You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I: To view a list of clusters and their status, run 'rosa list clusters'
254
257
I: Cluster '<cluster_name>' has been created.
255
258
I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.
256
259
...
257
260
----
258
-
<1> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.13.4`.
259
-
<2> Optional: Specify 'optional' to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify 'required' to configure all EC2 instances to use IMDSv2 only.
261
+
<1> When creating your cluster, you can create a local administrator user for your cluster. Selecting `Yes` then prompts you to create a user name and password for the cluster admin. The user name must not contain `/`, `:`, or `%`. The password must be at least 14 characters (ASCII-standard) without whitespaces. This process automatically configures an htpasswd identity provider.
262
+
<2> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.13.4`.
263
+
<3> Optional: Specify 'optional' to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify 'required' to configure all EC2 instances to use IMDSv2 only.
260
264
+
261
265
[IMPORTANT]
262
266
====
263
267
The Instance Metadata Service settings cannot be changed after your cluster is created.
264
268
====
265
-
<3> If you have more than one set of account roles in your AWS account for your cluster version, an interactive list of options is provided.
266
-
<4> By default, the cluster-specific Operator role names are prefixed with the cluster name and random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
269
+
<4> If you have more than one set of account roles for your cluster version in your AWS account, an interactive list of options is provided.
270
+
<5> By default, the cluster-specific Operator role names are prefixed with the cluster name and a random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
267
271
+
268
272
[NOTE]
269
273
====
270
274
If you specified custom ARN paths when you created the associated account-wide roles, the custom path is automatically detected. The custom path is applied to the cluster-specific Operator roles when you create them in a later step.
271
275
====
272
-
<5> Optional: Multiple availability zones are recommended for production workloads. The default is a single availability zone.
273
-
<6> Optional: Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN to in the preceding step.
276
+
<6> Optional: Multiple availability zones are recommended for production workloads. The default is a single availability zone.
277
+
<7> Optional: Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN in the preceding step.
274
278
+
275
279
[IMPORTANT]
276
280
====
@@ -279,14 +283,14 @@ Only persistent volumes (PVs) created from the default storage class are encrypt
279
283
PVs created by using any other storage class are still encrypted, but the PVs are not encrypted with this key unless the storage class is specifically configured to use this key.
280
284
====
281
285
282
-
<7> Optional: Enable this option only if your use case requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted, but not the keys.
286
+
<8> Optional: Only enable this option if your use case requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted but not the keys.
283
287
+
284
288
[IMPORTANT]
285
289
====
286
290
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
287
291
====
288
292
+
289
-
<8> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
293
+
<9> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
290
294
--
291
295
+
292
296
As an alternative to using the `--interactive` mode, you can specify the customization options directly when you run the `rosa create cluster` command. Run the `rosa create cluster --help` command to view a list of available CLI options, or see _create cluster_ in _Managing objects with the ROSA CLI_.
Copy file name to clipboardExpand all lines: modules/rosa-sts-interactive-cluster-creation-mode-options.adoc
+43-9Lines changed: 43 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,16 @@ The following table describes the interactive cluster creation mode options:
19
19
|`Cluster name`
20
20
|Enter a name for your cluster, for example `my-rosa-cluster`.
21
21
22
+
|`Deploy cluster with Hosted Control Plane (optional)`
23
+
|Enable the use of Hosted Control Planes.
24
+
[IMPORTANT]
25
+
====
26
+
The ROSA with Hosted Control Planes functionality is currently offered as a Technology Preview. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete.
27
+
====
28
+
29
+
|`Create cluster admin user`
30
+
|Create a cluster administrator user when you create your cluster using the htpasswd identity provider. The username must not contain `/`, `:`, or `%`. The password must be at least 14 characters (ASCII-standard) without whitespaces.
31
+
22
32
|`Deploy cluster using AWS STS`
23
33
|Create an OpenShift cluster that uses the AWS Security Token Service (STS) to allocate temporary, limited-privilege credentials for component-specific AWS Identity and Access Management (IAM) roles. The service enables cluster components to make AWS API calls using secure cloud resource management practices. The default is `Yes`.
24
34
@@ -37,6 +47,12 @@ The following table describes the interactive cluster creation mode options:
37
47
|`Operator roles prefix`
38
48
|Enter a prefix to assign to the cluster-specific Operator IAM roles. The default is the name of the cluster and a 4-digit random string, for example `my-rosa-cluster-a0b1`.
39
49
50
+
|`Deploy cluster using pre registered OIDC Configuration ID`
51
+
|Specify if you want to use a pre-configured OIDC configuration or if you want to create a new OIDC configuration as part of the cluster creation process.
52
+
53
+
|`Tags (optional)`
54
+
|Specify a tag that is used on all resources created by ROSA in AWS. Tags are comma separated, for example: "key value, foo bar".
55
+
40
56
|`Multiple availability zones (optional)`
41
57
|Deploy the cluster to multiple availability zones in the AWS region. The default is `No`, which results in a cluster being deployed to a single availability zone. If you deploy a cluster into multiple availability zones, the AWS region must have at least 3 availability zones. Multiple availability zones are recommended for production workloads.
42
58
@@ -46,6 +62,15 @@ The following table describes the interactive cluster creation mode options:
46
62
|`PrivateLink cluster (optional)`
47
63
|Create a cluster using AWS PrivateLink. This option provides private connectivity between Virtual Private Clouds (VPCs), AWS services, and your on-premise networks, without exposing your traffic to the public internet. To provide support, Red Hat Site Reliability Engineering (SRE) can connect to the cluster by using AWS PrivateLink Virtual Private Cloud (VPC) endpoints. This option cannot be changed after a cluster is created. The default is `No`.
48
64
65
+
|`Machine CIDR`
66
+
|Specify the IP address range for machines (cluster nodes), which must encompass all CIDR address ranges for your VPC subnets. Subnets must be contiguous. A minimum IP address range of 128 addresses, using the subnet prefix `/25`, is supported for single availability zone deployments. A minimum address range of 256 addresses, using the subnet prefix `/24`, is supported for deployments that use multiple availability zones. The default is `10.0.0.0/16`. This range must not conflict with any connected networks.
67
+
68
+
|`Service CIDR`
69
+
|Specify the IP address range for services. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `172.30.0.0/16`. It is recommended that the address ranges are the same between clusters.
70
+
71
+
|`Pod CIDR`
72
+
|Specify the IP address range for pods. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `10.128.0.0/14`. It is recommended that they are the same between clusters.
73
+
49
74
|`Install into an existing VPC (optional)`
50
75
|Install a cluster into an existing AWS VPC. To use this option, your VPC must have 2 subnets for each availability zone that you are installing the cluster into. The default is `No`.
51
76
@@ -64,19 +89,16 @@ The following table describes the interactive cluster creation mode options:
64
89
|`Compute nodes`
65
90
|Specify the number of compute nodes to provision into each availability zone. Clusters deployed in a single availability zone require at least 2 nodes. Clusters deployed in multiple zones must have at least 3 nodes. The maximum number of worker nodes is 180 nodes. The default value is `2`.
66
91
67
-
|`Machine CIDR`
68
-
|Specify the IP address range for machines (cluster nodes), which must encompass all CIDR address ranges for your VPC subnets. Subnets must be contiguous. A minimum IP address range of 128 addresses, using the subnet prefix `/25`, is supported for single availability zone deployments. A minimum address range of 256 addresses, using the subnet prefix `/24`, is supported for deployments that use multiple availability zones. The default is `10.0.0.0/16`. This range must not conflict with any connected networks.
69
-
70
-
|`Service CIDR`
71
-
|Specify the IP address range for services. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `172.30.0.0/16`. It is recommended that they are the same between clusters.
72
-
73
-
|`Pod CIDR`
74
-
|Specify the IP address range for pods. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `10.128.0.0/14`. It is recommended that they are the same between clusters.
92
+
|`Default machine pool labels (optional)`
93
+
|Specify the labels for the default machine pool. The label format should be a comma-separated list of key-value pairs. This list will overwrite any modifications made to node labels on an ongoing basis.
75
94
76
95
|`Host prefix`
77
96
|Specify the subnet prefix length assigned to pods scheduled to individual machines. The host prefix determines the pod IP address pool for each machine. For example, if the host prefix is set to `/23`, each machine is assigned a `/23` subnet from the pod CIDR address range. The default is `/23`, allowing 512 cluster nodes and 512 pods per node, both of which are beyond our supported maximums. For information on the supported maximums, see the Additional resources section below.
78
97
79
-
|`fips (optional)`
98
+
|`Machine pool root disk size (GiB or TiB)`
99
+
|Specify the size of the machine pool root disk. This value must include a unit suffix like GiB or TiB, for example the default value of `300GiB`.
100
+
101
+
|`Enable FIPS support (optional)`
80
102
|Enable or disable FIPS mode. The default is `false` (disabled). If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with RHCOS instead.
81
103
[IMPORTANT]
82
104
====
@@ -94,4 +116,16 @@ By enabling etcd encryption for the key values in etcd, you will incur a perform
94
116
|`Disable workload monitoring (optional)`
95
117
|Disable monitoring for user-defined projects. Monitoring for user-defined projects is enabled by default.
96
118
119
+
|`Route Selector for ingress (optional)`
120
+
|Specify the route selector for your ingress. The format should be a comma-separated list of `key=value`. If you do not specify a label, all routes will be exposed on both routers. For legacy ingress support, these labels are inclusion labels; otherwise, they are treated as exclusion label.
121
+
122
+
|`Excluded namespaces for ingress (optional)`
123
+
|Specify the excluded namespaces for your ingress. The format should be a comma-separated list `value1, value2...`. If you do not specify any values, all namespaces will be exposed.
124
+
125
+
|`Wildcard Policy (optional, choose 'Skip' to skip selection. The default value will be supplied.)`
126
+
|Choose the wildcard policy for your ingress. The options are `WildcardsDisallowed` and `WildcardsAllowed`. Default is `WildcardsDisallowed`.
127
+
128
+
|`Namespace Ownership Policy (optional, choose 'Skip' to skip selection. The default value will be supplied.)`
129
+
|Choose the namespace ownership policy for your ingress. The options are `Strict` and `InterNamespaceAllowed`. The default is `Strict`.
0 commit comments