Skip to content

Commit 3392c2e

Browse files
authored
Merge pull request #96129 from EricPonvelle/OSDOCS-14606_HCP-Install
OSDOCS-15140: Updated HCP Install guide for migration
2 parents 79655ae + 30b8a2f commit 3392c2e

28 files changed

+316
-201
lines changed

_topic_maps/_topic_map_rosa_hcp.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -190,6 +190,12 @@ Topics:
190190
File: rosa-hcp-quickstart-guide
191191
- Name: Creating ROSA with HCP clusters using the default options
192192
File: rosa-hcp-sts-creating-a-cluster-quickly
193+
- Name: Creating a ROSA cluster using Terraform
194+
Dir: terraform
195+
Distros: openshift-rosa-hcp
196+
Topics:
197+
- Name: Creating a default ROSA cluster using Terraform
198+
File: rosa-hcp-creating-a-cluster-quickly-terraform
193199
- Name: Creating ROSA with HCP clusters using a custom AWS KMS encryption key
194200
File: rosa-hcp-creating-cluster-with-aws-kms-key
195201
- Name: Creating a private cluster on ROSA with HCP
@@ -198,6 +204,8 @@ Topics:
198204
File: rosa-hcp-egress-zero-install
199205
- Name: Creating a ROSA with HCP cluster that uses direct authentication with an external OIDC identity provider
200206
File: rosa-hcp-sts-creating-a-cluster-ext-auth
207+
- Name: Deleting a ROSA with HCP cluster
208+
File: rosa-hcp-deleting-cluster
201209
---
202210
Name: Web console
203211
Dir: web_console

modules/rosa-deleting-account-wide-iam-roles-and-policies.adoc

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -17,30 +17,30 @@ endif::[]
1717

1818
This section provides steps to delete the account-wide IAM roles and policies that you created for
1919
ifdef::sts[]
20-
ROSA with STS
20+
{rosa-classic-short} with STS
2121
endif::sts[]
2222
ifdef::hcp[]
23-
{hcp-title}
23+
{rosa-short}
2424
endif::hcp[]
2525
deployments, along with the account-wide Operator policies. You can delete the account-wide AWS Identity and Access Management (IAM) roles and policies only after deleting all of the
2626
ifdef::sts[]
27-
{product-title} (ROSA) with AWS Security Token Services (STS)
27+
{rosa-classic-short} with AWS Security Token Services (STS)
2828
endif::sts[]
2929
ifdef::hcp[]
30-
{hcp-title}
30+
{rosa-short}
3131
endif::hcp[]
3232
clusters that depend on them.
3333

3434
[IMPORTANT]
3535
====
3636
The account-wide IAM roles and policies might be used by other
3737
ifdef::sts[]
38-
ROSA clusters
38+
{rosa-classic-short}
3939
endif::sts[]
4040
ifdef::hcp[]
41-
{product-title}
41+
{rosa-short}
4242
endif::hcp[]
43-
in the same AWS account. Only remove the roles if they are not required by other clusters.
43+
clusters in the same AWS account. Only remove the roles if they are not required by other clusters.
4444
====
4545

4646
.Prerequisites
@@ -109,24 +109,24 @@ I: Successfully deleted the hosted CP account roles
109109
----
110110
endif::hcp[]
111111
+
112-
. Delete the account-wide in-line and Operator policies:
112+
. Delete the account-wide and Operator policies:
113113
.. Under the *Policies* page in the link:https://console.aws.amazon.com/iamv2/home#/policies[AWS IAM Console], filter the list of policies by the prefix that you specified when you created the account-wide roles and policies.
114114
+
115115
[NOTE]
116116
====
117117
If you did not specify a custom prefix when you created the account-wide roles, search for the default prefix, `ManagedOpenShift`.
118118
====
119119
+
120-
.. Delete the account-wide in-line policies and Operator policies by using the link:https://console.aws.amazon.com/iamv2/home#/policies[AWS IAM Console]. For more information about deleting IAM policies by using the AWS IAM Console, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-delete.html[Deleting IAM policies] in the AWS documentation.
120+
.. Delete the account-wide policies and Operator policies by using the link:https://console.aws.amazon.com/iamv2/home#/policies[AWS IAM Console]. For more information about deleting IAM policies by using the AWS IAM Console, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-delete.html[Deleting IAM policies] in the AWS documentation.
121121
+
122122
[IMPORTANT]
123123
====
124-
The account-wide in-line and Operator IAM policies might be used by other
124+
The account-wide and Operator IAM policies might be used by other
125125
ifdef::sts[]
126-
ROSA clusters
126+
{rosa-classic-short}
127127
endif::sts[]
128128
ifdef::hcp[]
129-
{hcp-title}
129+
{rosa-short}
130130
endif::hcp[]
131-
in the same AWS account. Only remove the roles if they are not required by other clusters.
131+
clusters in the same AWS account. Only remove the roles if they are not required by other clusters.
132132
====

modules/rosa-deleting-sts-iam-resources-account-wide.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,43 +16,43 @@ ifndef::hcp[]
1616
{product-title} (ROSA) with AWS Security Token Services (STS)
1717
endif::hcp[]
1818
ifdef::hcp[]
19-
{hcp-title-first}
19+
{rosa-short}
2020
endif::hcp[]
2121
clusters that depend on the account-wide AWS Identity and Access Management (IAM) resources, you can delete the account-wide resources.
2222

2323
If you no longer need to install a
2424
ifndef::hcp[]
25-
ROSA with STS
25+
{rosa-classic-short} with STS
2626
endif::hcp[]
2727
ifdef::hcp[]
28-
{hcp-title}
28+
{rosa-short}
2929
endif::hcp[]
3030
cluster by using {cluster-manager-first}, you can also delete the {cluster-manager} and user IAM roles.
3131

3232
[IMPORTANT]
3333
====
3434
The account-wide IAM roles and policies might be used by other
3535
ifndef::hcp[]
36-
ROSA
36+
{rosa-classic-short}
3737
endif::hcp[]
3838
ifdef::hcp[]
39-
{hcp-title}
39+
{rosa-short}
4040
endif::hcp[]
4141
clusters in the same AWS account. Only remove the resources if they are not required by other clusters.
4242
4343
The {cluster-manager} and user IAM roles are required if you want to install, manage, and delete other
4444
ifndef::hcp[]
45-
ROSA
45+
{rosa-classic-short}
4646
endif::hcp[]
4747
ifdef::hcp[]
48-
{product-title}
48+
{rosa-short}
4949
endif::hcp[]
5050
clusters in the same AWS account by using {cluster-manager}. Only remove the roles if you no longer need to install
5151
ifndef::hcp[]
52-
ROSA
52+
{rosa-classic-short}
5353
endif::hcp[]
5454
ifdef::hcp[]
55-
{product-title}
55+
{rosa-short}
5656
endif::hcp[]
5757
clusters in your account by using {cluster-manager}. For more information about repairing your cluster if these roles are removed before deletion, see "Repairing a cluster that cannot be deleted" in _Troubleshooting cluster deployments_.
5858
====

modules/rosa-getting-started-deleting-a-cluster.adoc

Lines changed: 33 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -2,36 +2,49 @@
22
//
33
// * rosa_getting_started/rosa-getting-started.adoc
44
// * rosa_getting_started/rosa-quickstart-guide-ui.adoc
5-
6-
:_mod-docs-content-type: PROCEDURE
7-
[id="rosa-getting-started-deleting-a-cluster_{context}"]
8-
= Deleting a ROSA cluster and the AWS STS resources
5+
// * rosa_hcp/rosa-hcp-quickstart-guide.adoc
96

107
ifeval::["{context}" == "rosa-getting-started"]
118
:getting-started:
129
endif::[]
1310
ifeval::["{context}" == "rosa-quickstart"]
1411
:quickstart:
1512
endif::[]
13+
:_mod-docs-content-type: PROCEDURE
14+
[id="rosa-getting-started-deleting-a-cluster_{context}"]
1615

16+
ifdef::openshift-rosa[]
17+
= Deleting a {rosa-classic-short} cluster and the AWS IAM STS resources
18+
endif::openshift-rosa[]
1719
ifdef::openshift-rosa-hcp[]
18-
You can delete a ROSA cluster by using the {product-title} (ROSA) CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide inline and Operator policies, you can use the AWS IAM Console.
20+
= Deleting a {rosa-short} cluster and the AWS IAM STS resources
1921
endif::openshift-rosa-hcp[]
20-
ifndef::openshift-rosa-hcp[]
21-
You can delete a ROSA cluster that uses the AWS Security Token Service (STS) by using the {product-title} (ROSA) CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide inline and Operator policies, you can use the AWS IAM Console.
22+
23+
ifdef::openshift-rosa-hcp[]
24+
You can delete a {rosa-short} cluster by using the ROSA CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide and Operator policies, you can use the AWS IAM Console or the AWS CLI.
2225
endif::openshift-rosa-hcp[]
26+
ifdef::openshift-rosa[]
27+
You can delete a {rosa-classic-short} cluster that uses the AWS Security Token Service (STS) by using the ROSA CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide inline and Operator policies, you can use the AWS IAM Console or the AWS CLI.
28+
endif::openshift-rosa[]
2329

2430
[IMPORTANT]
2531
====
26-
Account-wide IAM roles and policies might be used by other ROSA clusters in the same AWS account. You must only remove the resources if they are not required by other clusters.
32+
Account-wide IAM roles and policies might be used by other
33+
ifdef::openshift-rosa[]
34+
{rosa-classic-short}
35+
endif::openshift-rosa[]
36+
ifdef::openshift-rosa-hcp[]
37+
{rosa-short}
38+
endif::openshift-rosa-hcp[]
39+
clusters in the same AWS account. You must only remove the resources if they are not required by other clusters.
2740
====
2841

2942
ifdef::getting-started[]
3043
.Prerequisites
3144

32-
* You installed and configured the latest {product-title} (ROSA) CLI, `rosa`, on your workstation.
45+
* You installed and configured the latest ROSA CLI, `rosa`, on your workstation.
3346
* You logged in to your Red{nbsp}Hat account using the ROSA CLI (`rosa`).
34-
* You created a ROSA cluster.
47+
* You created a {rosa-classic} cluster.
3548
endif::[]
3649
3750
.Procedure
@@ -45,10 +58,10 @@ $ rosa delete cluster --cluster=<cluster_name> --watch
4558
+
4659
[IMPORTANT]
4760
====
48-
You must wait for the cluster deletion to complete before you remove the IAM roles, policies, and OIDC provider. The account-wide roles are required to delete the resources created by the installer. The cluster-specific Operator roles are required to clean-up the resources created by the OpenShift Operators. The Operators use the OIDC provider to authenticate.
61+
You must wait for the cluster deletion to complete before you remove the IAM roles, policies, and OIDC provider. The account-wide roles are required to delete the resources created by the installer. The cluster-specific Operator roles are required to clean-up the resources created by the OpenShift Operators. The Operators use the OIDC provider to authenticate with AWS APIs.
4962
====
5063

51-
. Delete the OIDC provider that the cluster Operators use to authenticate:
64+
. After the cluster is deleted, delete the OIDC provider that the cluster Operators use to authenticate:
5265
+
5366
[source,terminal]
5467
----
@@ -80,24 +93,24 @@ Account-wide IAM roles and policies might be used by other ROSA clusters in the
8093
----
8194
$ rosa delete account-roles --prefix <prefix> --mode auto <1>
8295
----
83-
<1> You must include the `--<prefix>` argument. Replace `<prefix>` with the prefix of the account-wide roles to delete. If you did not specify a custom prefix when you created the account-wide roles, specify the default prefix, `ManagedOpenShift`.
96+
<1> You must include the `--<prefix>` argument. Replace `<prefix>` with the prefix of the account-wide roles to delete. If you did not specify a custom prefix when you created the account-wide roles, specify the default prefix, depending on how they were created, `HCP-ROSA` or `ManagedOpenShift`.
8497

8598
ifdef::openshift-rosa-hcp[]
86-
. Delete the account-wide inline and Operator IAM policies that you created for ROSA deployments:
87-
endif::openshift-rosa-hcp[]
88-
ifndef::openshift-rosa-hcp[]
89-
. Delete the account-wide inline and Operator IAM policies that you created for ROSA deployments that use STS:
99+
. Delete the account-wide and Operator IAM policies that you created for {rosa-short} deployments:
90100
endif::openshift-rosa-hcp[]
101+
ifdef::openshift-rosa[]
102+
. Delete the account-wide and Operator IAM policies that you created for {rosa-classic-short} deployments that use STS:
103+
endif::openshift-rosa[]
91104
+
92105
.. Log in to the link:https://console.aws.amazon.com/iamv2/home#/home[AWS IAM Console].
93106
.. Navigate to *Access management* -> *Policies* and select the checkbox for one of the account-wide policies.
94107
.. With the policy selected, click on *Actions* -> *Delete* to open the delete policy dialog.
95108
.. Enter the policy name to confirm the deletion and select *Delete* to delete the policy.
96-
.. Repeat this step to delete each of the account-wide inline and Operator policies for the cluster.
109+
.. Repeat this step to delete each of the account-wide and Operator policies for the cluster.
97110

98111
ifeval::["{context}" == "rosa-getting-started"]
99-
:getting-started:
112+
:!getting-started:
100113
endif::[]
101114
ifeval::["{context}" == "rosa-quickstart"]
102-
:quickstart:
115+
:!quickstart:
103116
endif::[]

modules/rosa-getting-started-enable-rosa.adoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,14 @@
77
[id="rosa-getting-started-verifying-rosa-prerequisites_{context}"]
88
= Verifying ROSA prerequisites
99

10-
Use the steps in this procedure to enable {product-title} (ROSA) in your AWS account.
10+
Use the steps in this procedure to enable
11+
ifdef::openshift-rosa[]
12+
{rosa-classic-short}
13+
endif::openshift-rosa[]
14+
ifdef::openshift-rosa-hcp[]
15+
{rosa-short}
16+
endif::openshift-rosa-hcp[]
17+
in your AWS account.
1118

1219
.Prerequisites
1320

modules/rosa-getting-started-environment-setup.adoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,19 @@
22
//
33
// * rosa_getting_started/rosa-getting-started.adoc
44
// * rosa_getting_started/rosa-quickstart-guide-ui.adoc
5+
// * rosa_hcp/rosa-hcp-quickstart-guide.adoc
56

67
[id="rosa-getting-started-environment-setup_{context}"]
78
= Setting up the environment
89

9-
Before you create a {product-title} (ROSA) cluster, you must set up your environment by completing the following tasks:
10+
Before you create a
11+
ifdef::openshift-rosa[]
12+
{rosa-classic-short}
13+
endif::openshift-rosa[]
14+
ifdef::openshift-rosa-hcp[]
15+
{rosa-short}
16+
endif::openshift-rosa-hcp[]
17+
cluster, you must set up your environment by completing the following tasks:
1018

1119
* Verify ROSA prerequisites against your AWS and Red{nbsp}Hat accounts.
1220
* Install and configure the required command-line interface (CLI) tools.

modules/rosa-getting-started-install-configure-cli-tools.adoc

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
//
33
// * rosa_getting_started/rosa-getting-started.adoc
44
// * rosa_getting_started/rosa-quickstart-guide-ui.adoc
5+
// * rosa_hcp/rosa-hcp-quickstart-guide.adoc
6+
// * rosa_planning/rosa-sts-setting-up-environment.adoc
57

68
:_mod-docs-content-type: PROCEDURE
79
[id="rosa-getting-started-install-configure-cli-tools_{context}"]
@@ -19,8 +21,6 @@ Several command-line interface (CLI) tools are required to deploy and work with
1921
. Log in to your Red{nbsp}Hat and AWS accounts to access the download page for each required tool.
2022
.. Log in to your Red{nbsp}Hat account at link:https://console.redhat.com[console.redhat.com].
2123
.. Log in to your AWS account at link:https://aws.amazon.com[aws.amazon.com].
22-
23-
//This should be a separate module
2424
. Install and configure the latest AWS CLI (`aws`).
2525
.. Install the AWS CLI by following the link:https://aws.amazon.com/cli/[AWS Command Line Interface] documentation appropriate for your workstation.
2626
.. Configure the AWS CLI by specifying your `aws_access_key_id`, `aws_secret_access_key`, and `region` in the `.aws/credentials` file. For more information, see link:https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-quickstart.html[AWS Configuration basics] in the AWS documentation.
@@ -41,8 +41,7 @@ $ aws sts get-caller-identity --output text
4141
----
4242
<aws_account_id> arn:aws:iam::<aws_account_id>:user/<username> <aws_user_id>
4343
----
44-
45-
//This should be a separate module
44+
+
4645
. Install and configure the latest ROSA CLI (`rosa`).
4746
.. Navigate to link:https://console.redhat.com/openshift/downloads[*Downloads*].
4847
.. Find *Red Hat OpenShift Service on AWS command line interface (`rosa)* in the list of tools and click *Download*.
@@ -92,8 +91,6 @@ Your ROSA CLI is up to date.
9291
// For steps to configure `rosa` tab completion for different shell types, see the help menu by running `rosa completion --help`.
9392
// ====
9493
// endif::[]
95-
96-
//The following should probably also be a separate module
9794
. Log in to the ROSA CLI using an offline access token.
9895
.. Run the login command:
9996
+
@@ -121,7 +118,6 @@ To login to your Red Hat account, get an offline access token at https://console
121118
====
122119
In the future you can specify the offline access token by using the `--token="<offline_access_token>"` argument when you run the `rosa login` command.
123120
====
124-
125121
.. Verify that you are logged in and confirm that your credentials are correct before proceeding:
126122
+
127123
[source,terminal]
@@ -144,8 +140,6 @@ OCM Organization ID: <org_id>
144140
OCM Organization Name: Your organization
145141
OCM Organization External ID: <external_org_id>
146142
----
147-
148-
//This should be a separate module
149143
. Install and configure the latest OpenShift CLI (`oc`).
150144
.. Use the ROSA CLI to download the `oc` CLI.
151145
+

modules/rosa-hcp-create-network.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ ifeval::["{context}" == "rosa-hcp-egress-zero-install"]
1010
endif::[]
1111
:_mod-docs-content-type: PROCEDURE
1212
[id="rosa-hcp-create-network_{context}"]
13-
= Creating a Virtual Private Cloud using the ROSA CLI
13+
= Creating an AWS VPC using the ROSA CLI
1414

15-
The `rosa create network` command is available in v.1.2.48 or later of the ROSA command-line interface (CLI). The command uses AWS CloudFormation to create a VPC and the other networking components used to install a ROSA cluster. CloudFormation is a native AWS infrastructure-as-code tool and is compatible with the AWS CLI.
15+
The `rosa create network` command is available in v.1.2.48 or later of the ROSA command-line interface (CLI). The command uses AWS CloudFormation to create a VPC and associated networking components necessary to install a {rosa-short} cluster. CloudFormation is a native AWS infrastructure-as-code tool and is compatible with the AWS CLI.
1616

17-
If you do not specify a template, CloudFormation uses a default template that creates the following parameters:
17+
If you do not specify a template, CloudFormation uses a default template that creates resources with the following parameters:
1818

1919
[cols="2a,3a",options="header"]
2020
|===

modules/rosa-hcp-deleting-cluster.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="rosa-hcp-deleting-cluster_{context}"]
77
= Deleting a {hcp-title} cluster and the cluster-specific IAM resources
88

9-
You can delete a {hcp-title} cluster by using the ROSA command-line interface (CLI) (`rosa`) or {cluster-manager-first}.
9+
You can delete a {rosa-short} cluster by using the ROSA command-line interface (CLI) (`rosa`) or {cluster-manager-first}.
1010

1111
After deleting the cluster, you can clean up the cluster-specific Identity and Access Management (IAM) resources in your AWS account by using the ROSA CLI. The cluster-specific resources include the Operator roles and the OpenID Connect (OIDC) provider.
1212

@@ -19,7 +19,7 @@ If add-ons are installed, the cluster deletion takes longer because add-ons are
1919

2020
.Prerequisites
2121

22-
* You have installed a {hcp-title} cluster.
22+
* You have installed a {rosa-short} cluster.
2323
* You have installed and configured the latest ROSA CLI (`rosa`) on your installation host.
2424
2525
.Procedure

0 commit comments

Comments
 (0)