You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|The ARN of the IAM role to attach to control plane instances.
206
206
207
+
|--create-cluster-admin
208
+
|Optional. As part of cluster creation, create a local administrator user (`cluster-admin`) for your cluster. This automatically configures an htpasswd identity provider for the `cluster-admin` user. Optionally, use the `--cluster-admin-user` and `--cluster-admin-password` options to specify the username and password for the administrator user. Omitting these options automatically generates the credentials and displays their values as terminal output.
209
+
210
+
|--cluster-admin-user
211
+
|Optional. Specifies the user name of the cluster administrator user created when used in conjunction with the `--create-cluster-admin` option.
212
+
213
+
|--cluster-admin-password
214
+
|Optional. Specifies the password of the cluster administrator user created when used in conjunction with the `--create-cluster-admin` option.
215
+
207
216
|--disable-scp-checks
208
217
|Indicates whether cloud permission checks are disabled when attempting to install a cluster.
<1> `interactive` mode enables you to specify configuration options at the interactive prompts. For more information, see _Interactive cluster creation mode reference_.
53
53
<2> `manual` mode generates the `aws` CLI commands and JSON files needed to create the account-wide roles and policies. After review, you must run the commands manually to create the resources.
54
-
+
55
54
--
55
+
+
56
56
.Example output
57
57
[source,terminal,subs="attributes+"]
58
58
----
@@ -222,51 +222,53 @@ Any optional fields can be left empty and a default will be selected.
222
222
? Domain prefix: <domain_prefix> <1>
223
223
? Deploy cluster with Hosted Control Plane (optional): No
224
224
? Create cluster admin user: Yes <2>
225
-
? Username: user-admin <2>
226
-
? Password: [? for help] *************** <2>
227
-
? OpenShift version: 4.17.0 <3>
228
-
? Configure the use of IMDSv2 for ec2 instances optional/required (optional): <4>
229
-
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role for the Installer role <5>
225
+
? Create custom password for cluster admin: No <3>
226
+
I: cluster admin user is cluster-admin
227
+
I: cluster admin password is password
228
+
? OpenShift version: <openshift_version> <4>
229
+
? Configure the use of IMDSv2 for ec2 instances optional/required (optional): <5>
230
+
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role for the Installer role <6>
230
231
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role for the ControlPlane role
231
232
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role for the Worker role
232
233
I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role for the Support role
I: To view a list of clusters and their status, run 'rosa list clusters'
262
263
I: Cluster '<cluster_name>' has been created.
263
264
I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.
264
265
...
265
266
----
266
267
<1> Optional. When creating your cluster, you can customize the subdomain for your cluster on `*.openshiftapps.com` using the `--domain-prefix` flag. The value for this flag must be unique within your organization, cannot be longer than 15 characters, and cannot be changed after cluster creation. If the flag is not supplied, an autogenerated value is created that depends on the length of the cluster name. If the cluster name is fewer than or equal to 15 characters, that name is used for the domain prefix. If the cluster name is longer than 15 characters, the domain prefix is randomly generated to a 15 character string.
267
-
<2> When creating your cluster, you can create a local administrator user for your cluster. Selecting `Yes` then prompts you to create a user name and password for the cluster admin. The user name must not contain `/`, `:`, or `%`. The password must be at least 14 characters (ASCII-standard) without whitespaces. This process automatically configures an htpasswd identity provider.
268
-
<3> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.17.0`.
269
-
<4> Optional: Specify 'optional' to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify 'required' to configure all EC2 instances to use IMDSv2 only.
268
+
<2> When creating your cluster, you can create a local administrator user (`cluster-admin`) for your cluster. This automatically configures an `htpasswd` identity provider for the `cluster-admin` user.
269
+
<3> You can create a custom password for the `cluster-admin` user, or have the system generate a password. If you do not create a custom password, the generated password is displayed in the command line output. If you specify a custom password, the password must be at least 14 characters (ASCII-standard) without any whitespace. When defined, the password is hashed and transported securely.
270
+
<4> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.17.0`.
271
+
<5> Optional: Specify `optional` to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify `required` to configure all EC2 instances to use IMDSv2 only.
270
272
+
271
273
ifdef::openshift-rosa[]
272
274
[IMPORTANT]
@@ -275,15 +277,15 @@ The Instance Metadata Service settings cannot be changed after your cluster is c
275
277
====
276
278
endif::openshift-rosa[]
277
279
+
278
-
<5> If you have more than one set of account roles for your cluster version in your AWS account, an interactive list of options is provided.
279
-
<6> Optional: Specify an unique identifier that is passed by {product-title} and the OpenShift installer when an account role is assumed. This option is only required for custom account roles that expect an external ID.
280
-
<7> By default, the cluster-specific Operator role names are prefixed with the cluster name and a random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _Defining an Operator IAM role prefix_.
280
+
<6> If you have more than one set of account roles for your cluster version in your {AWS} account, an interactive list of options is provided.
281
+
<7> Optional: Specify an unique identifier that is passed by {product-title} and the OpenShift installer when an account role is assumed. This option is only required for custom account roles that expect an external ID.
282
+
<8> By default, the cluster-specific Operator role names are prefixed with the cluster name and a random 4-digit hash. You can optionally specify a custom prefix to replace `<cluster_name>-<hash>` in the role names. The prefix is applied when you create the cluster-specific Operator IAM roles. For information about the prefix, see _About custom Operator IAM role prefixes_.
281
283
+
282
284
[NOTE]
283
285
====
284
286
If you specified custom ARN paths when you created the associated account-wide roles, the custom path is automatically detected. The custom path is applied to the cluster-specific Operator roles when you create them in a later step.
285
287
====
286
-
<8> Optional: Specify a tag that is used on all resources created by {product-title} in AWS. Tags can help you manage, identify, organize, search for, and filter resources within AWS. Tags are comma separated, for example: "key value, data input".
288
+
<9> Optional: Specify a tag that is used on all resources created by {product-title} in AWS. Tags can help you manage, identify, organize, search for, and filter resources within AWS. Tags are comma separated, for example: `key value, data input`.
287
289
+
288
290
[IMPORTANT]
289
291
====
@@ -292,16 +294,16 @@ Tags that are added by Red{nbsp}Hat are required for clusters to stay in complia
292
294
293
295
{product-title} does not support adding additional tags outside of ROSA cluster-managed resources. These tags can be lost when AWS resources are managed by the ROSA cluster. In these cases, you might need custom solutions or tools to reconcile the tags and keep them intact.
294
296
====
295
-
<9> Optional: Multiple availability zones are recommended for production workloads. The default is a single availability zone.
296
-
<10> Optional: You can create a cluster in an existing VPC, or ROSA can create a new VPC to use.
297
+
<10> Optional: Multiple availability zones are recommended for production workloads. The default is a single availability zone.
298
+
<11> Optional: You can create a cluster in an existing VPC, or ROSA can create a new VPC to use.
297
299
+
298
300
[WARNING]
299
301
====
300
302
You cannot install a ROSA cluster into an existing VPC that was created by the OpenShift installer. These VPCs are created during the cluster deployment process and must only be associated with a single cluster to ensure that cluster provisioning and deletion operations work correctly.
301
303
302
304
To verify whether a VPC was created by the OpenShift installer, check for the `owned` value on the `kubernetes.io/cluster/<infra-id>` tag. For example, when viewing the tags for the VPC named `mycluster-12abc-34def`, the `kubernetes.io/cluster/mycluster-12abc-34def` tag has a value of `owned`. Therefore, the VPC was created by the installer and must not be modified by the administrator.
303
305
====
304
-
<11> Optional: Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN in the preceding step.
306
+
<12> Optional: Enable this option if you are using your own AWS KMS key to encrypt the control plane, infrastructure, worker node root volumes, and PVs. Specify the ARN for the KMS key that you added to the account-wide role ARN in the preceding step.
305
307
+
306
308
[IMPORTANT]
307
309
====
@@ -310,16 +312,16 @@ Only persistent volumes (PVs) created from the default storage class are encrypt
310
312
PVs created by using any other storage class are still encrypted, but the PVs are not encrypted with this key unless the storage class is specifically configured to use this key.
311
313
====
312
314
313
-
<12> Optional: You can select additional custom security groups to use in your cluster. You must have already created the security groups and associated them with the VPC you selected for this cluster. You cannot add or edit security groups for the default machine pools after you create the machine pool. For more information, see the requirements for _Security groups_ under _Additional resources_.
314
-
<13> Optional: Enable this option if you require your cluster to be FIPS validated. Selecting this option means the encrypt etcd data option is enabled by default and cannot be disabled. You can encrypt etcd data without enabling FIPS support.
315
-
<14> Optional: Enable this option if your use case only requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted but not the keys.
315
+
<13> Optional: You can select additional custom security groups to use in your cluster. You must have already created the security groups and associated them with the VPC you selected for this cluster. You cannot add or edit security groups for the default machine pools after you create the machine pool. For more information, see the requirements for _Security groups_ under _Additional resources_.
316
+
<14> Optional: Enable this option if you require your cluster to be FIPS validated. Selecting this option means the encrypt etcd data option is enabled by default and cannot be disabled. You can encrypt etcd data without enabling FIPS support.
317
+
<15> Optional: Enable this option if your use case only requires etcd key value encryption in addition to the control plane storage encryption that encrypts the etcd volumes by default. With this option, the etcd key values are encrypted but not the keys.
316
318
+
317
319
[IMPORTANT]
318
320
====
319
321
By enabling etcd encryption for the key values in etcd, you will incur a performance overhead of approximately 20%. The overhead is a result of introducing this second layer of encryption, in addition to the default control plane storage encryption that encrypts the etcd volumes. Red{nbsp}Hat recommends that you enable etcd encryption only if you specifically require it for your use case.
320
322
====
321
323
+
322
-
<15> The output includes a custom command that you can run to create another cluster with the same configuration.
324
+
<16> The output includes a custom command that you can run to create another cluster with the same configuration.
323
325
--
324
326
+
325
327
As an alternative to using the `--interactive` mode, you can specify the customization options directly when you run the `rosa create cluster` command. Run the `rosa create cluster --help` command to view a list of available CLI options, or see _create cluster_ in _Managing objects with the ROSA CLI_.
Copy file name to clipboardExpand all lines: modules/rosa-sts-interactive-cluster-creation-mode-options.adoc
+4-1Lines changed: 4 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,10 @@ The following table describes the interactive cluster creation mode options:
26
26
|Enable the use of Hosted Control Planes.
27
27
28
28
|`Create cluster admin user`
29
-
|Create a cluster administrator user when you create your cluster using the htpasswd identity provider. The username must not contain `/`, `:`, or `%`. The password must be at least 14 characters (ASCII-standard) without whitespaces.
29
+
a|Create a local administrator user (`cluster-admin`) for your cluster. This automatically configures a htpasswd identity provider for the `cluster-admin` user.
30
+
31
+
|`Create custom password for cluster admin`
32
+
a|Create a custom password for the `cluster-admin` user, or use a system-generated password. If you create a custom password, the password must be at least 14 characters (ASCII-standard) and contain no whitespace characters. If you do not create a custom password, the system generates a password and displays it in the command line output.
30
33
31
34
|`Deploy cluster using AWS STS`
32
35
|Create an OpenShift cluster that uses the AWS Security Token Service (STS) to allocate temporary, limited-privilege credentials for component-specific AWS Identity and Access Management (IAM) roles. The service enables cluster components to make AWS API calls using secure cloud resource management practices. The default is `Yes`.
0 commit comments