Kahibaro
Discord Login Register

Managed OpenShift services

What “Managed OpenShift” Means

In a managed OpenShift service, the cloud or platform provider runs and operates the OpenShift control plane and most of the underlying infrastructure for you. You consume OpenShift as a service rather than installing and operating the cluster yourself.

Key characteristics:

This contrasts with self-managed installation models (IPI/UPI) where you are fully responsible for the lifecycle of both the cluster and the underlying infrastructure.

Typical Managed OpenShift Offerings

Managed OpenShift offerings are usually delivered as cloud services. The naming and exact feature sets vary, but they have common patterns.

Common examples (names may differ slightly over time / by region):

While concrete details differ, the underlying principle is the same: you consume OpenShift as a managed platform with a shared responsibility model.

Shared Responsibility Model

Managed services do not eliminate responsibility; they redistribute it.

A typical division of responsibilities:

Managed OpenShift services often publish explicit shared responsibility matrices; it is important to understand these for operational planning and audits.

Control Plane and Infrastructure Management

In managed OpenShift, the control plane is not something you log into or directly administer:

For many users, this is a benefit: less operational overhead and fewer ways to break the cluster. For advanced or specialized workloads, these restrictions can be a limitation and need to be considered early.

Cluster Provisioning Workflow in Managed Services

Although details vary by provider, most managed OpenShift services follow a similar high-level workflow:

  1. Cluster request / creation
    • You use:
      • A cloud provider console or marketplace UI, or
      • A CLI (rosa, az aro, or provider-specific tooling), or
      • An API or Terraform/Ansible integration
    • You specify:
      • Region/availability zones
      • Cluster name and version (from supported versions)
      • Network settings (VPC/VNet, CIDR ranges, private/public API)
      • Node pool characteristics (instance types, counts, autoscaling ranges)
      • Identity integration options (e.g., IAM roles, AAD groups)
  2. Automated provisioning
    • The service:
      • Creates necessary infrastructure (VPC/VNet resources, subnets, load balancers, security groups, etc.) in a provider-managed account or in your own account, depending on the model
      • Deploys OpenShift control plane
      • Sets up Operators, ingress, monitoring, and storage integration as per the service defaults
  3. Cluster access
    • You receive:
      • Web console URL
      • API endpoint URL
      • kubeconfig or oc login mechanism (usually integrated with cloud IAM or your identity provider)
    • Onboarding may include:
      • Default admin roles
      • Recommendations for initial RBAC and project structure
  4. Ongoing operations
    • Provider:
      • Monitors cluster health
      • Applies upgrades/patches on agreed schedules or windows
    • You:
      • Deploy and manage applications
      • Adjust node pools and autoscaling as workloads evolve
      • Configure cluster policies within allowed scope

Upgrade and Patch Management in Managed Services

One of the main benefits of managed OpenShift is delegated lifecycle management:

Networking Considerations in Managed OpenShift

Managed services strongly influence how networking is set up and what you can customize.

Typical aspects:

When planning, you must align managed service constraints with organizational network policies, especially in regulated environments.

Storage and Data in Managed OpenShift Services

In managed OpenShift, persistent storage is often implemented using the underlying cloud’s native storage services. The storage integration is preconfigured and supported as part of the service.

Common patterns:

Identity, Access Control, and Security in Managed Services

Managed OpenShift services typically integrate tightly with the cloud or enterprise identity ecosystem.

Key points:

Understanding both OpenShift-level and cloud-level security policy layers is critical for designing secure multi-tenant use of a managed cluster.

Cost and Capacity Management in Managed OpenShift

Managed OpenShift bundles platform operations into a service fee structure. Costs usually break down into:

Managed services make direct operations cheaper in staff time, but require active capacity and cost governance to avoid overspending.

When to Use Managed OpenShift vs Self-Managed

Managed OpenShift services are not always the right fit. Some considerations:

Often organizations use a hybrid approach: managed OpenShift in public clouds for most workloads, and self-managed clusters in specialized environments.

Practical Implications for Day-to-Day Use

For developers and platform users, working on a managed OpenShift cluster typically feels the same as working on any other OpenShift cluster:

Understanding these boundaries helps you design applications and internal processes that align with the capabilities and constraints of your chosen managed OpenShift service.

Views: 10

Comments

Please login to add a comment.

Don't have an account? Register now!