|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * rosa_hcp/rosa-hcp-aws-private-creating-cluster.adoc |
| 4 | + |
| 5 | + |
| 6 | +:_mod-docs-content-type: PROCEDURE |
| 7 | +[id="rosa-additional-principals-create_{context}"] |
| 8 | += Adding additional principals while creating your {hcp-title} cluster |
| 9 | + |
| 10 | +Use the `--additional-allowed-principals` argument to permit access through other roles. |
| 11 | + |
| 12 | +.Procedure |
| 13 | + |
| 14 | +. Add the `--additional-allowed-principals` argument to the `rosa create cluster` command, similar to the following: |
| 15 | ++ |
| 16 | +[source,terminal] |
| 17 | +---- |
| 18 | +$ rosa create cluster [...] --additional-allowed-principals <arn_string> |
| 19 | +---- |
| 20 | ++ |
| 21 | +You can use `arn:aws:iam::account_id:role/role_name` to approve a specific role. |
| 22 | + |
| 23 | +. When the cluster creation command runs, you receive a summary of your cluster with the `--additional-allowed-principals` specified: |
| 24 | ++ |
| 25 | +.Example output |
| 26 | ++ |
| 27 | +[source,terminal] |
| 28 | +---- |
| 29 | +Name: mycluster |
| 30 | +Domain Prefix: mycluster |
| 31 | +Display Name: mycluster |
| 32 | +ID: <cluster-id> |
| 33 | +External ID: <cluster-id> |
| 34 | +Control Plane: ROSA Service Hosted |
| 35 | +OpenShift Version: 4.15.17 |
| 36 | +Channel Group: stable |
| 37 | +DNS: Not ready |
| 38 | +AWS Account: <aws_id> |
| 39 | +AWS Billing Account: <aws_id> |
| 40 | +API URL: |
| 41 | +Console URL: |
| 42 | +Region: us-east-2 |
| 43 | +Availability: |
| 44 | + - Control Plane: MultiAZ |
| 45 | + - Data Plane: SingleAZ |
| 46 | + |
| 47 | +Nodes: |
| 48 | + - Compute (desired): 2 |
| 49 | + - Compute (current): 0 |
| 50 | +Network: |
| 51 | + - Type: OVNKubernetes |
| 52 | + - Service CIDR: 172.30.0.0/16 |
| 53 | + - Machine CIDR: 10.0.0.0/16 |
| 54 | + - Pod CIDR: 10.128.0.0/14 |
| 55 | + - Host Prefix: /23 |
| 56 | + - Subnets: subnet-453e99d40, subnet-666847ce827 |
| 57 | +EC2 Metadata Http Tokens: optional |
| 58 | +Role (STS) ARN: arn:aws:iam::<aws_id>:role/mycluster-HCP-ROSA-Installer-Role |
| 59 | +Support Role ARN: arn:aws:iam::<aws_id>:role/mycluster-HCP-ROSA-Support-Role |
| 60 | +Instance IAM Roles: |
| 61 | + - Worker: arn:aws:iam::<aws_id>:role/mycluster-HCP-ROSA-Worker-Role |
| 62 | +Operator IAM Roles: |
| 63 | + - arn:aws:iam::<aws_id>:role/mycluster-kube-system-control-plane-operator |
| 64 | + - arn:aws:iam::<aws_id>:role/mycluster-openshift-cloud-network-config-controller-cloud-creden |
| 65 | + - arn:aws:iam::<aws_id>:role/mycluster-openshift-image-registry-installer-cloud-credentials |
| 66 | + - arn:aws:iam::<aws_id>:role/mycluster-openshift-ingress-operator-cloud-credentials |
| 67 | + - arn:aws:iam::<aws_id>:role/mycluster-openshift-cluster-csi-drivers-ebs-cloud-credentials |
| 68 | + - arn:aws:iam::<aws_id>:role/mycluster-kube-system-kms-provider |
| 69 | + - arn:aws:iam::<aws_id>:role/mycluster-kube-system-kube-controller-manager |
| 70 | + - arn:aws:iam::<aws_id>:role/mycluster-kube-system-capa-controller-manager |
| 71 | +Managed Policies: Yes |
| 72 | +State: waiting (Waiting for user action) |
| 73 | +Private: No |
| 74 | +Delete Protection: Disabled |
| 75 | +Created: Jun 25 2024 13:36:37 UTC |
| 76 | +User Workload Monitoring: Enabled |
| 77 | +Details Page: https://console.redhat.com/openshift/details/s/Bvbok4O79q1Vg8 |
| 78 | +OIDC Endpoint URL: https://oidc.op1.openshiftapps.com/vhufi5lap6vbl3jlq20e (Managed) |
| 79 | +Audit Log Forwarding: Disabled |
| 80 | +External Authentication: Disabled |
| 81 | +Additional Principals: arn:aws:iam::<aws_id>:role/additional-user-role |
| 82 | +---- |
0 commit comments