Specify the prefix to include in the OCM IAM role name. The default is ManagedOpenShift
. You can create only one OCM role per AWS account for your Red Hat organization.
This section provides an overview of the options that are presented when you use the interactive mode to create the OCM role, the user role, and Red Hat OpenShift service on AWS (ROSA) clusters by using the ROSA CLI (rosa
).
Before you can use Red Hat OpenShift Cluster Manager to create Red Hat OpenShift service on AWS (ROSA) clusters that use the AWS Security Token service (STS), you must associate your AWS account with your Red Hat organization by creating and linking the OCM and user roles. You can enable interactive mode by specifying the --interactive
option when you run the rosa create ocm-role
command or the rosa create user-role
command.
The following tables describe the interactive OCM role creation mode options:
Field | Description |
---|---|
|
Specify the prefix to include in the OCM IAM role name. The default is |
|
Enable the admin OCM IAM role, which is equivalent to specifying the |
|
Specify a permissions boundary Amazon Resource Name (ARN) for the OCM role. For more information, see Permissions boundaries for IAM entities in the AWS documentation. |
|
Specify a custom ARN path for your OCM role. The path must contain alphanumeric characters only and start and end with |
|
Select the role creation mode. You can use |
|
Confirm if you want to create the OCM role. |
|
Confirm if you want to link the OCM role with your Red Hat organization. |
The following tables describe the interactive user role creation mode options:
Field | Description |
---|---|
|
Specify the prefix to include in the user role name. The default is |
|
Specify a permissions boundary Amazon Resource Name (ARN) for the user role. For more information, see Permissions boundaries for IAM entities in the AWS documentation. |
|
Specify a custom ARN path for your user role. The path must contain alphanumeric characters only and start and end with |
|
Selects the role creation mode. You can use |
|
Confirm if you want to create the user role. |
|
Confirm if you want to link the user role with your Red Hat user account. |
You can create a Red Hat OpenShift service on AWS cluster with the AWS Security Token service (STS) by using the interactive mode. You can enable the mode by specifying the --interactive
option when you run the rosa create cluster
command.
The following table describes the interactive cluster creation mode options:
Field | Description | ||
---|---|---|---|
|
Enter a name for your cluster, for example |
||
|
Enter a name for the domain prefix for the subdomain of your cluster, for example |
||
|
Enable the use of Hosted Control Planes. |
||
|
Create a local administrator user ( |
||
|
Create a custom password for the |
||
|
Create an OpenShift cluster that uses the AWS Security Token service (STS) to allocate temporary, limited-privilege credentials for component-specific AWS Identity and Access Management (IAM) roles. The service enables cluster components to make AWS API calls using secure cloud resource management practices. The default is |
||
|
Select the version of OpenShift to install, for example . The default is the latest version. |
||
|
Specify whether all EC2 instances will use both v1 and v2 endpoints of EC2 Instance Metadata service (IMDS)(optional) or only IMDSv2 (required). |
||
|
If you have more than one set of account roles in your AWS account for your cluster version, a list of installer role ARNs are provided. Select the ARN for the installer role that you want to use with your cluster. The cluster uses the account-wide roles and policies that relate to the selected installer role. |
||
|
Specify an unique identifier that is passed by OpenShift Cluster Manager and the OpenShift installer when an account role is assumed. This option is only required for custom account roles that expect an external ID. |
||
|
Enter a prefix to assign to the cluster-specific Operator IAM roles. The default is the name of the cluster and a 4-digit random string, for example |
||
|
Specify if you want to use a preconfigured OIDC configuration or if you want to create a new OIDC configuration as part of the cluster creation process. |
||
|
Specify a tag that is used on all resources created by Red Hat OpenShift service on AWS in AWS. Tags can help you manage, identify, organize, search for, and filter resources within AWS. Tags are comma separated, for example: "key value, foo bar".
|
||
|
Deploy the cluster to multiple availability zones in the AWS region. The default is |
||
|
Specify the AWS region to deploy the cluster in. This overrides the |
||
|
Create a cluster using AWS PrivateLink. This option provides private connectivity between Virtual Private Clouds (VPCs), AWS services, and your on-premise networks, without exposing your traffic to the public internet. To provide support, Red Hat Site Reliability Engineering (SRE) can connect to the cluster by using AWS PrivateLink Virtual Private Cloud (VPC) endpoints. This option cannot be changed after a cluster is created. The default is |
||
|
Specify the IP address range for machines (cluster nodes), which must encompass all CIDR address ranges for your VPC subnets. Subnets must be contiguous. A minimum IP address range of 128 addresses, using the subnet prefix |
||
|
Specify the IP address range for services. It is recommended, but not required, that the address block is the same between clusters. This will not create IP address conflicts. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is |
||
|
Specify the IP address range for pods. It is recommended, but not required, that the address block is the same between clusters. This will not create IP address conflicts. The range must be large enough to accommodate your workload. The address block must not overlap with any external service accessed from within the cluster. The default is |
||
|
Install a cluster into an existing AWS VPC. To use this option, your VPC must have 2 subnets for each availability zone that you are installing the cluster into. The default is |
||
|
Specify the availability zones that are used when installing into an existing AWS VPC. Use a comma-separated list to provide the availability zones. If you specify |
||
|
Enable this option to use a specific AWS Key Management service (KMS) key as the encryption key for persistent data. This key functions as the encryption key for control plane, infrastructure, and worker node root volumes. The key is also configured on the default storage class to ensure that persistent volumes created with the default storage class will be encrypted with the specific KMS key. When disabled, the account KMS key for the specified region is used by default to ensure persistent data is always encrypted. The default is |
||
|
Select a compute node instance type. The default is |
||
|
Enable compute node autoscaling. The autoscaler adjusts the size of the cluster to meet your deployment demands. The default is |
||
|
Select the additional custom security group IDs that are used with the standard machine pool created along side the cluster. The default is none selected. Only security groups associated with the selected VPC are displayed. You can select a maximum of 5 additional security groups. |
||
|
Select the additional custom security group IDs that are used with the infra nodes created along side the cluster. The default is none selected. Only security groups associated with the selected VPC are displayed. You can select a maximum of 5 additional security groups. |
||
|
Select the additional custom security group IDs that are used with the control plane nodes created along side the cluster. The default is none selected. Only security groups associated with the selected VPC are displayed. You can select a maximum of 5 additional security groups. |
||
|
Specify the number of compute nodes to provision into each availability zone. Clusters deployed in a single availability zone require at least 2 nodes. Clusters deployed in multiple zones must have at least 3 nodes. The maximum number of worker nodes is 180 nodes. The default value is |
||
|
Specify the labels for the default machine pool. The label format should be a comma-separated list of key-value pairs. This list will overwrite any modifications made to node labels on an ongoing basis. |
||
|
Specify the subnet prefix length assigned to pods scheduled to individual machines. The host prefix determines the pod IP address pool for each machine. For example, if the host prefix is set to |
||
|
Specify the size of the machine pool root disk. This value must include a unit suffix like GiB or TiB, for example the default value of |
||
|
Enable or disable FIPS mode. The default is
|
||
|
In Red Hat OpenShift service on AWS, the control plane storage is encrypted at rest by default and this includes encryption of the etcd volumes. You can additionally enable the
|
||
|
Disable monitoring for user-defined projects. Monitoring for user-defined projects is enabled by default. |
||
|
Specify the route selector for your ingress. The format should be a comma-separated list of key-value pairs. If you do not specify a label, all routes will be exposed on both routers. For legacy ingress support, these labels are inclusion labels; otherwise, they are treated as exclusion labels. |
||
|
Specify the excluded namespaces for your ingress. The format should be a comma-separated list |
||
|
Choose the wildcard policy for your ingress. The options are |
||
|
Choose the namespace ownership policy for your ingress. The options are |
For more information about using custom ARN paths for the OCM role, user role, and account-wide roles, see ARN path customization for IAM roles and policies.
For a list of the supported maximums, see ROSA tested cluster maximums.
For detailed steps to quickly create a ROSA cluster with STS, including the AWS IAM resources, see Creating a ROSA cluster with STS using the default options.
For detailed steps to create a ROSA cluster with STS using customizations, including the AWS IAM resources, see Creating a ROSA cluster with STS using customizations.
For more information about etcd encryption, see the etcd encryption service definition.
For an example VPC architecture, see this sample VPC architecture.