@@ -5,7 +5,7 @@ CAPA controller requires an API token in order to be able to provision ROSA clus
5
5
6
6
1 . Visit [ https://console.redhat.com/openshift/token ] ( https://console.redhat.com/openshift/token ) to retrieve your API authentication token
7
7
8
- 1 . Create a credentials secret with the token to be referenced later by ` ROSAControlePlane `
8
+ 1 . Create a credentials secret within the target namespace with the token to be referenced later by ` ROSAControlePlane `
9
9
``` shell
10
10
kubectl create secret generic rosa-creds-secret \
11
11
--from-literal=ocmToken=' eyJhbGciOiJIUzI1NiIsI....' \
@@ -39,7 +39,7 @@ Once Step 3 is done, you will be ready to proceed with creating a ROSA cluster u
39
39
export OPENSHIFT_VERSION=" 4.14.5"
40
40
export AWS_REGION=" us-west-2"
41
41
export AWS_AVAILABILITY_ZONE=" us-west-2a"
42
- export AWS_ACCOUNT_ID=" <account_id"
42
+ export AWS_ACCOUNT_ID=" <account_id> "
43
43
export AWS_CREATOR_ARN=" <user_arn>" # can be retrieved e.g. using ` aws sts get-caller-identity`
44
44
45
45
export OIDC_CONFIG_ID=" <oidc_id>" # OIDC config id creating previously with ` rosa create oidc-config`
@@ -55,8 +55,9 @@ Once Step 3 is done, you will be ready to proceed with creating a ROSA cluster u
55
55
` ` ` shell
56
56
clusterctl generate cluster < cluster-name> --from templates/cluster-template-rosa.yaml > rosa-capi-cluster.yaml
57
57
` ` `
58
+ Note: The AWS role name must be no more than 64 characters in length. Otherwise an error will be returned. Truncate values exceeding 64 characters.
58
59
59
- 1. If a credentials secret was created earlier, edit ` ROSAControlPlane` to refernce it:
60
+ 1. If a credentials secret was created earlier, edit ` ROSAControlPlane` to reference it:
60
61
` ` ` yaml
61
62
apiVersion: controlplane.cluster.x-k8s.io/v1beta2
62
63
kind: ROSAControlPlane
@@ -81,7 +82,7 @@ Once Step 3 is done, you will be ready to proceed with creating a ROSA cluster u
81
82
...
82
83
` ` `
83
84
84
- Otherwise, make sure the following ` AWSClusterControllerIdentity` singleton exists in your managment cluster:
85
+ Otherwise, make sure the following ` AWSClusterControllerIdentity` singleton exists in your management cluster:
85
86
` ` ` yaml
86
87
apiVersion: infrastructure.cluster.x-k8s.io/v1beta2
87
88
kind: AWSClusterControllerIdentity
0 commit comments