You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To use link:https://registry.terraform.io/providers/terraform-redhat/rhcs/latest/docs[the Red{nbsp}Hat Cloud Services provider] inside your Terraform configuration, you must meet the following prerequisites:
18
10
19
11
* You have installed the {product-title} (ROSA) command-line interface (CLI) tool.
20
-
ifdef::tf-full[]
21
-
+
22
-
See the Additional resources for further installation instructions.
23
-
endif::tf-full[]
24
12
* You have your offline link:https://console.redhat.com/openshift/token/rosa[{cluster-manager-first} token].
25
-
ifdef::tf-full[]
26
-
+
27
-
This token is generated through the Red{nbsp}Hat Hybrid Cloud Console. It is unique to your account and should not be shared. The token is generated based off your account access and permissions.
28
-
endif::tf-full[]
29
13
* You have installed link:https://developer.hashicorp.com/terraform/downloads[Terraform version 1.4.6] or newer.
30
-
ifdef::tf-full[]
31
-
+
32
-
You must have Terraform configured for your local system. The Terraform website contains installation options for MacOS, Windows, and Linux.
33
-
endif::tf-full[]
34
-
ifndef::tf-full[]
35
14
* You have created your AWS account-wide IAM roles.
36
15
+
37
16
The specific account-wide IAM roles and policies provide the STS permissions required for ROSA support, installation, control plane, and compute functionality. This includes account-wide Operator policies. See the Additional resources for more information on the AWS account roles.
38
-
endif::tf-full[]
39
17
* You have an link:https://aws.amazon.com/free/?all-free-tier[AWS account] and link:https://docs.aws.amazon.com/IAM/latest/UserGuide/security-creds.html[associated credentials] that allow you to create resources. The credentials are configured for the AWS provider. See the link:https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration[Authentication and Configuration] section in AWS Terraform provider documentation.
40
18
* You have, at minimum, the following permissions in your AWS IAM role policy that is operating Terraform. Check for these permissions in the AWS console.
* xref:../../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference]
* xref:../../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference]
0 commit comments