You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/rosa-deleting-account-wide-iam-roles-and-policies.adoc
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,30 +17,30 @@ endif::[]
17
17
18
18
This section provides steps to delete the account-wide IAM roles and policies that you created for
19
19
ifdef::sts[]
20
-
ROSA with STS
20
+
{rosa-classic-short} with STS
21
21
endif::sts[]
22
22
ifdef::hcp[]
23
-
{hcp-title}
23
+
{rosa-short}
24
24
endif::hcp[]
25
25
deployments, along with the account-wide Operator policies. You can delete the account-wide AWS Identity and Access Management (IAM) roles and policies only after deleting all of the
26
26
ifdef::sts[]
27
-
{product-title} (ROSA) with AWS Security Token Services (STS)
27
+
{rosa-classic-short} with AWS Security Token Services (STS)
28
28
endif::sts[]
29
29
ifdef::hcp[]
30
-
{hcp-title}
30
+
{rosa-short}
31
31
endif::hcp[]
32
32
clusters that depend on them.
33
33
34
34
[IMPORTANT]
35
35
====
36
36
The account-wide IAM roles and policies might be used by other
37
37
ifdef::sts[]
38
-
ROSA clusters
38
+
{rosa-classic-short}
39
39
endif::sts[]
40
40
ifdef::hcp[]
41
-
{product-title}
41
+
{rosa-short}
42
42
endif::hcp[]
43
-
in the same AWS account. Only remove the roles if they are not required by other clusters.
43
+
clusters in the same AWS account. Only remove the roles if they are not required by other clusters.
. Delete the account-wide in-line and Operator policies:
112
+
. Delete the account-wide and Operator policies:
113
113
.. Under the *Policies* page in the link:https://console.aws.amazon.com/iamv2/home#/policies[AWS IAM Console], filter the list of policies by the prefix that you specified when you created the account-wide roles and policies.
114
114
+
115
115
[NOTE]
116
116
====
117
117
If you did not specify a custom prefix when you created the account-wide roles, search for the default prefix, `ManagedOpenShift`.
118
118
====
119
119
+
120
-
.. Delete the account-wide in-line policies and Operator policies by using the link:https://console.aws.amazon.com/iamv2/home#/policies[AWS IAM Console]. For more information about deleting IAM policies by using the AWS IAM Console, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-delete.html[Deleting IAM policies] in the AWS documentation.
120
+
.. Delete the account-wide policies and Operator policies by using the link:https://console.aws.amazon.com/iamv2/home#/policies[AWS IAM Console]. For more information about deleting IAM policies by using the AWS IAM Console, see link:https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-delete.html[Deleting IAM policies] in the AWS documentation.
121
121
+
122
122
[IMPORTANT]
123
123
====
124
-
The account-wide in-line and Operator IAM policies might be used by other
124
+
The account-wide and Operator IAM policies might be used by other
125
125
ifdef::sts[]
126
-
ROSA clusters
126
+
{rosa-classic-short}
127
127
endif::sts[]
128
128
ifdef::hcp[]
129
-
{hcp-title}
129
+
{rosa-short}
130
130
endif::hcp[]
131
-
in the same AWS account. Only remove the roles if they are not required by other clusters.
131
+
clusters in the same AWS account. Only remove the roles if they are not required by other clusters.
Copy file name to clipboardExpand all lines: modules/rosa-deleting-sts-iam-resources-account-wide.adoc
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,43 +16,43 @@ ifndef::hcp[]
16
16
{product-title} (ROSA) with AWS Security Token Services (STS)
17
17
endif::hcp[]
18
18
ifdef::hcp[]
19
-
{hcp-title-first}
19
+
{rosa-short}
20
20
endif::hcp[]
21
21
clusters that depend on the account-wide AWS Identity and Access Management (IAM) resources, you can delete the account-wide resources.
22
22
23
23
If you no longer need to install a
24
24
ifndef::hcp[]
25
-
ROSA with STS
25
+
{rosa-classic-short} with STS
26
26
endif::hcp[]
27
27
ifdef::hcp[]
28
-
{hcp-title}
28
+
{rosa-short}
29
29
endif::hcp[]
30
30
cluster by using {cluster-manager-first}, you can also delete the {cluster-manager} and user IAM roles.
31
31
32
32
[IMPORTANT]
33
33
====
34
34
The account-wide IAM roles and policies might be used by other
35
35
ifndef::hcp[]
36
-
ROSA
36
+
{rosa-classic-short}
37
37
endif::hcp[]
38
38
ifdef::hcp[]
39
-
{hcp-title}
39
+
{rosa-short}
40
40
endif::hcp[]
41
41
clusters in the same AWS account. Only remove the resources if they are not required by other clusters.
42
42
43
43
The {cluster-manager} and user IAM roles are required if you want to install, manage, and delete other
44
44
ifndef::hcp[]
45
-
ROSA
45
+
{rosa-classic-short}
46
46
endif::hcp[]
47
47
ifdef::hcp[]
48
-
{product-title}
48
+
{rosa-short}
49
49
endif::hcp[]
50
50
clusters in the same AWS account by using {cluster-manager}. Only remove the roles if you no longer need to install
51
51
ifndef::hcp[]
52
-
ROSA
52
+
{rosa-classic-short}
53
53
endif::hcp[]
54
54
ifdef::hcp[]
55
-
{product-title}
55
+
{rosa-short}
56
56
endif::hcp[]
57
57
clusters in your account by using {cluster-manager}. For more information about repairing your cluster if these roles are removed before deletion, see "Repairing a cluster that cannot be deleted" in _Troubleshooting cluster deployments_.
= Deleting a {rosa-classic-short} cluster and the AWS IAM STS resources
18
+
endif::openshift-rosa[]
17
19
ifdef::openshift-rosa-hcp[]
18
-
You can delete a ROSA cluster by using the {product-title} (ROSA) CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide inline and Operator policies, you can use the AWS IAM Console.
20
+
= Deleting a {rosa-short}clusterand the AWS IAM STS resources
19
21
endif::openshift-rosa-hcp[]
20
-
ifndef::openshift-rosa-hcp[]
21
-
You can delete a ROSA cluster that uses the AWS Security Token Service (STS) by using the {product-title} (ROSA) CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide inline and Operator policies, you can use the AWS IAM Console.
22
+
23
+
ifdef::openshift-rosa-hcp[]
24
+
You can delete a {rosa-short} cluster by using the ROSA CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide and Operator policies, you can use the AWS IAM Console or the AWS CLI.
22
25
endif::openshift-rosa-hcp[]
26
+
ifdef::openshift-rosa[]
27
+
You can delete a {rosa-classic-short} cluster that uses the AWS Security Token Service (STS) by using the ROSA CLI, `rosa`. You can also use the ROSA CLI to delete the AWS Identity and Access Management (IAM) account-wide roles, the cluster-specific Operator roles, and the OpenID Connect (OIDC) provider. To delete the account-wide inline and Operator policies, you can use the AWS IAM Console or the AWS CLI.
28
+
endif::openshift-rosa[]
23
29
24
30
[IMPORTANT]
25
31
====
26
-
Account-wide IAM roles and policies might be used by other ROSA clusters in the same AWS account. You must only remove the resources if they are not required by other clusters.
32
+
Account-wide IAM roles and policies might be used by other
33
+
ifdef::openshift-rosa[]
34
+
{rosa-classic-short}
35
+
endif::openshift-rosa[]
36
+
ifdef::openshift-rosa-hcp[]
37
+
{rosa-short}
38
+
endif::openshift-rosa-hcp[]
39
+
clusters in the same AWS account. You must only remove the resources if they are not required by other clusters.
27
40
====
28
41
29
42
ifdef::getting-started[]
30
43
.Prerequisites
31
44
32
-
* You installed and configured the latest {product-title} (ROSA) CLI, `rosa`, on your workstation.
45
+
* You installed and configured the latest ROSA CLI, `rosa`, on your workstation.
33
46
* You logged in to your Red{nbsp}Hat account using the ROSA CLI (`rosa`).
34
-
* You created a ROSA cluster.
47
+
* You created a {rosa-classic} cluster.
35
48
endif::[]
36
49
37
50
.Procedure
@@ -45,10 +58,10 @@ $ rosa delete cluster --cluster=<cluster_name> --watch
45
58
+
46
59
[IMPORTANT]
47
60
====
48
-
You must wait for the cluster deletion to complete before you remove the IAM roles, policies, and OIDC provider. The account-wide roles are required to delete the resources created by the installer. The cluster-specific Operator roles are required to clean-up the resources created by the OpenShift Operators. The Operators use the OIDC provider to authenticate.
61
+
You must wait for the cluster deletion to complete before you remove the IAM roles, policies, and OIDC provider. The account-wide roles are required to delete the resources created by the installer. The cluster-specific Operator roles are required to clean-up the resources created by the OpenShift Operators. The Operators use the OIDC provider to authenticate with AWS APIs.
49
62
====
50
63
51
-
. Delete the OIDC provider that the cluster Operators use to authenticate:
64
+
. After the cluster is deleted, delete the OIDC provider that the cluster Operators use to authenticate:
52
65
+
53
66
[source,terminal]
54
67
----
@@ -80,24 +93,24 @@ Account-wide IAM roles and policies might be used by other ROSA clusters in the
80
93
----
81
94
$ rosa delete account-roles --prefix <prefix> --mode auto <1>
82
95
----
83
-
<1> You must include the `--<prefix>` argument. Replace `<prefix>` with the prefix of the account-wide roles to delete. If you did not specify a custom prefix when you created the account-wide roles, specify the default prefix, `ManagedOpenShift`.
96
+
<1> You must include the `--<prefix>` argument. Replace `<prefix>` with the prefix of the account-wide roles to delete. If you did not specify a custom prefix when you created the account-wide roles, specify the default prefix, depending on how they were created, `HCP-ROSA` or `ManagedOpenShift`.
84
97
85
98
ifdef::openshift-rosa-hcp[]
86
-
. Delete the account-wide inline and Operator IAM policies that you created for ROSA deployments:
87
-
endif::openshift-rosa-hcp[]
88
-
ifndef::openshift-rosa-hcp[]
89
-
. Delete the account-wide inline and Operator IAM policies that you created for ROSA deployments that use STS:
99
+
. Delete the account-wide and Operator IAM policies that you created for {rosa-short} deployments:
90
100
endif::openshift-rosa-hcp[]
101
+
ifdef::openshift-rosa[]
102
+
. Delete the account-wide and Operator IAM policies that you created for {rosa-classic-short} deployments that use STS:
103
+
endif::openshift-rosa[]
91
104
+
92
105
.. Log in to the link:https://console.aws.amazon.com/iamv2/home#/home[AWS IAM Console].
93
106
.. Navigate to *Access management*->*Policies* and select the checkbox for one of the account-wide policies.
94
107
.. With the policy selected, click on *Actions*->*Delete* to open the delete policy dialog.
95
108
.. Enter the policy name to confirm the deletion and select *Delete* to delete the policy.
96
-
.. Repeat this step to delete each of the account-wide inline and Operator policies for the cluster.
109
+
.. Repeat this step to delete each of the account-wide and Operator policies for the cluster.
@@ -19,8 +21,6 @@ Several command-line interface (CLI) tools are required to deploy and work with
19
21
. Log in to your Red{nbsp}Hat and AWS accounts to access the download page for each required tool.
20
22
.. Log in to your Red{nbsp}Hat account at link:https://console.redhat.com[console.redhat.com].
21
23
.. Log in to your AWS account at link:https://aws.amazon.com[aws.amazon.com].
22
-
23
-
//This should be a separate module
24
24
. Install and configure the latest AWS CLI (`aws`).
25
25
.. Install the AWS CLI by following the link:https://aws.amazon.com/cli/[AWS Command Line Interface] documentation appropriate for your workstation.
26
26
.. Configure the AWS CLI by specifying your `aws_access_key_id`, `aws_secret_access_key`, and `region` in the `.aws/credentials` file. For more information, see link:https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-quickstart.html[AWS Configuration basics] in the AWS documentation.
@@ -41,8 +41,7 @@ $ aws sts get-caller-identity --output text
= Creating a Virtual Private Cloud using the ROSA CLI
13
+
= Creating an AWS VPC using the ROSA CLI
14
14
15
-
The `rosa create network` command is available in v.1.2.48 or later of the ROSA command-line interface (CLI). The command uses AWS CloudFormation to create a VPC and the other networking components used to install a ROSA cluster. CloudFormation is a native AWS infrastructure-as-code tool and is compatible with the AWS CLI.
15
+
The `rosa create network` command is available in v.1.2.48 or later of the ROSA command-line interface (CLI). The command uses AWS CloudFormation to create a VPC and associated networking components necessary to install a {rosa-short} cluster. CloudFormation is a native AWS infrastructure-as-code tool and is compatible with the AWS CLI.
16
16
17
-
If you do not specify a template, CloudFormation uses a default template that creates the following parameters:
17
+
If you do not specify a template, CloudFormation uses a default template that creates resources with the following parameters:
Copy file name to clipboardExpand all lines: modules/rosa-hcp-deleting-cluster.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@
6
6
[id="rosa-hcp-deleting-cluster_{context}"]
7
7
= Deleting a {hcp-title} cluster and the cluster-specific IAM resources
8
8
9
-
You can delete a {hcp-title} cluster by using the ROSA command-line interface (CLI) (`rosa`) or {cluster-manager-first}.
9
+
You can delete a {rosa-short} cluster by using the ROSA command-line interface (CLI) (`rosa`) or {cluster-manager-first}.
10
10
11
11
After deleting the cluster, you can clean up the cluster-specific Identity and Access Management (IAM) resources in your AWS account by using the ROSA CLI. The cluster-specific resources include the Operator roles and the OpenID Connect (OIDC) provider.
12
12
@@ -19,7 +19,7 @@ If add-ons are installed, the cluster deletion takes longer because add-ons are
19
19
20
20
.Prerequisites
21
21
22
-
* You have installed a {hcp-title} cluster.
22
+
* You have installed a {rosa-short} cluster.
23
23
* You have installed and configured the latest ROSA CLI (`rosa`) on your installation host.
0 commit comments