Skip to content

Commit d4516b0

Browse files
authored
Merge pull request #60203 from EricPonvelle/OSDOCS-6147_HCP-Updates
OSDOCS-6147: Updated ROSA with HCP content
2 parents 87eefe8 + 105d39d commit d4516b0

17 files changed

+281
-108
lines changed

_topic_maps/_topic_map_rosa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ Topics:
111111
- Name: Using the Node Tuning Operator on ROSA with HCP
112112
File: rosa-tuning-config
113113
---
114-
Name: Install ROSA classic clusters
114+
Name: Install ROSA Classic clusters
115115
Dir: rosa_install_access_delete_clusters
116116
Distros: openshift-rosa
117117
Topics:

modules/rosa-adding-tuning.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ You can add tunings for compute (also known as worker) nodes in a machine pool t
1212

1313
ifdef::openshift-rosa[]
1414
* You installed and configured the latest AWS (`aws`), ROSA (`rosa`), and OpenShift (`oc`) CLIs on your workstation.
15-
* You logged in to your Red Hat account by using the `rosa` CLI.
15+
* You logged in to your Red Hat account by using the ROSA CLI.
1616
* You created a {product-title} (ROSA) cluster.
1717
endif::openshift-rosa[]
1818
ifndef::openshift-rosa[]

modules/rosa-creating-node-tuning.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="rosa-creating-node-tuning_{context}"]
77
= Creating node tuning configurations on {hcp-title}
88

9-
You can create tuning configurations using the `rosa` CLI.
9+
You can create tuning configurations using the ROSA CLI.
1010

1111
.Prerequisites
1212

modules/rosa-deleting-node-tuning.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="rosa-deleting-node-tuning_{context}"]
77
= Deleting node tuning configurations on {hcp-title}
88

9-
You can delete tuning configurations by using the `rosa` CLI.
9+
You can delete tuning configurations by using the ROSA CLI.
1010

1111
[NOTE]
1212
====

modules/rosa-hcp-byo-oidc.adoc

Lines changed: 11 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,9 @@
44

55
:_content-type: PROCEDURE
66
[id="rosa-hcp-byo-oidc_{context}"]
7-
= Generating your own OpenID Connect configuration
7+
= Creating an OpenID Connect configuration
88

9-
You can create your own OpenID Connect (OIDC) configuration before you create your cluster by using the `rosa create oidc-config --mode=auto` command. This command produces an OIDC configuration that is hosted under Red Hat's AWS account. The `rosa` CLI provides some additional options for creating your OIDC configuration.
10-
11-
You can generate managed or unmanaged OIDC configurations. Customer-hosted, or unmanaged, OIDC configurations are stored within your AWS account, and the configurations are flagged for use with {cluster-manager-first}. This process also provides you with a private key to have access to and take ownership of the configurations. Red Hat-hosted, or managed, OIDC configurations are stored within Red Hat's AWS account. This process provides you with private keys for accessing the configuration.
12-
13-
[NOTE]
14-
====
15-
When using the `--managed` parameter, you can only create a new managed OIDC configuration if there are no unused configurations; all existing OIDC configurations must be attached to a cluster. If you delete all of your clusters with attached managed OIDC configurations, you cannot create a new configuration until the unused one is reused or deleted.
16-
====
9+
When using a {hcp-title} cluster, you must create the OpenID Connect (OIDC) configuration prior to creating your cluster. This configuration is registered to be used with OCM.
1710

1811
.Prerequisites
1912

@@ -35,18 +28,17 @@ This command returns the following information.
3528
+
3629
[source,terminal]
3730
----
38-
I: This command will create a S3 bucket populating it with documents to be compliant with OIDC protocol. It will also create a Secret in Secrets Manager containing the private key
39-
I: Using arn:aws:iam::242819244:role/ManagedOpenShift-Installer-Role for the Installer role
40-
? Prefix for OIDC (optional):
41-
I: Setting up unmanaged OIDC configuration 'oidc-r7u1'
42-
I: Please run the following command to create a cluster with this oidc config
43-
rosa create cluster --sts --oidc-config-id 233hvnrjoqu14jltk6lhbhf2tj11f8un
44-
I: Creating OIDC provider using 'arn:aws:iam::242819244:user/userName'
31+
? Would you like to create a Managed (Red Hat hosted) OIDC Configuration Yes
32+
I: Setting up managed OIDC configuration
33+
I: To create Operator Roles for this OIDC Configuration, run the following command and remember to replace <user-defined> with a prefix of your choice:
34+
rosa create operator-roles --prefix <user-defined> --oidc-config-id 13cdr6b
35+
If you are going to create a Hosted Control Plane cluster please include '--hosted-cp'
36+
I: Creating OIDC provider using 'arn:aws:iam::4540112244:user/userName'
4537
? Create the OIDC provider? Yes
46-
I: Created OIDC provider with ARN 'arn:aws:iam::242819244:oidc-provider/oidc-r7u1.s3.us-east-1.amazonaws.com'
38+
I: Created OIDC provider with ARN 'arn:aws:iam::4540112244:oidc-provider/dvbwgdztaeq9o.cloudfront.net/13cdr6b'
4739
----
48-
49-
When creating your cluster, you must supply the OIDC config ID. The CLI output provides this value for `--mode auto`, otherwise you must to determine these values based on `aws` CLI output for `--mode manual`.
40+
+
41+
When creating your cluster, you must supply the OIDC config ID. The CLI output provides this value for `--mode auto`, otherwise you must determine these values based on `aws` CLI output for `--mode manual`.
5042
5143
.Verification
5244

modules/rosa-hcp-classic-comparison.adoc

Lines changed: 15 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@
1818
| Hosted Control Plane
1919
| Classic
2020

21-
| *What are each of the installation paths?*
22-
| This installation path deploys control plane components, such as etcd, API server, and oauth, that are hosted separately on AWS in a Red Hat-owned and managed account.
23-
| This installation path deploys the control plane components side by side with infrastructure and worker nodes that are hosted together in the customer’s same AWS account.
21+
| Cluster infrastructure hosting
22+
| {hcp-title} deploys control plane components, such as etcd, API server, and oauth, that are hosted separately on AWS in a Red Hat-owned and managed account.
23+
| ROSA Classic deploys the control plane components side by side with infrastructure and worker nodes that are hosted together in the customer’s same AWS account.
2424

2525
| *Provisioning Time*
2626
| Approximately 10 minutes
@@ -29,17 +29,18 @@
2929
| *Architecture*
3030
|
3131
* Underlying control plane infrastructure is fully managed and directly unavailable to end customers except through dedicated and explicitly exposed endpoints
32+
* Work nodes are hosted in the customer's AWS account
3233
|
3334
* Customer is responsible for hosting control plane and AWS infrastructure, while still being _managed_ by Red Hat
34-
* All-in-one {product-title} infrastructure architecture
35+
* Work nodes are hosted in the customer's AWS account
3536

36-
| *Footprint*
37+
| *Minimum Amazon EC2 footprint*
3738
| One cluster requires a minimum of two nodes
3839
| One cluster requires a minimum of seven nodes
3940

4041
| *Deployment*
4142
|
42-
* Deploy using ROSA CLI or web UI
43+
* Deploy using ROSA CLI
4344
* Customers provision "Hosted Clusters" that deploy the control plane components into Red Hat's AWS account
4445
* Customers provision "Machine Pools" that deploy worker nodes into the customer's AWS account
4546
|
@@ -52,22 +53,16 @@
5253

5354
| *Regional Availability*
5455
|
55-
* eu-central-1
56-
* eu-west-1
57-
* us-east-1
58-
* us-east-2
59-
* us-west-2
60-
| Available for purchase in all countries where AWS is commercially available
56+
* Europe - Frankfort (eu-central-1)
57+
* Europe - Ireland (eu-west-1)
58+
* US East - N. Virginia (us-east-1)
59+
* US East - Ohio (us-east-2)
60+
* US West - Oregon (us-west-2)
61+
| For AWS Region availability, see link:https://docs.aws.amazon.com/general/latest/gr/rosa.html[Red Hat OpenShift Service on AWS endpoints and quotas] in the AWS documentation.
6162

6263
| *Compliance*
6364
|
64-
* Compliance certifications planned for after GA
65-
* FIPS compliance not yet available
65+
* Compliance certifications and FIPS are not yet available.
6666
|
67-
* ISO 27001, 17, 18
68-
* SOC 2 Type 2
69-
* SOC 3
70-
* PCI-DSS
71-
* HIPAA
72-
67+
* Compliance specifics are located in the {product-title} documentation.
7368
|===

modules/rosa-hcp-creating-account-wide-sts-roles-and-policies.adoc

Lines changed: 5 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="rosa-sts-creating-account-wide-sts-roles-and-policies_{context}"]
77
= Creating the account-wide STS roles and policies
88

9-
Before using the {cluster-manager-first} {hybrid-console-second} to create {hcp-title-first} clusters, create the required account-wide roles and policies, including the Operator policies.
9+
Before using the ROSA CLI to create {hcp-title-first} clusters, create the required account-wide roles and policies, including the Operator policies.
1010

1111
.Prerequisites
1212

@@ -19,31 +19,15 @@ Before using the {cluster-manager-first} {hybrid-console-second} to create {hcp-
1919
====
2020
To successfully install {hcp-title} clusters, use the latest version of the ROSA CLI (`rosa`).
2121
====
22-
* You have logged in to your Red Hat account by using the `rosa` CLI.
22+
* You have logged in to your Red Hat account by using the ROSA CLI.
2323
2424
.Procedure
2525

26-
. Check your AWS account for existing roles and policies by running the following command:
26+
. If they do not exist in your AWS account, create the required account-wide STS roles and policies by running the following command:
2727
+
2828
[source,terminal]
2929
----
30-
$ rosa list account-roles
30+
$ rosa create account-roles --force-policy-creation
3131
----
3232
+
33-
.Sample output
34-
[source,terminal]
35-
----
36-
I: Fetching account roles
37-
ROLE NAME ROLE TYPE ROLE ARN OPENSHIFT VERSION
38-
ManagedOpenShift-ControlPlane-Role Control plane arn:aws:iam::8744:role/ManagedOpenShift-ControlPlane-Role 4.13
39-
ManagedOpenShift-Installer-Role Installer arn:aws:iam::8744:role/ManagedOpenShift-Installer-Role 4.13
40-
ManagedOpenShift-Support-Role Support arn:aws:iam::8744:role/ManagedOpenShift-Support-Role 4.13
41-
ManagedOpenShift-Worker-Role Worker arn:aws:iam::8744:role/ManagedOpenShift-Worker-Role 4.13
42-
----
43-
44-
. If they do not exist in your AWS account, create the required account-wide STS roles and policies by running the following command:
45-
+
46-
[source,terminal]
47-
----
48-
$ rosa create account-roles
49-
----
33+
The `--force-policy-creation` parameter updates any existing roles and policies that are present. If no roles and policies are present, the command creates these resources instead.

modules/rosa-hcp-sts-creating-a-cluster-cli.adoc

Lines changed: 4 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ When using {product-title} (ROSA) CLI (`rosa`) to create a cluster, you can sele
1919
====
2020
To successfully install ROSA clusters, use the latest version of the ROSA CLI (`rosa`).
2121
====
22-
* You have logged in to your Red Hat account by using the `rosa` CLI.
22+
* You have logged in to your Red Hat account by using the ROSA CLI.
23+
* You have created an OIDC configuration.
2324
* You have verified that the AWS Elastic Load Balancing (ELB) service role exists in your AWS account.
2425
2526
.Procedure
@@ -33,18 +34,14 @@ To successfully install ROSA clusters, use the latest version of the ROSA CLI (`
3334
//----
3435

3536
. You can create your {hcp-title} cluster with one of the following commands.
36-
+
37-
[NOTE]
38-
====
39-
If you are using your own OIDC provider, you must include the OIDC config ID, such as `--oidc-config-id <oidc_config_id>`.
40-
====
4137

4238
** Create a cluster with a single, initial machine pool, publicly available API, and publicly available Ingress by running the following command:
4339
+
4440
[source,terminal]
4541
----
4642
$ rosa create cluster --cluster-name=<cluster_name> \
47-
--sts --mode=auto --hosted-cp --subnet-ids=<public-subnet-id>,<private-subnet-id>
43+
--sts --mode=auto --hosted-cp --operator-roles-prefix <operator-role-prefix> \
44+
--oidc-config-id <ID-of-OIDC-configuration> --subnet-ids=<public-subnet-id>,<private-subnet-id>
4845
----
4946

5047
** Create a cluster with a single, initial machine pool, privately available API, and privately available Ingress by running the following command:
@@ -54,11 +51,6 @@ $ rosa create cluster --cluster-name=<cluster_name> \
5451
$ rosa create cluster --private --cluster-name=<cluster_name> \
5552
--sts --mode=auto --hosted-cp --subnet-ids=<private-subnet-id>
5653
----
57-
+
58-
[NOTE]
59-
====
60-
When you specify `--mode auto`, the `rosa create cluster` command creates the cluster-specific Operator IAM roles and the OIDC provider automatically. The Operators use the OIDC provider to authenticate.
61-
====
6254

6355
. Check the status of your cluster by running the following command:
6456
+
@@ -69,7 +61,6 @@ $ rosa describe cluster --cluster=<cluster_name>
6961
+
7062
The following `State` field changes are listed in the output as the cluster installation progresses:
7163
+
72-
* `waiting (Waiting for OIDC configuration)`
7364
* `pending (Preparing account)`
7465
* `installing (DNS setup in progress)`
7566
* `installing`

modules/rosa-hcp-vpc-manual.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id="rosa-hcp-vpc-manual_{context}"]
77
= Creating a Virtual Private Cloud manually
88

9-
To manually create your Virtual Private Cloud (VPC), go to link:https://us-east-1.console.aws.amazon.com/vpc/[the VPC page in the AWS console]. Your VPC must have the following details.
9+
If you choose to manually create your Virtual Private Cloud (VPC) instead of using Terraform, go to link:https://us-east-1.console.aws.amazon.com/vpc/[the VPC page in the AWS console]. Your VPC must meet the requirements shown in the following table.
1010

1111
.Requirements for your VPC
1212
[options="header",cols="50,50"]

modules/rosa-hcp-vpc-terraform.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,11 +44,11 @@ $ terraform init
4444
+
4545
A message confirming the initialization appears when this process completes.
4646

47-
. To build your VPC Terraform plan based off of the downloaded template, run the `plan` command. You can specify a cluster name and your AWS region.
47+
. To build your VPC Terraform plan based off of the downloaded template, run the `plan` command. You must include your AWS region. Optionally, you can specify a cluster name.
4848
+
4949
[source,terminal]
5050
----
51-
$ terraform plan -out rosa.plan [-var aws_region=<region>] [-var cluster_name=<cluster_name>]
51+
$ terraform plan -out rosa.plan -var aws_region=<region> [-var cluster_name=<cluster_name>]
5252
----
5353

5454
. You should have a `rosa.plan` file in the directory that you created in the first step. Apply this plan file to build your VPC by running the following command:

0 commit comments

Comments
 (0)