You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|The number (integer) of worker nodes to provision per zone. Single-zone clusters require at least 2 nodes. Multi-zone clusters require at least 3 nodes. Default: `2` for single-az; `3` for multi-az
85
128
129
+
|--controlplane-iam-role string
130
+
|The Amazon Resource Name (ARN) of the IAM role that will be attached to control plane instances.
131
+
86
132
|--disable-scp-checks
87
133
|Indicates whether cloud permission checks are disabled when attempting to install a cluster.
|The AWS region (string) where your worker pool will be located. This argument overrides the `AWS_REGION` environment variable.
121
167
168
+
|--role-arn string
169
+
|The Amazon Resource Name (ARN) of the installer role that {cluster-manager} will assume to create the cluster.
170
+
122
171
|--service-cidr
123
172
|Block of IP addresses (ipNet) for services. Example: `172.30.0.0/16`
124
173
125
174
|--subnet-ids
126
175
|The subnet IDs (string) to use when installing the cluster. Subnet IDs must be in pairs with one private subnet ID and one public subnet ID per availability zone. Subnets are comma-delimited. Example: `--subnet-ids=subnet-1,subnet-2`. Leave the value empty for installer-provisioned subnet IDs.
127
176
128
-
129
177
When using `--private-link`, the `--subnet-ids` argument is required and only one private subnet is allowed per zone.
130
178
179
+
|--support-role-arn string
180
+
|The Amazon Resource Name (ARN) of the role used by Red Hat Site Reliabilty Engineers (SREs) to enable access to the cluster account to provide support.
181
+
131
182
|--version
132
183
|The version (string) of OpenShift Container Platform that will be used to install the cluster. Example: `4.3.10`
184
+
185
+
|--worker-iam-role string
186
+
|The Amazon Resource Name (ARN) of the IAM role that will be attached to compute instances.
133
187
|===
134
188
135
189
.Optional arguments inherited from parent commands
= ARN path customization for IAM roles and policies
8
+
9
+
When you create the AWS IAM roles and policies required for {product-title} (ROSA) clusters that use the AWS Security Token Service (STS), you can specify custom Amazon Resource Name (ARN) paths. This enables you to use role and policy ARN paths that meet the security requirements of your organization.
10
+
11
+
You can specify custom ARN paths when you create your OCM role, user role, and account-wide roles and policies.
12
+
13
+
If you define a custom ARN path when you create a set of account-wide roles and policies, the same path is applied to all of the roles and policies in the set. The following example shows the ARNs for a set of account-wide roles and policies. In the example, the ARNs use the custom path `/test/path/dev/` and the custom role prefix `test-env`:
When you create the cluster-specific Operator roles, the ARN path for the relevant account-wide installer role is automatically detected and applied to the Operator roles.
25
+
26
+
For more information about ARN paths, see link:https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html[Amazon Resource Names (ARNs)] in the AWS documentation.
Copy file name to clipboardExpand all lines: modules/rosa-sts-creating-a-cluster-using-defaults-ocm.adoc
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,9 +39,7 @@ endif::[]
39
39
40
40
. On the *Create an OpenShift cluster* page, select *Create cluster* in the *{product-title} (ROSA)* row.
41
41
42
-
. Review and complete the *Prerequisites* listed on the *Accounts and roles* page. Select the checkbox to acknowledge that you have read and completed all of the prerequisites.
43
-
44
-
. Verify that your AWS account ID is listed in the *Associated AWS accounts* drop-down menu and that the installer, support, worker, and control plane account role Amazon Resource Names (ARNs) are listed on the *Accounts and roles* page.
42
+
. Verify that your AWS account ID is listed in the *Associated AWS accounts* drop-down menu and that the installer, support, worker, and control plane account role Amazon Resource Names (ARNs) are listed on the *Accounts and roles* page.
Copy file name to clipboardExpand all lines: modules/rosa-sts-creating-a-cluster-with-customizations-cli.adoc
+60-5Lines changed: 60 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,57 @@ To successfully install ROSA clusters, use latest version of the ROSA CLI.
42
42
+
43
43
[source,terminal]
44
44
----
45
-
$ rosa create account-roles --mode manual <1>
45
+
$ rosa create account-roles --interactive \ <1>
46
+
--mode manual <2>
46
47
----
47
-
<1> `manual` mode generates the `aws` CLI commands and JSON files needed to create the account-wide roles and policies. After review, you must run the commands manually to create the resources.
48
+
<1> `interactive` mode enables you to specify configuration options at the interactive prompts. For more information, see _Interactive cluster creation mode reference_.
49
+
<2> `manual` mode generates the `aws` CLI commands and JSON files needed to create the account-wide roles and policies. After review, you must run the commands manually to create the resources.
50
+
+
51
+
--
52
+
.Example output
53
+
[source,terminal]
54
+
----
55
+
I: Logged in as '<red_hat_username>' on 'https://api.openshift.com'
56
+
I: Validating AWS credentials...
57
+
I: AWS credentials are valid!
58
+
I: Validating AWS quota...
59
+
I: AWS quota ok. If cluster installation fails, validate actual AWS resource usage against https://docs.openshift.com/rosa/rosa_getting_started/rosa-required-aws-service-quotas.html
60
+
I: Verifying whether OpenShift command-line tool is available...
61
+
I: Current OpenShift Client Version: 4.11.6
62
+
I: Creating account roles
63
+
? Role prefix: ManagedOpenShift <1>
64
+
? Permissions boundary ARN (optional): <2>
65
+
? Path (optional): [? for help] <3>
66
+
? Role creation mode: auto <4>
67
+
I: Creating roles using 'arn:aws:iam::<aws_account_number>:user/<aws_username>'
68
+
? Create the 'ManagedOpenShift-Installer-Role' role? Yes <5>
69
+
I: Created role 'ManagedOpenShift-Installer-Role' with ARN 'arn:aws:iam::<aws_account_number>:role/ManagedOpenShift-Installer-Role'
70
+
? Create the 'ManagedOpenShift-ControlPlane-Role' role? Yes <5>
71
+
I: Created role 'ManagedOpenShift-ControlPlane-Role' with ARN 'arn:aws:iam::<aws_account_number>:role/ManagedOpenShift-ControlPlane-Role'
72
+
? Create the 'ManagedOpenShift-Worker-Role' role? Yes <5>
73
+
I: Created role 'ManagedOpenShift-Worker-Role' with ARN 'arn:aws:iam::<aws_account_number>:role/ManagedOpenShift-Worker-Role'
74
+
? Create the 'ManagedOpenShift-Support-Role' role? Yes <5>
75
+
I: Created role 'ManagedOpenShift-Support-Role' with ARN 'arn:aws:iam::<aws_account_number>:role/ManagedOpenShift-Support-Role'
76
+
I: To create a cluster with these roles, run the following command:
77
+
rosa create cluster --sts
78
+
----
79
+
<1> Specify the prefix to include in the {cluster-manager} IAM role name. The default is `ManagedOpenShift`.
80
+
+
81
+
[IMPORTANT]
82
+
====
83
+
You must specify an account-wide role prefix that is unique across your AWS account, even if you use a custom ARN path for your account roles.
84
+
====
85
+
+
86
+
<2> Optional: Specifies a permissions boundary Amazon Resource Name (ARN) for the role. For more information, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html[Permissions boundaries for IAM entities] in the AWS documentation.
87
+
<3> Specify a custom ARN path for your account-wide roles. The path must contain alphanumeric characters only and start and end with `/`, for example `/test/path/dev/`. For more information, see _ARN path customization for IAM roles and policies_.
88
+
<4> Select the role creation mode. You can use `auto` mode to automatically create the account wide roles and policies. In `manual` mode, the `rosa` CLI generates the `aws` commands needed to create the roles and policies. In `manual` mode, the corresponding policy JSON files are also saved to the current directory. `manual` mode enables you to review the details before running the `aws` commands manually.
89
+
<5> Creates the account-wide installer, control plane, worker and support roles and corresponding IAM policies. For more information, see _Account-wide IAM role and policy reference_.
90
+
+
91
+
[NOTE]
92
+
====
93
+
In this step, the ROSA CLI also automatically creates the account-wide Operator IAM policies that are used by the cluster-specific Operator policies to permit the ROSA cluster Operators to carry out core OpenShift functionality. For more information, see _Account-wide IAM role and policy reference_.
94
+
====
95
+
--
48
96
+
49
97
.. After review, run the `aws` commands manually to create the roles and policies. Alternatively, you can run the preceding command using `--mode auto` to run the `aws` commands immediately.
50
98
@@ -168,6 +216,7 @@ I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role for th
168
216
? AWS region: us-east-1
169
217
? PrivateLink cluster (optional): No
170
218
? Install into an existing VPC (optional): No
219
+
? Select availability zones (optional): No
171
220
? Enable Customer Managed key (optional): No <5>
172
221
? Compute nodes instance type (optional):
173
222
? Enable autoscaling (optional): No
@@ -184,12 +233,16 @@ I: To create this cluster again in the future, you can run:
184
233
I: To view a list of clusters and their status, run 'rosa list clusters'
185
234
I: Cluster '<cluster_name>' has been created.
186
235
I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.
187
-
I: To determine when your cluster is Ready, run 'rosa describe cluster -c <cluster_name>'.
188
-
I: To watch your cluster installation logs, run 'rosa logs install -c <cluster_name> --watch'.
236
+
...
189
237
----
190
238
<1> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.8.9`.
191
-
<2> If more than one matching set of account-wide roles are available in your account for a cluster version, an interactive list of options is provided.
239
+
<2> If you have more than one set of account roles in your AWS account for your cluster version, an interactive list of options is provided.
192
240
<3> Optional: By default, the cluster-specific Operator role names are prefixed with the cluster name and random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
241
+
+
242
+
[NOTE]
243
+
====
244
+
If you specified custom ARN paths when you created the associated account-wide roles, the custom path is automatically detected. The custom path is applied to the cluster-specific Operator roles when you create them in a later step.
245
+
====
193
246
<4> Multiple availability zones are recommended for production workloads. The default is a single availability zone.
194
247
<5> Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN to in the preceding step.
A custom prefix is applied to the Operator role names if you specified the prefix in the preceding step.
286
+
287
+
If you specified custom ARN paths when you created the associated account-wide roles, the custom path is automatically detected and applied to the Operator roles.
233
288
====
234
289
235
290
. Create the OpenID Connect (OIDC) provider that the cluster Operators use to authenticate:
0 commit comments