Skip to content

Commit 965a927

Browse files
authored
Merge pull request #55864 from bmcelvee/OSDOCS-5255
OSDOCS-5255: Add temporary ROSA version snippet
2 parents e6fcd39 + ae83448 commit 965a927

File tree

5 files changed

+13
-3
lines changed

5 files changed

+13
-3
lines changed

modules/rosa-create-objects.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ $ rosa create cluster --cluster=<cluster_name> | <cluster_id> [arguments]
142142
|The subnet prefix length (integer) to assign to each individual node. For example, if host prefix is set to `23`, then each node is assigned a `/23` subnet out of the given CIDR.
143143

144144
|--machine-cidr
145-
|Block of IP addresses (ipNet) used by OpenShift Container Platform while installing the cluster. Example: `10.0.0.0/16`
145+
|Block of IP addresses (ipNet) used by {product-title} while installing the cluster. Example: `10.0.0.0/16`
146146

147147
|--max-replicas
148148
|Specifies the maximum number of compute nodes when enabling autoscaling. Default: `2`
@@ -180,7 +180,7 @@ When using `--private-link`, the `--subnet-ids` argument is required and only on
180180
|The Amazon Resource Name (ARN) of the role used by Red Hat Site Reliabilty Engineers (SREs) to enable access to the cluster account to provide support.
181181

182182
|--version
183-
|The version (string) of OpenShift Container Platform that will be used to install the cluster. Example: `4.3.10`
183+
|The version (string) of {product-title} that will be used to install the cluster or cluster resources, including `account-role`. Example: `4.12`
184184

185185
|--worker-iam-role string
186186
|The Amazon Resource Name (ARN) of the IAM role that will be attached to compute instances.

modules/rosa-sts-account-wide-roles-and-policies.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@
55
[id="rosa-sts-account-wide-roles-and-policies_{context}"]
66
= Account-wide IAM role and policy reference
77

8+
include::snippets/rosa-4-11-12-snippet.adoc[]
9+
810
This section provides details about the account-wide IAM roles and policies that are required for ROSA deployments that use STS, including the Operator policies. It also includes the JSON files that define the policies.
911

1012
The account-wide roles and policies are specific to an OpenShift minor release version, for example OpenShift 4.8, and are backward compatible. You can minimize the required STS resources by reusing the account-wide roles and policies for multiple clusters of the same minor version, regardless of their patch version.

modules/rosa-sts-interactive-cluster-creation-mode-options.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The following table describes the interactive cluster creation mode options:
2323
|Create an OpenShift cluster that uses the AWS Security Token Service (STS) to allocate temporary, limited-privilege credentials for component-specific AWS Identity and Access Management (IAM) roles. The service enables cluster components to make AWS API calls using secure cloud resource management practices. The default is `Yes`.
2424

2525
|`OpenShift version`
26-
|Select the version of OpenShift to install, for example `4.3.12`. The default is the latest version.
26+
|Select the version of OpenShift to install, for example `4.12`. The default is the latest version.
2727

2828
|`Installer role ARN`
2929
|If you have more than one set of account roles in your AWS account for your cluster version, a list of installer role ARNs are provided. Select the ARN for the installer role that you want to use with your cluster. The cluster uses the account-wide roles and policies that relate to the selected installer role.

rosa_install_access_delete_clusters/rosa-sts-creating-a-cluster-with-customizations.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ include::_attributes/attributes-openshift-dedicated.adoc[]
66

77
toc::[]
88

9+
include::snippets/rosa-4-11-12-snippet.adoc[]
10+
911
Create a {product-title} (ROSA) cluster with the AWS Security Token Service (STS) using customizations. You can deploy your cluster by using {cluster-manager-first} or the ROSA CLI (`rosa`).
1012

1113
With the procedures in this document, you can also choose between the `auto` and `manual` modes when creating the required AWS Identity and Access Management (IAM) resources.

snippets/rosa-4-11-12-snippet.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
[IMPORTANT]
2+
====
3+
{product-title} ROSA 4.12 cluster creation can take a long time or fail. The default version of ROSA is set to 4.11, which means that only 4.11 resources are created when you create account roles or ROSA clusters using the default settings. Account roles from 4.12 are backwards compatible, which is the case for `account-role` policy versions. You can use the `--version` flag to create 4.12 resources.
4+
5+
For more information see the link:https://access.redhat.com/solutions/6996508[ROSA 4.12 cluster creation failure solution].
6+
====

0 commit comments

Comments
 (0)