From bdad016a0acd3deeede2b02373e8389f377e7fdf Mon Sep 17 00:00:00 2001 From: Amrita Date: Thu, 10 Oct 2024 16:50:56 +0530 Subject: [PATCH] tech review changes --- xml/rmt_public_cloud.xml | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/xml/rmt_public_cloud.xml b/xml/rmt_public_cloud.xml index 7297058e9b..5cbd2868f0 100644 --- a/xml/rmt_public_cloud.xml +++ b/xml/rmt_public_cloud.xml @@ -63,8 +63,9 @@ To support &rmt; deployment, it is recommended to deploy a &rmt; instance from a - It is recommended to start with an instance type with 2 to 3 VCPUS and a minimum of 8GB RAM to support the - &rmt; deployment. For example, in AWS this would be a EC2 T3 large instance. + It is recommended to start with an instance type with 2 or more vCPUs and a minimum of 8GB RAM to support + the &rmt; deployment. For example on Amazon EC2, this could be a t3.large instance type, in Microsoft Azure it could be a B2as_v2 . + The instance can be rightsized as needed and depends on the number of clients being managed and updated by the &rmt; server. @@ -97,7 +98,7 @@ To support &rmt; deployment, it is recommended to deploy a &rmt; instance from a Disk space - The &rmt; server requires sufficient disk space to mirror the &sliberty; LTSS 7 repositories. + The &rmt; server requires sufficient disk space to mirror the repositories. Downloaded packages are available in /var/lib/rmt/public/repo/. Disk space is dependent on the number of repositories you mirror. We recommend a minimum of 1.5 times the total size of all enabled repositories. It is a best practice to provision an additional disk volume to support this requirement. @@ -133,12 +134,12 @@ Cloud NAT services. Azure offers similar services. Connectivity for clients - Clients can connect to &rmt; on ports 80 and 443. - When launching the &sles; instance to support &rmt; check if in AWS the network security group is configured to allow - inbound access to the &rmt; server from your clients (HTTP/HTTPS). For GCP, the firewall rules must be configured to allow - inbound access to the &rmt; server from your clients. -When a &sles; instance is launched to support &rmt;, it is possible to use an existing AWS security group or a new one. -The security group must be configured to allow inbound access to the &rmt; server from your clients. + Clients can connect to &rmt; on ports 80 and 443. + When launching the &sles; instance to support &rmt; check if network connectivity allows inbound access to the &rmt; server from your clients (HTTP/HTTPS). + For AWS, when a &sles; instance is launched to support &rmt;, it is possible to use an existing AWS security group or a new one. + The security group must be configured to allow inbound access to the &rmt; server from your clients. + For GCP, the firewall rules must be configured to allow inbound access to the &rmt; server from your clients. +