Skip to content

Commit 2b17df5

Browse files
authored
Merge pull request #63506 from EricPonvelle/OSDOCS-6912_Cluster-Admin
OSDOCS-6913: Added documentation for creating a cluster admin when creating a cluster
2 parents 0e2ff81 + 03e2ccf commit 2b17df5

3 files changed

+64
-25
lines changed

modules/rosa-sts-creating-a-cluster-with-customizations-cli.adoc

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -224,53 +224,57 @@ I: Interactive mode enabled.
224224
Any optional fields can be left empty and a default will be selected.
225225
? Cluster name: <cluster_name>
226226
Deploy cluster with Hosted Control Plane (optional): No
227-
? OpenShift version: 4.13.4 <1>
228-
? Configure the use of IMDSv2 for ec2 instances optional/required (optional): <2>
229-
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role for the Installer role <3>
227+
? Create cluster admin user: Yes <1>
228+
? Username: user-admin <1>
229+
? Password: [? for help] *************** <1>
230+
? OpenShift version: 4.13.4 <2>
231+
? Configure the use of IMDSv2 for ec2 instances optional/required (optional): <3>
232+
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role for the Installer role <4>
230233
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role for the ControlPlane role
231234
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role for the Worker role
232235
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role for the Support role
233236
? External ID (optional):
234-
? Operator roles prefix: <cluster_name>-<random_string> <4>
235-
? Multiple availability zones (optional): No <5>
237+
? Operator roles prefix: <cluster_name>-<random_string> <5>
238+
? Multiple availability zones (optional): No <6>
236239
? AWS region: us-east-1
237240
? PrivateLink cluster (optional): No
238241
? Install into an existing VPC (optional): No
239242
? Select availability zones (optional): No
240-
? Enable Customer Managed key (optional): No <6>
243+
? Enable Customer Managed key (optional): No <7>
241244
? Compute nodes instance type (optional):
242245
? Enable autoscaling (optional): No
243246
? Compute nodes: 2
244247
? Machine CIDR: 10.0.0.0/16
245248
? Service CIDR: 172.30.0.0/16
246249
? Pod CIDR: 10.128.0.0/14
247250
? Host prefix: 23
248-
? Encrypt etcd data (optional): No <7>
251+
? Encrypt etcd data (optional): No <8>
249252
? Disable Workload monitoring (optional): No
250253
I: Creating cluster '<cluster_name>'
251254
I: To create this cluster again in the future, you can run:
252-
rosa create cluster --cluster-name <cluster_name> --role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role --support-role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role --master-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role --worker-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role --operator-roles-prefix <cluster_name>-<random_string> --region us-east-1 --version 4.8.9 --compute-nodes 2 --machine-cidr 10.0.0.0/16 --service-cidr 172.30.0.0/16 --pod-cidr 10.128.0.0/14 --host-prefix 23 <8>
255+
rosa create cluster --cluster-name <cluster_name> --role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role --support-role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role --master-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role --worker-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role --operator-roles-prefix <cluster_name>-<random_string> --region us-east-1 --version 4.8.9 --compute-nodes 2 --machine-cidr 10.0.0.0/16 --service-cidr 172.30.0.0/16 --pod-cidr 10.128.0.0/14 --host-prefix 23 <9>
253256
I: To view a list of clusters and their status, run 'rosa list clusters'
254257
I: Cluster '<cluster_name>' has been created.
255258
I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.
256259
...
257260
----
258-
<1> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.13.4`.
259-
<2> Optional: Specify 'optional' to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify 'required' to configure all EC2 instances to use IMDSv2 only.
261+
<1> When creating your cluster, you can create a local administrator user for your cluster. Selecting `Yes` then prompts you to create a user name and password for the cluster admin. The user name must not contain `/`, `:`, or `%`. The password must be at least 14 characters (ASCII-standard) without whitespaces. This process automatically configures an htpasswd identity provider.
262+
<2> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.13.4`.
263+
<3> Optional: Specify 'optional' to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify 'required' to configure all EC2 instances to use IMDSv2 only.
260264
+
261265
[IMPORTANT]
262266
====
263267
The Instance Metadata Service settings cannot be changed after your cluster is created.
264268
====
265-
<3> If you have more than one set of account roles in your AWS account for your cluster version, an interactive list of options is provided.
266-
<4> By default, the cluster-specific Operator role names are prefixed with the cluster name and random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
269+
<4> If you have more than one set of account roles for your cluster version in your AWS account, an interactive list of options is provided.
270+
<5> By default, the cluster-specific Operator role names are prefixed with the cluster name and a random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
267271
+
268272
[NOTE]
269273
====
270274
If you specified custom ARN paths when you created the associated account-wide roles, the custom path is automatically detected. The custom path is applied to the cluster-specific Operator roles when you create them in a later step.
271275
====
272-
<5> Optional: Multiple availability zones are recommended for production workloads. The default is a single availability zone.
273-
<6> Optional: Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN to in the preceding step.
276+
<6> Optional: Multiple availability zones are recommended for production workloads. The default is a single availability zone.
277+
<7> Optional: Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN in the preceding step.
274278
+
275279
[IMPORTANT]
276280
====
@@ -279,14 +283,14 @@ Only persistent volumes (PVs) created from the default storage class are encrypt
279283
PVs created by using any other storage class are still encrypted, but the PVs are not encrypted with this key unless the storage class is specifically configured to use this key.
280284
====
281285
282-
<7> Optional: Enable this option only if your use case requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted, but not the keys.
286+
<8> Optional: Only enable this option if your use case requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted but not the keys.
283287
+
284288
[IMPORTANT]
285289
====
286290
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
287291
====
288292
+
289-
<8> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
293+
<9> The output includes a custom command that you can run to create a cluster with the same configuration in the future.
290294
--
291295
+
292296
As an alternative to using the `--interactive` mode, you can specify the customization options directly when you run the `rosa create cluster` command. Run the `rosa create cluster --help` command to view a list of available CLI options, or see _create cluster_ in _Managing objects with the ROSA CLI_.

modules/rosa-sts-interactive-cluster-creation-mode-options.adoc

Lines changed: 43 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,16 @@ The following table describes the interactive cluster creation mode options:
1919
|`Cluster name`
2020
|Enter a name for your cluster, for example `my-rosa-cluster`.
2121

22+
|`Deploy cluster with Hosted Control Plane (optional)`
23+
|Enable the use of Hosted Control Planes.
24+
[IMPORTANT]
25+
====
26+
The ROSA with Hosted Control Planes functionality is currently offered as a Technology Preview. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete.
27+
====
28+
29+
|`Create cluster admin user`
30+
|Create a cluster administrator user when you create your cluster using the htpasswd identity provider. The username must not contain `/`, `:`, or `%`. The password must be at least 14 characters (ASCII-standard) without whitespaces.
31+
2232
|`Deploy cluster using AWS STS`
2333
|Create an OpenShift cluster that uses the AWS Security Token Service (STS) to allocate temporary, limited-privilege credentials for component-specific AWS Identity and Access Management (IAM) roles. The service enables cluster components to make AWS API calls using secure cloud resource management practices. The default is `Yes`.
2434

@@ -37,6 +47,12 @@ The following table describes the interactive cluster creation mode options:
3747
|`Operator roles prefix`
3848
|Enter a prefix to assign to the cluster-specific Operator IAM roles. The default is the name of the cluster and a 4-digit random string, for example `my-rosa-cluster-a0b1`.
3949

50+
|`Deploy cluster using pre registered OIDC Configuration ID`
51+
|Specify if you want to use a pre-configured OIDC configuration or if you want to create a new OIDC configuration as part of the cluster creation process.
52+
53+
|`Tags (optional)`
54+
|Specify a tag that is used on all resources created by ROSA in AWS. Tags are comma separated, for example: "key value, foo bar".
55+
4056
|`Multiple availability zones (optional)`
4157
|Deploy the cluster to multiple availability zones in the AWS region. The default is `No`, which results in a cluster being deployed to a single availability zone. If you deploy a cluster into multiple availability zones, the AWS region must have at least 3 availability zones. Multiple availability zones are recommended for production workloads.
4258

@@ -46,6 +62,15 @@ The following table describes the interactive cluster creation mode options:
4662
|`PrivateLink cluster (optional)`
4763
|Create a cluster using AWS PrivateLink. This option provides private connectivity between Virtual Private Clouds (VPCs), AWS services, and your on-premise networks, without exposing your traffic to the public internet. To provide support, Red Hat Site Reliability Engineering (SRE) can connect to the cluster by using AWS PrivateLink Virtual Private Cloud (VPC) endpoints. This option cannot be changed after a cluster is created. The default is `No`.
4864

65+
|`Machine CIDR`
66+
|Specify the IP address range for machines (cluster nodes), which must encompass all CIDR address ranges for your VPC subnets. Subnets must be contiguous. A minimum IP address range of 128 addresses, using the subnet prefix `/25`, is supported for single availability zone deployments. A minimum address range of 256 addresses, using the subnet prefix `/24`, is supported for deployments that use multiple availability zones. The default is `10.0.0.0/16`. This range must not conflict with any connected networks.
67+
68+
|`Service CIDR`
69+
|Specify the IP address range for services. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `172.30.0.0/16`. It is recommended that the address ranges are the same between clusters.
70+
71+
|`Pod CIDR`
72+
|Specify the IP address range for pods. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `10.128.0.0/14`. It is recommended that they are the same between clusters.
73+
4974
|`Install into an existing VPC (optional)`
5075
|Install a cluster into an existing AWS VPC. To use this option, your VPC must have 2 subnets for each availability zone that you are installing the cluster into. The default is `No`.
5176

@@ -64,19 +89,16 @@ The following table describes the interactive cluster creation mode options:
6489
|`Compute nodes`
6590
|Specify the number of compute nodes to provision into each availability zone. Clusters deployed in a single availability zone require at least 2 nodes. Clusters deployed in multiple zones must have at least 3 nodes. The maximum number of worker nodes is 180 nodes. The default value is `2`.
6691

67-
|`Machine CIDR`
68-
|Specify the IP address range for machines (cluster nodes), which must encompass all CIDR address ranges for your VPC subnets. Subnets must be contiguous. A minimum IP address range of 128 addresses, using the subnet prefix `/25`, is supported for single availability zone deployments. A minimum address range of 256 addresses, using the subnet prefix `/24`, is supported for deployments that use multiple availability zones. The default is `10.0.0.0/16`. This range must not conflict with any connected networks.
69-
70-
|`Service CIDR`
71-
|Specify the IP address range for services. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `172.30.0.0/16`. It is recommended that they are the same between clusters.
72-
73-
|`Pod CIDR`
74-
|Specify the IP address range for pods. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is `10.128.0.0/14`. It is recommended that they are the same between clusters.
92+
|`Default machine pool labels (optional)`
93+
|Specify the labels for the default machine pool. The label format should be a comma-separated list of key-value pairs. This list will overwrite any modifications made to node labels on an ongoing basis.
7594

7695
|`Host prefix`
7796
|Specify the subnet prefix length assigned to pods scheduled to individual machines. The host prefix determines the pod IP address pool for each machine. For example, if the host prefix is set to `/23`, each machine is assigned a `/23` subnet from the pod CIDR address range. The default is `/23`, allowing 512 cluster nodes and 512 pods per node, both of which are beyond our supported maximums. For information on the supported maximums, see the Additional resources section below.
7897

79-
|`fips (optional)`
98+
|`Machine pool root disk size (GiB or TiB)`
99+
|Specify the size of the machine pool root disk. This value must include a unit suffix like GiB or TiB, for example the default value of `300GiB`.
100+
101+
|`Enable FIPS support (optional)`
80102
|Enable or disable FIPS mode. The default is `false` (disabled). If FIPS mode is enabled, the {op-system-first} machines that {product-title} runs on bypass the default Kubernetes cryptography suite and use the cryptography modules that are provided with RHCOS instead.
81103
[IMPORTANT]
82104
====
@@ -94,4 +116,16 @@ By enabling etcd encryption for the key values in etcd, you will incur a perform
94116
|`Disable workload monitoring (optional)`
95117
|Disable monitoring for user-defined projects. Monitoring for user-defined projects is enabled by default.
96118

119+
|`Route Selector for ingress (optional)`
120+
|Specify the route selector for your ingress. The format should be a comma-separated list of `key=value`. If you do not specify a label, all routes will be exposed on both routers. For legacy ingress support, these labels are inclusion labels; otherwise, they are treated as exclusion label.
121+
122+
|`Excluded namespaces for ingress (optional)`
123+
|Specify the excluded namespaces for your ingress. The format should be a comma-separated list `value1, value2...`. If you do not specify any values, all namespaces will be exposed.
124+
125+
|`Wildcard Policy (optional, choose 'Skip' to skip selection. The default value will be supplied.)`
126+
|Choose the wildcard policy for your ingress. The options are `WildcardsDisallowed` and `WildcardsAllowed`. Default is `WildcardsDisallowed`.
127+
128+
|`Namespace Ownership Policy (optional, choose 'Skip' to skip selection. The default value will be supplied.)`
129+
|Choose the namespace ownership policy for your ingress. The options are `Strict` and `InterNamespaceAllowed`. The default is `Strict`.
130+
97131
|===

modules/rosa-sts-overview-of-the-default-cluster-specifications.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ endif::rosa-standalone[]
3838

3939
|Accounts and roles
4040
|* Default IAM role prefix: `ManagedOpenShift`
41+
* No cluster admin role created
4142

4243
|Cluster settings
4344
|* Default cluster version: Latest

0 commit comments

Comments
 (0)