You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update ROSA HCP cluster creation and IAM role instructions:
- Add ROSA and MachinePool feature gate requirements before clusterctl init
- Add note about rosa-creds-secret namespace matching resource namespace
- Add note about ROSARoleConfig prefix max length (4 characters)
- Update OpenShift version from 4.19.0 to 4.20.11 with version check hint
- Update Cluster and MachinePool API version from v1beta1 to v1beta2
Copy file name to clipboardExpand all lines: docs/book/src/topics/rosa/creating-a-cluster.md
+19-11Lines changed: 19 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,13 @@
5
5
1. Install the required tools and set up the prerequisite infrastructure using the [ROSA Setup guide](https://docs.aws.amazon.com/rosa/latest/userguide/set-up.html).
6
6
7
7
8
-
2. Create a management cluster using the [Quick Start Guide.](https://cluster-api-aws.sigs.k8s.io/quick-start)
8
+
2. Export the following:
9
+
```shell
10
+
export EXP_ROSA=true
11
+
export EXP_MACHINE_POOL=true
12
+
```
13
+
14
+
3. Create a management cluster using the [Quick Start Guide.](https://cluster-api-aws.sigs.k8s.io/quick-start)
9
15
10
16
11
17
## IAM Role Configuration
@@ -38,7 +44,7 @@ The CAPA controller requires service account credentials to provision ROSA HCP c
Note: to consume the secret without the need to reference it from your `ROSAControlPlane`, name your secret `rosa-creds-secret` and create it in the CAPA manager namespace (usually `capa-system`)
47
+
**Note:** The secret must be created in the same namespace where your ROSA resources will be deployed. Alternatively, to consume the secret without the need to reference it from your `ROSAControlPlane`, name your secret `rosa-creds-secret` and create it in the CAPA manager namespace (usually `capa-system`)
**Note:** The `IAMFullAccess` policy is required for the CAPA controller to create and manage the ROSA account roles, operator roles, and OIDC providers via the `ROSARoleConfig` resource.
69
+
65
70
## Annotate the Service Account
66
71
67
72
1. Retrieve the IAM role ARN:
@@ -77,10 +82,20 @@ When using a management cluster (OCP or ROSA-HCP) created using AWS credentials
77
82
eks.amazonaws.com/role-arn=$APP_IAM_ROLE_ARN
78
83
```
79
84
80
-
3. Restart the CAPA controller to pick up the new role:
85
+
3. Remove the bootstrap AWS credentials from the CAPA controller so it uses the IAM role instead of static credentials. First, delete the secret:
**Note:** The volume indices above (`/1`) assume the default deployment configuration. Verify the correct indices by inspecting the deployment if you have customized it.
100
+
86
101
After this configuration, the CAPA controller will use the IAM role to manage AWS resources, and you can provision ROSA HCP clusters without storing AWS credentials in the management cluster.
0 commit comments