Skip to content

Commit 7124f2f

Browse files
authored
Merge pull request #78211 from EricPonvelle/TF-Post-Merge-Fixes
Terraform Post-Merge Clean-up
2 parents 647842c + 836bb6e commit 7124f2f

8 files changed

+58
-246
lines changed

_topic_maps/_topic_map_rosa.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -231,8 +231,6 @@ Topics:
231231
Topics:
232232
- Name: Creating a default ROSA cluster using Terraform
233233
File: rosa-hcp-creating-a-cluster-quickly-terraform
234-
# - Name: Customizing a ROSA cluster with Terraform
235-
# File: rosa-hcp-creating-a-cluster-with-customizations-terraform
236234
- Name: Creating ROSA with HCP clusters using a custom AWS KMS encryption key
237235
File: rosa-hcp-creating-cluster-with-aws-kms-key
238236
- Name: Creating a private cluster on ROSA with HCP
@@ -258,8 +256,6 @@ Topics:
258256
Topics:
259257
- Name: Creating a default ROSA (classic architecture) cluster using Terraform
260258
File: rosa-classic-creating-a-cluster-quickly-terraform
261-
# - Name: Customizing a ROSA cluster with Terraform
262-
# File: rosa-classic-creating-a-cluster-with-customizations-terraform
263259
- Name: Interactive cluster creation mode reference
264260
File: rosa-sts-interactive-mode-reference
265261
- Name: Creating an AWS PrivateLink cluster on ROSA

modules/rosa-sts-overview-of-the-default-cluster-specifications.adoc

Lines changed: 45 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -8,20 +8,20 @@ ifeval::["{context}" == "rosa-hcp-sts-creating-a-cluster-quickly"]
88
:rosa-hcp:
99
endif::[]
1010
ifeval::["{context}" == "rosa-sts-creating-a-cluster-quickly"]
11-
:rosa-standalone:
11+
:rosa-classic:
1212
endif::[]
1313
ifeval::["{context}" == "rosa-classic-creating-a-cluster-quickly-terraform"]
14-
:rosa-terraform:
14+
:tf-classic:
1515
endif::[]
1616
ifeval::["{context}" == "rosa-hcp-creating-a-cluster-quickly-terraform"]
17-
:rosa-terraform:
17+
:tf-hcp:
1818
endif::[]
1919

2020
:_mod-docs-content-type: CONCEPT
2121
[id="rosa-sts-overview-of-the-default-cluster-specifications_{context}"]
2222
= Overview of the default cluster specifications
2323

24-
ifndef::rosa-terraform[]
24+
ifndef::tf-classic,tf-hcp[]
2525
You can quickly create a
2626
ifdef::rosa-hcp[]
2727
{hcp-title}
@@ -30,14 +30,14 @@ ifndef::rosa-hcp[]
3030
{product-title} (ROSA)
3131
endif::rosa-hcp[]
3232
cluster with the {sts-first} by using the default installation options. The following summary describes the default cluster specifications.
33-
endif::rosa-terraform[]
33+
endif::tf-classic,tf-hcp[]
3434

3535
ifdef::rosa-hcp[]
3636
.Default {hcp-title} cluster specifications
3737
endif::rosa-hcp[]
38-
ifdef::rosa-standalone[]
38+
ifdef::rosa-classic[]
3939
.Default ROSA with STS cluster specifications
40-
endif::rosa-standalone[]
40+
endif::rosa-classic[]
4141

4242
[cols=".^1,.^3a",options="header"]
4343
|===
@@ -47,23 +47,23 @@ endif::rosa-standalone[]
4747

4848
|Accounts and roles
4949
|
50-
ifdef::rosa-terraform[]
50+
ifdef::tf-classic,tf-hcp[]
5151
* Default IAM role prefix: `rosa-<6-digit-alphanumeric-string>`
52-
endif::rosa-terraform[]
53-
ifndef::rosa-terraform[]
52+
endif::tf-classic,tf-hcp[]
53+
ifndef::tf-classic,tf-hcp[]
5454
* Default IAM role prefix: `ManagedOpenShift`
55-
endif::rosa-terraform[]
55+
endif::tf-classic,tf-hcp[]
5656
* No cluster admin role created
5757

5858
|Cluster settings
5959
|
60-
ifdef::rosa-terraform[]
60+
ifdef::tf-classic,tf-hcp[]
6161
* Default cluster version: `4.14`
6262
* Cluster name: `rosa-<6-digit-alphanumeric-string>`
6363
* Default AWS region for installations using the {cluster-manager-first} {hybrid-console-second}: us-east-2 (US East, Ohio)
6464
* Availability: Multi zone for the data plane
65-
endif::rosa-terraform[]
66-
ifndef::rosa-terraform[]
65+
endif::tf-classic,tf-hcp[]
66+
ifndef::tf-classic,tf-hcp[]
6767
* Default cluster version: Latest
6868
ifndef::rosa-hcp[]
6969
* Default AWS region for installations using the {cluster-manager-first} {hybrid-console-second}: us-east-1 (US East, North Virginia)
@@ -72,62 +72,69 @@ ifdef::rosa-hcp[]
7272
* Default AWS region for installations using the ROSA CLI (`rosa`): Defined by your `aws` CLI configuration
7373
endif::rosa-hcp[]
7474
* Availability: Single zone for the data plane
75-
endif::rosa-terraform[]
75+
endif::tf-classic,tf-hcp[]
76+
ifndef::rosa-hcp,tf-hcp[]
7677
* Default EC2 IMDS endpoints (both v1 and v2) are enabled
78+
endif::rosa-hcp,tf-hcp[]
7779
* Monitoring for user-defined projects: Enabled
7880

7981
|Encryption
8082
|* Cloud storage is encrypted at rest
8183
* Additional etcd encryption is not enabled
84+
ifndef::rosa-hcp,tf-hcp[]
8285
* The default AWS Key Management Service (KMS) key is used as the encryption key for persistent data
86+
endif::rosa-hcp,tf-hcp[]
87+
ifdef::rosa-hcp,tf-hcp[]
88+
* AWS Key Management Service (KMS) key encryption is not enabled by default.
89+
endif::rosa-hcp,tf-hcp[]
8390

84-
ifndef::rosa-hcp[]
91+
ifndef::rosa-hcp,tf-hcp[]
8592
|Control plane node configuration
8693
|* Control plane node instance type: m5.2xlarge (8 vCPU, 32 GiB RAM)
8794
* Control plane node count: 3
8895

8996
|Infrastructure node configuration
9097
|* Infrastructure node instance type: r5.xlarge (4 vCPU, 32 GiB RAM)
9198
* Infrastructure node count: 2
92-
endif::rosa-hcp[]
99+
endif::rosa-hcp,tf-hcp[]
93100

94101
|Compute node machine pool
95102
|* Compute node instance type: m5.xlarge (4 vCPU 16, GiB RAM)
96-
ifndef::rosa-terraform[]
103+
ifndef::tf-classic,tf-hcp[]
97104
* Compute node count: 2
98-
endif::rosa-terraform[]
99-
ifdef::rosa-terraform[]
105+
endif::tf-classic,tf-hcp[]
106+
ifdef::tf-classic,tf-hcp[]
100107
* Compute node count: 3
101-
endif::rosa-terraform[]
108+
endif::tf-classic,tf-hcp[]
102109
* Autoscaling: Not enabled
103110
* No additional node labels
104111

105112
|Networking configuration
106113
|
107-
ifndef::rosa-terraform[]
114+
ifndef::tf-classic,tf-hcp[]
108115
* Cluster privacy: Public
109-
endif::rosa-terraform[]
110-
ifdef::rosa-terraform[]
116+
endif::tf-classic,tf-hcp[]
117+
ifdef::tf-classic,tf-hcp[]
111118
* Cluster privacy: public or private
112119
* You can choose to create a new VPC during the Terraform cluster creation process.
113-
endif::rosa-terraform[]
120+
endif::tf-classic,tf-hcp[]
114121
ifdef::rosa-hcp[]
115122
* You must have configured your own Virtual Private Cloud (VPC)
116123
endif::rosa-hcp[]
117124
* No cluster-wide proxy is configured
118125

119126
|Classless Inter-Domain Routing (CIDR) ranges
120127
|
121-
ifdef::rosa-terraform[]
128+
ifdef::tf-classic,tf-hcp[]
122129
* Machine CIDR: 10.0.0.0/16
123130
* Service CIDR: 172.30.0.0/16
124131
* Pod CIDR: 10.128.0.0/14
125-
endif::rosa-terraform[]
126-
ifndef::rosa-terraform[]
132+
endif::tf-classic,tf-hcp[]
133+
ifndef::tf-classic,tf-hcp[]
127134
* Machine CIDR: 10.0.0.0/16
128135
* Service CIDR: 172.30.0.0/16
129136
* Pod CIDR: 10.128.0.0/16
130-
endif::rosa-terraform[]
137+
endif::tf-classic,tf-hcp[]
131138
* Host prefix: /23
132139
+
133140
ifdef::rosa-hcp[]
@@ -144,12 +151,12 @@ endif::rosa-hcp[]
144151
====
145152
For installations that use {cluster-manager} on the {hybrid-console-second}, the `auto` mode requires an admin-privileged {cluster-manager} role.
146153
====
147-
ifdef::rosa-terraform[]
154+
ifdef::tf-classic,tf-hcp[]
148155
* Default Operator role prefix: `rosa-<6-digit-alphanumeric-string>`
149-
endif::rosa-terraform[]
150-
ifndef::rosa-terraform[]
156+
endif::tf-classic,tf-hcp[]
157+
ifndef::tf-classic,tf-hcp[]
151158
* Default Operator role prefix: `<cluster_name>-<4_digit_random_string>`
152-
endif::rosa-terraform[]
159+
endif::tf-classic,tf-hcp[]
153160

154161
|Cluster update strategy
155162
|* Individual updates
@@ -161,8 +168,11 @@ ifeval::["{context}" == "rosa-hcp-sts-creating-a-cluster-quickly"]
161168
:!rosa-hcp:
162169
endif::[]
163170
ifeval::["{context}" == "rosa-sts-creating-a-cluster-quickly"]
164-
:!rosa-standalone:
171+
:!rosa-classic:
165172
endif::[]
166173
ifeval::["{context}" == "rosa-classic-creating-a-cluster-quickly-terraform"]
167-
:!rosa-terraform:
174+
:!tf-classic:
175+
endif::[]
176+
ifeval::["{context}" == "rosa-hcp-creating-a-cluster-quickly-terraform"]
177+
:!tf-hcp:
168178
endif::[]

modules/rosa-sts-terraform-prerequisites.adoc

Lines changed: 1 addition & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,41 +1,19 @@
11
// Module included in the following assemblies:
22
//
33
// * rosa_planning/rosa-understanding-terraform.adoc
4-
ifeval::["{context}" == "rosa-understanding-terraform"]
5-
:tf-full:
6-
endif::[]
74

85
:_mod-docs-content-type: CONCEPT
96
[id="rosa-sts-terraform-prerequisites_{context}"]
10-
ifdef::tf-full[]
11-
= Prerequisites for Terraform
12-
endif::tf-full[]
13-
ifndef::tf-full[]
147
.Prerequisites
15-
endif::tf-full[]
168

179
To use link:https://registry.terraform.io/providers/terraform-redhat/rhcs/latest/docs[the Red{nbsp}Hat Cloud Services provider] inside your Terraform configuration, you must meet the following prerequisites:
1810

1911
* You have installed the {product-title} (ROSA) command-line interface (CLI) tool.
20-
ifdef::tf-full[]
21-
+
22-
See the Additional resources for further installation instructions.
23-
endif::tf-full[]
2412
* You have your offline link:https://console.redhat.com/openshift/token/rosa[{cluster-manager-first} token].
25-
ifdef::tf-full[]
26-
+
27-
This token is generated through the Red{nbsp}Hat Hybrid Cloud Console. It is unique to your account and should not be shared. The token is generated based off your account access and permissions.
28-
endif::tf-full[]
2913
* You have installed link:https://developer.hashicorp.com/terraform/downloads[Terraform version 1.4.6] or newer.
30-
ifdef::tf-full[]
31-
+
32-
You must have Terraform configured for your local system. The Terraform website contains installation options for MacOS, Windows, and Linux.
33-
endif::tf-full[]
34-
ifndef::tf-full[]
3514
* You have created your AWS account-wide IAM roles.
3615
+
3716
The specific account-wide IAM roles and policies provide the STS permissions required for ROSA support, installation, control plane, and compute functionality. This includes account-wide Operator policies. See the Additional resources for more information on the AWS account roles.
38-
endif::tf-full[]
3917
* You have an link:https://aws.amazon.com/free/?all-free-tier[AWS account] and link:https://docs.aws.amazon.com/IAM/latest/UserGuide/security-creds.html[associated credentials] that allow you to create resources. The credentials are configured for the AWS provider. See the link:https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration[Authentication and Configuration] section in AWS Terraform provider documentation.
4018
* You have, at minimum, the following permissions in your AWS IAM role policy that is operating Terraform. Check for these permissions in the AWS console.
4119
+
@@ -108,7 +86,4 @@ endif::tf-full[]
10886
]
10987
}
11088
----
111-
====
112-
ifeval::["{context}" == "rosa-understanding-terraform"]
113-
:!tf-full:
114-
endif::[]
89+
====

rosa_hcp/terraform/rosa-hcp-creating-a-cluster-quickly-terraform.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,4 +30,9 @@ The cluster creation process outlined below shows how to use Terraform to create
3030
include::modules/rosa-sts-cluster-terraform-setup.adoc[leveloffset=+2]
3131
include::modules/rosa-hcp-cluster-terraform-file-creation.adoc[leveloffset=+2]
3232
include::modules/rosa-sts-cluster-terraform-execute.adoc[leveloffset=+2]
33-
include::modules/rosa-sts-cluster-terraform-destroy.adoc[leveloffset=+2]
33+
include::modules/rosa-sts-cluster-terraform-destroy.adoc[leveloffset=+2]
34+
35+
[role="_additional-resources"]
36+
[id="additional-resources_rosa-hcp-creating-a-cluster-quickly-terraform"]
37+
== Additional resources
38+
* xref:../../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference]

rosa_hcp/terraform/rosa-hcp-creating-a-cluster-with-customizations-terraform.adoc

Lines changed: 0 additions & 72 deletions
This file was deleted.

rosa_install_access_delete_clusters/terraform/rosa-classic-creating-a-cluster-quickly-terraform.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,4 +29,9 @@ The cluster creation process outlined below shows how to use Terraform to create
2929
include::modules/rosa-sts-cluster-terraform-setup.adoc[leveloffset=+2]
3030
include::modules/rosa-classic-cluster-terraform-file-creation.adoc[leveloffset=+2]
3131
include::modules/rosa-sts-cluster-terraform-execute.adoc[leveloffset=+2]
32-
include::modules/rosa-sts-cluster-terraform-destroy.adoc[leveloffset=+2]
32+
include::modules/rosa-sts-cluster-terraform-destroy.adoc[leveloffset=+2]
33+
34+
[role="_additional-resources"]
35+
[id="additional-resources_rosa-classic-creating-a-cluster-quickly-terraform"]
36+
== Additional resources
37+
* xref:../../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference]

0 commit comments

Comments
 (0)