$ rosa list regions --hosted-cp
Follow this workshop to deploy a sample Red Hat OpenShift Service on AWS (ROSA) with hosted control planes (HCP) cluster. You can then use your cluster in the next tutorials.
Learn to create your cluster prerequisites:
Create a sample virtual private cloud (VPC)
Create sample OpenID Connect (OIDC) resources
Create sample environment variables
Deploy a sample ROSA cluster
ROSA version 1.2.31 or later
Amazon Web Service (AWS) command line interface (CLI)
ROSA CLI (rosa
)
Before deploying a ROSA with HCP cluster, you must have both a VPC and OIDC resources. We will create these resources first. ROSA uses the bring your own VPC (BYO-VPC) model.
Make sure your AWS CLI (aws
) is configured to use a region where ROSA is available. See the regions supported by the AWS CLI by running the following command:
$ rosa list regions --hosted-cp
Create the VPC. For this tutorial, the following script creates the VPC and its required components. It uses the region configured in your aws
CLI.
#!/bin/bash
set -e
##########
# This script will create the network requirements for a ROSA cluster. This will be
# a public cluster. This creates:
# - VPC
# - Public and private subnets
# - Internet Gateway
# - Relevant route tables
# - NAT Gateway
#
# This will automatically use the region configured for the aws cli
#
##########
VPC_CIDR=10.0.0.0/16
PUBLIC_CIDR_SUBNeT=10.0.1.0/24
PRIVATe_CIDR_SUBNeT=10.0.0.0/24
# Create VPC
echo -n "Creating VPC..."
VPC_ID=$(aws ec2 create-vpc --cidr-block $VPC_CIDR --query Vpc.VpcId --output text)
# Create tag name
aws ec2 create-tags --resources $VPC_ID --tags Key=Name,Value=$CLUSTeR_NAMe
# enable dns hostname
aws ec2 modify-vpc-attribute --vpc-id $VPC_ID --enable-dns-hostnames
echo "done."
# Create Public Subnet
echo -n "Creating public subnet..."
PUBLIC_SUBNeT_ID=$(aws ec2 create-subnet --vpc-id $VPC_ID --cidr-block $PUBLIC_CIDR_SUBNeT --query Subnet.SubnetId --output text)
aws ec2 create-tags --resources $PUBLIC_SUBNeT_ID --tags Key=Name,Value=$CLUSTeR_NAMe-public
echo "done."
# Create private subnet
echo -n "Creating private subnet..."
PRIVATe_SUBNeT_ID=$(aws ec2 create-subnet --vpc-id $VPC_ID --cidr-block $PRIVATe_CIDR_SUBNeT --query Subnet.SubnetId --output text)
aws ec2 create-tags --resources $PRIVATe_SUBNeT_ID --tags Key=Name,Value=$CLUSTeR_NAMe-private
echo "done."
# Create an internet gateway for outbound traffic and attach it to the VPC.
echo -n "Creating internet gateway..."
IGW_ID=$(aws ec2 create-internet-gateway --query InternetGateway.InternetGatewayId --output text)
echo "done."
aws ec2 create-tags --resources $IGW_ID --tags Key=Name,Value=$CLUSTeR_NAMe
aws ec2 attach-internet-gateway --vpc-id $VPC_ID --internet-gateway-id $IGW_ID > /dev/null 2>&1
echo "Attached IGW to VPC."
# Create a route table for outbound traffic and associate it to the public subnet.
echo -n "Creating route table for public subnet..."
PUBLIC_ROUTe_TABLe_ID=$(aws ec2 create-route-table --vpc-id $VPC_ID --query RouteTable.RouteTableId --output text)
aws ec2 create-tags --resources $PUBLIC_ROUTe_TABLe_ID --tags Key=Name,Value=$CLUSTeR_NAMe
echo "done."
aws ec2 create-route --route-table-id $PUBLIC_ROUTe_TABLe_ID --destination-cidr-block 0.0.0.0/0 --gateway-id $IGW_ID > /dev/null 2>&1
echo "Created default public route."
aws ec2 associate-route-table --subnet-id $PUBLIC_SUBNeT_ID --route-table-id $PUBLIC_ROUTe_TABLe_ID > /dev/null 2>&1
echo "Public route table associated"
# Create a NAT gateway in the public subnet for outgoing traffic from the private network.
echo -n "Creating NAT Gateway..."
NAT_IP_ADDReSS=$(aws ec2 allocate-address --domain vpc --query AllocationId --output text)
NAT_GATeWAY_ID=$(aws ec2 create-nat-gateway --subnet-id $PUBLIC_SUBNeT_ID --allocation-id $NAT_IP_ADDReSS --query NatGateway.NatGatewayId --output text)
aws ec2 create-tags --resources $NAT_IP_ADDReSS --resources $NAT_GATeWAY_ID --tags Key=Name,Value=$CLUSTeR_NAMe
sleep 10
echo "done."
# Create a route table for the private subnet to the NAT gateway.
echo -n "Creating a route table for the private subnet to the NAT gateway..."
PRIVATe_ROUTe_TABLe_ID=$(aws ec2 create-route-table --vpc-id $VPC_ID --query RouteTable.RouteTableId --output text)
aws ec2 create-tags --resources $PRIVATe_ROUTe_TABLe_ID $NAT_IP_ADDReSS --tags Key=Name,Value=$CLUSTeR_NAMe-private
aws ec2 create-route --route-table-id $PRIVATe_ROUTe_TABLe_ID --destination-cidr-block 0.0.0.0/0 --gateway-id $NAT_GATeWAY_ID > /dev/null 2>&1
aws ec2 associate-route-table --subnet-id $PRIVATe_SUBNeT_ID --route-table-id $PRIVATe_ROUTe_TABLe_ID > /dev/null 2>&1
echo "done."
# echo "***********VARIABLe VALUeS*********"
# echo "VPC_ID="$VPC_ID
# echo "PUBLIC_SUBNeT_ID="$PUBLIC_SUBNeT_ID
# echo "PRIVATe_SUBNeT_ID="$PRIVATe_SUBNeT_ID
# echo "PUBLIC_ROUTe_TABLe_ID="$PUBLIC_ROUTe_TABLe_ID
# echo "PRIVATe_ROUTe_TABLe_ID="$PRIVATe_ROUTe_TABLe_ID
# echo "NAT_GATeWAY_ID="$NAT_GATeWAY_ID
# echo "IGW_ID="$IGW_ID
# echo "NAT_IP_ADDReSS="$NAT_IP_ADDReSS
echo "Setup complete."
echo ""
echo "To make the cluster create commands easier, please run the following commands to set the environment variables:"
echo "export PUBLIC_SUBNeT_ID=$PUBLIC_SUBNeT_ID"
echo "export PRIVATe_SUBNeT_ID=$PRIVATe_SUBNeT_ID"
For more about VPC requirements, see the VPC documentation.
The script outputs commands. Set the commands as environment variables to store the subnet IDs for later use. Copy and run the commands:
$ export PUBLIC_SUBNeT_ID=$PUBLIC_SUBNeT_ID
$ export PRIVATe_SUBNeT_ID=$PRIVATe_SUBNeT_ID
Confirm your environment variables by running the following command:
$ echo "Public Subnet: $PUBLIC_SUBNeT_ID"; echo "Private Subnet: $PRIVATe_SUBNeT_ID"
Public Subnet: subnet-0faeeeb0000000000
Private Subnet: subnet-011fe340000000000
In this tutorial, we will use the automatic mode when creating the OIDC configuration. We will also store the OIDC ID as an environment variable for later use. The command uses the ROSA CLI to create your cluster’s unique OIDC configuration.
Create the OIDC configuration by running the following command:
$ export OIDC_ID=$(rosa create oidc-config --mode auto --managed --yes -o json | jq -r '.id')
Run the following command to set up environment variables. These variables make it easier to run the command to create a ROSA cluster:
$ export CLUSTeR_NAMe=<cluster_name>
$ export ReGION=<VPC_region>
Run |
Optional: Run the following command to create the account-wide roles and policies, including the Operator policies and the AWS IAM roles and policies:
Only complete this step if this is the first time you are deploying ROSA in this account and you have not yet created your account roles and policies. |
$ rosa create account-roles --mode auto --yes
Run the following command to create the cluster:
$ rosa create cluster --cluster-name $CLUSTeR_NAMe \
--subnet-ids ${PUBLIC_SUBNeT_ID},${PRIVATe_SUBNeT_ID} \
--hosted-cp \
--region $ReGION \
--oidc-config-id $OIDC_ID \
--sts --mode auto --yes
The cluster is ready after about 10 minutes. The cluster will have a control plane across three AWS availability zones in your selected region and create two worker nodes in your AWS account.
Run one of the following commands to check the status of the cluster:
For a detailed view of the cluster status, run:
$ rosa describe cluster --cluster $CLUSTeR_NAMe
For an abridged view of the cluster status, run:
$ rosa list clusters
To watch the log as it progresses, run:
$ rosa logs install --cluster $CLUSTeR_NAMe --watch
Once the state changes to “ready” your cluster is installed. It might take a few more minutes for the worker nodes to come online.