_USER_ASSIGNED_IDENTITY_NAME=redpanda-connect-api-uai +export REDPANDA_OPERATOR_USER_ASSIGNED_IDENTITY_NAME=redpanda-operator-uai ``` == Configure Terraform @@ -85,7 +125,7 @@ Create a JSON file called `byovnet.auto.tfvars.json` inside the Terraform direct [%collapsible] ==== ```bash -cat > byovnet.auto.tfvars.json < byovnet.auto.tfvars.json < byovnet.auto.tfvars.json < byovnet.auto.tfvars.json < -export REDPANDA_RG_ID= -export REDPANDA_MANAGEMENT_STORAGE_ACCOUNT="$(terraform output -raw management_bucket_storage_account_name)" -export REDPANDA_MANAGEMENT_STORAGE_CONTAINER="$(terraform output -raw management_bucket_storage_container_name)" -export REDPANDA_0_PODS_SUBNET_NAME="$(terraform output -raw rp_0_pods_subnet_name)" -export REDPANDA_0_VNET_SUBNET_NAME="$(terraform output -raw rp_0_vnet_subnet_name)" -export REDPANDA_1_PODS_SUBNET_NAME="$(terraform output -raw rp_1_pods_subnet_name)" -export REDPANDA_1_VNET_SUBNET_NAME="$(terraform output -raw rp_1_vnet_subnet_name)" -export REDPANDA_2_PODS_SUBNET_NAME="$(terraform output -raw rp_2_pods_subnet_name)" -export REDPANDA_2_VNET_SUBNET_NAME="$(terraform output -raw rp_2_vnet_subnet_name)" -export REDPANDA_CONNECT_PODS_SUBNET_NAME="$(terraform output -raw rp_connect_pods_subnet_name)" -export REDPANDA_CONNECT_VNET_SUBNET_NAME="$(terraform output -raw rp_connect_vnet_subnet_name)" -export KAFKA_CONNECT_PODS_SUBNET_NAME="$(terraform output -raw kafka_connect_pods_subnet_name)" -export KAFKA_CONNECT_VNET_SUBNET_NAME="$(terraform output -raw kafka_connect_vnet_subnet_name)" -export SYSTEM_PODS_SUBNET_NAME="$(terraform output -raw system_pods_subnet_name)" -export SYSTEM_VNET_SUBNET_NAME="$(terraform output -raw system_vnet_subnet_name)" -export REDPANDA_AGENT_SUBNET_NAME="$(terraform output -raw agent_private_subnet_name)" -export REDPANDA_EGRESS_SUBNET_NAME="$(terraform output -raw egress_subnet_name)" -``` - . Define a JSON file called `redpanda-network.json` to configure the network for Redpanda with details about VNet, subnets, and storage. + .Show script @@ -323,8 +340,8 @@ cat > redpanda-network.json <@.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[redpanda/rp-]" @@ -590,7 +590,7 @@ gcloud iam service-accounts add-iam-policy-binding @.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[redpanda-system/]" @@ -602,7 +602,7 @@ gcloud iam service-accounts add-iam-policy-binding @.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[redpanda/console-]" @@ -614,12 +614,12 @@ gcloud iam service-accounts add-iam-policy-binding @< .Show command [%collapsible] ==== -``` +```bash gcloud iam service-accounts add-iam-policy-binding @.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[redpanda-connect/]" ``` -``` +```bash gcloud iam service-accounts add-iam-policy-binding @.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[redpanda-connect/]" @@ -631,7 +631,7 @@ gcloud iam service-accounts add-iam-policy-binding @.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[redpanda-connectors/connectors-]" @@ -643,7 +643,7 @@ gcloud iam service-accounts add-iam-policy-binding @.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[cert-manager/cert-manager]" @@ -658,7 +658,7 @@ gcloud iam service-accounts add-iam-policy-binding @@.iam.gserviceaccount.com \ --role roles/iam.workloadIdentityUser \ --member "serviceAccount:.svc.id.goog[redpanda-psc/psc-controller]"