You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To successfully install ROSA clusters, use latest version of the ROSA CLI.
35
35
====
36
-
* If you are using a customer-managed AWS Key Management Service (KMS) key for encryption, you have created a symmetric KMS key and you have the key ID and Amazon Resource Name (ARN). For more information about creating AWS KMS keys, see link:https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html[the AWS documentation].
36
+
* If you want to use a customer managed AWS Key Management Service (KMS) key for encryption, you must create a symmetric KMS key. You must provide the Amazon Resource Name (ARN) when creating your cluster. To create a customer managed KMS key, follow the procedure for link:https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html#create-symmetric-cmk[Creating symmetric encryption KMS keys].
37
+
+
38
+
[IMPORTANT]
39
+
====
40
+
The EBS operator role is required in addition to the account roles to successfully create your cluster.
After you create your Operator Roles, you must edit the _Key Policy_ in the link:https://console.aws.amazon.com/kms[*Key Management Service (KMS)* page of the AWS Console] to add the roles.
<1> You must specify the ARN for the account-wide role that will be used when you create the ROSA cluster. The ARNs listed in the section must be comma-separated.
192
+
<2> You must specify the ARN for the operator role that will be used when you create the ROSA cluster. The ARNs listed in the section must be comma-separated.
180
193
181
194
.. Apply the changes to your KMS key policy:
182
195
+
@@ -286,6 +299,15 @@ A custom prefix is applied to the Operator role names if you specified the prefi
286
299
287
300
If you specified custom ARN paths when you created the associated account-wide roles, the custom path is automatically detected and applied to the Operator roles.
288
301
====
302
+
+
303
+
[IMPORTANT]
304
+
====
305
+
The EBS operator role is required in addition to the account roles to successfully create your cluster.
After you create your Operator Roles, you must edit the _Key Policy_ in the link:https://console.aws.amazon.com/kms[*Key Management Service (KMS)* page of the AWS Console] to add the roles.
310
+
====
289
311
290
312
. Create the OpenID Connect (OIDC) provider that the cluster Operators use to authenticate:
Copy file name to clipboardExpand all lines: modules/rosa-sts-creating-a-cluster-with-customizations-ocm.adoc
+21Lines changed: 21 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -224,6 +224,18 @@ Only persistent volumes (PVs) created from the default storage class are encrypt
224
224
225
225
PVs created by using any other storage class are only encrypted if the storage class is configured to be encrypted.
226
226
====
227
+
+
228
+
... Optional. To create a customer managed KMS key, follow the procedure for link:https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html#create-symmetric-cmk[Creating symmetric encryption KMS keys].
229
+
+
230
+
[IMPORTANT]
231
+
====
232
+
The EBS operator role is required in addition to the account roles to successfully create your cluster.
After you create your Operator Roles, you must edit the _Key Policy_ in the link:https://console.aws.amazon.com/kms[*Key Management Service (KMS)* page of the AWS Console] to add the roles.
238
+
====
227
239
228
240
.. Click *Next*.
229
241
@@ -392,6 +404,15 @@ If you specified custom ARN paths when you created the associated account-wide r
392
404
====
393
405
If you opted to use *Auto* mode, {cluster-manager} creates the Operator roles and the OIDC provider automatically.
394
406
====
407
+
+
408
+
[IMPORTANT]
409
+
====
410
+
The EBS operator role is required in addition to the account roles to successfully create your cluster.
After you create your Operator Roles, you must edit the _Key Policy_ in the link:https://console.aws.amazon.com/kms[*Key Management Service (KMS)* page of the AWS Console] to add the roles.
0 commit comments