You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|Configures the use of IMDSv2 for EC2 instances. Valid values are `optional` (default) or `required`.
139
+
137
140
|--enable-autoscaling
138
141
|Enables autoscaling of compute nodes. By default, autoscaling is set to `2` nodes. To set non-default node limits, use this argument with the `--min-replicas` and `--max-replicas` arguments.
You can select your Instance Metadata Service (IMDS) type when creating your cluster in the ROSA CLI. You can select to use both IMDSv1 and IMDSv2, or you can select only IMDSv2.
10
+
11
+
.Prerequisites
12
+
13
+
* You installed and configured the latest AWS (`aws`), ROSA (`rosa`), and OpenShift (`oc`) CLIs on your workstation.
14
+
* You logged in to your Red Hat account using the `rosa` CLI.
15
+
* You have the permissions to create and manage clusters.
16
+
17
+
.Procedure
18
+
19
+
. In your terminal, create a ROSA cluster with your specifications by running the following command:
20
+
+
21
+
[source,terminal]
22
+
----
23
+
$ rosa create cluster --cluster <name_of_cluster> --ec2-metadata-http-tokens <required_or_optional> <1>
24
+
----
25
+
+
26
+
<1> You can provide a value for the `--ec2-metadata-http-tokens` flag. Provide the `required` value to enable IMDSv2, or provide the `optional` value for a combination of IMDSv1 and IMDSv2. If you do not include this flag, you must select your IMDS type during the cluster creation prompts.
27
+
28
+
. Confirm the selection:
29
+
+
30
+
[source,terminal]
31
+
----
32
+
? Configure the use of IMDSv2 for ec2 instances optional/required: required
33
+
----
34
+
35
+
.Verification
36
+
37
+
* After your cluster has been created, navigate to the cluster *Overview* tab in {cluster-manager-url} to see the *Instance Metadata Service (IMDS)* field that notes your IMDS version support.
= Enabling Instance Metadata Service in {cluster-manager}
8
+
9
+
You can select your Instance Metadata Service (IMDS) type when creating your cluster in {cluster-manager}. You can select both IMDSv1 and IMDSv2, or you can select only IMDSv2.
10
+
11
+
.Prerequisites
12
+
13
+
* You installed and configured the latest AWS (`aws`), ROSA (`rosa`), and OpenShift (`oc`) CLIs on your workstation.
14
+
* You logged in to your Red Hat account by using the `rosa` CLI.
15
+
* You have the permissions to create and manage clusters.
16
+
* You have access to {cluster-manager-url}.
17
+
18
+
.Procedure
19
+
20
+
. Log in to the web console.
21
+
. Create a ROSA cluster using your preferences.
22
+
. In the *Create a ROSA Cluster** wizard on the **Cluster settings* -> *Machine pool* page, under the *Instance Metadata Service (IMDS)* section, select whether your machine pools use both IMDSv1 and IMDSv2, or only IMDSv2.
23
+
. Select *Next* to save this selection.
24
+
25
+
.Verification
26
+
27
+
. After your cluster has been created, see the *Instance Metadata Service (IMDS)* field that notes your IMDS version support on the cluster *Overview* tab.
There are two types of ways to access instance metadata from a running instance:
10
+
11
+
* Instance Metadata Service Version 1 (IMDSv1) - a request/response method
12
+
* Instance Metadata Service Version 2 (IMDSv2) - a session-oriented method
13
+
14
+
IMDSv2 uses session-oriented requests. With session-oriented requests, you create a session token that defines the session duration, which can be a minimum of one second and a maximum of six hours. During the specified duration, you can use the same session token for subsequent requests. After the specified duration expires, you must create a new session token to use for future requests.
15
+
16
+
When creating your ROSA cluster, you can configure your cluster to use both IMDSv1 and IMDSv2, or only IMDSv2. The instance metadata service distinguishes between IMDSv1 and IMDSv2 requests based on whether, for any given request, either the PUT or GET headers, which are unique to IMDSv2, are present in that request. If you specify to use IMDSv2 only, IMDSv1 ceases to function for your cluster. All machine pools on your cluster will use whichever IMDS type you select.
I: To view a list of clusters and their status, run 'rosa list clusters'
252
254
I: Cluster '<cluster_name>' has been created.
253
255
I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.
254
256
...
255
257
----
256
-
<1> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.8.9`.
257
-
<2> If you have more than one set of account roles in your AWS account for your cluster version, an interactive list of options is provided.
258
-
<3> Optional: By default, the cluster-specific Operator role names are prefixed with the cluster name and random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
258
+
<1> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.13.4`.
259
+
<2> Optional: Specify 'optional' to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify 'required' to configure all EC2 instances to use IMDSv2 only.
260
+
+
261
+
[IMPORTANT]
262
+
====
263
+
The Instance Metadata Service settings cannot be changed after your cluster is created.
264
+
====
265
+
<3> If you have more than one set of account roles in your AWS account for your cluster version, an interactive list of options is provided.
266
+
<4> By default, the cluster-specific Operator role names are prefixed with the cluster name and random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
259
267
+
260
268
[NOTE]
261
269
====
262
270
If you specified custom ARN paths when you created the associated account-wide roles, the custom path is automatically detected. The custom path is applied to the cluster-specific Operator roles when you create them in a later step.
263
271
====
264
-
<4> Multiple availability zones are recommended for production workloads. The default is a single availability zone.
265
-
<5> Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN to in the preceding step.
272
+
<5> Optional: Multiple availability zones are recommended for production workloads. The default is a single availability zone.
273
+
<6> Optional: Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN to in the preceding step.
266
274
+
267
275
[IMPORTANT]
268
276
====
@@ -271,14 +279,14 @@ Only persistent volumes (PVs) created from the default storage class are encrypt
271
279
PVs created by using any other storage class are still encrypted, but the PVs are not encrypted with this key unless the storage class is specifically configured to use this key.
272
280
====
273
281
274
-
<6> Enable this option only if your use case requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted, but not the keys.
282
+
<7> Optional: Enable this option only if your use case requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted, but not the keys.
275
283
+
276
284
[IMPORTANT]
277
285
====
278
286
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
279
287
====
280
288
+
281
-
<7> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
289
+
<8> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
282
290
--
283
291
+
284
292
As an alternative to using the `--interactive` mode, you can specify the customization options directly when you run the `rosa create cluster` command. Run the `rosa create cluster --help` command to view a list of available CLI options, or see _create cluster_ in _Managing objects with the ROSA CLI_.
Copy file name to clipboardExpand all lines: modules/rosa-sts-creating-a-cluster-with-customizations-ocm.adoc
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -264,6 +264,13 @@ Alternatively, you can set your autoscaling preferences for the default machine
264
264
** If you deployed your cluster using a single availability zone, select a *Compute node count* from the drop-down menu. This defines the number of compute nodes to provision to the machine pool for the zone.
265
265
** If you deployed your cluster using multiple availability zones, select a *Compute node count (per zone)* from the drop-down menu. This defines the number of compute nodes to provision to the machine pool per zone.
266
266
267
+
. Optional: Select an EC2 Instance Metadata Service (IMDS) configuration - `optional` (default) or `required` - to enforce use of IMDSv2. For more information regarding IMDS, see link:https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html[Instance metadata and user data] in the AWS documentation.
268
+
+
269
+
[IMPORTANT]
270
+
====
271
+
The Instance Metadata Service settings cannot be changed after your cluster is created.
272
+
====
273
+
267
274
. Optional: Expand *Edit node labels* to add labels to your nodes. Click *Add label* to add more node labels and select *Next*.
268
275
269
276
. In the *Cluster privacy* section of the *Network configuration* page, select *Public* or *Private* to use either public or private API endpoints and application routes for your cluster.
Copy file name to clipboardExpand all lines: modules/rosa-sts-interactive-cluster-creation-mode-options.adoc
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,9 @@ The following table describes the interactive cluster creation mode options:
25
25
|`OpenShift version`
26
26
|Select the version of OpenShift to install, for example {product-version}. The default is the latest version.
27
27
28
+
|`Configure the use of IMDSv2 for ec2 instances optional/required (optional)`
29
+
|Specify whether all EC2 instances will use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS)(optional) or only IMDSv2 (required).
30
+
28
31
|`Installer role ARN`
29
32
|If you have more than one set of account roles in your AWS account for your cluster version, a list of installer role ARNs are provided. Select the ARN for the installer role that you want to use with your cluster. The cluster uses the account-wide roles and policies that relate to the selected installer role.
cluster with the AWS Security Token Service (STS) by using the default installation options. The following summary describes the default cluster specifications.
26
26
@@ -45,6 +45,7 @@ ifndef::rosa-hcp[]
45
45
* Default AWS region for installations using the {cluster-manager-first}{hybrid-console-second}: us-east-1 (US East, North Virginia)
46
46
endif::rosa-hcp[]
47
47
* Default AWS region for installations using the ROSA CLI (`rosa`): Defined by your `aws` CLI configuration
48
+
* Default EC2 IMDS endpoints (both v1 and v2) are enabled
* For more information about labels, see link:https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/[Kubernetes Labels and Selectors overview].
* For more information about Instance Metadata Service, see link:https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html[Use IMDSv2] in the AWS documentation.
39
+
// * For more information about Instance Metadata Service, see link:https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html[Use IMDSv2] in the AWS documentation.
* xref:../cli_reference/rosa_cli/rosa-manage-objects-cli.adoc#rosa-create-cluster-command_rosa-managing-objects-cli[create cluster] in _Managing objects with the ROSA CLI_.
0 commit comments