You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Instructions on how to create a Rosa Openshift cluster admin when you create your cluster with the terraform provider.
6
+
---
7
+
8
+
# Creating a cluster admin user for your ROSA cluster
9
+
10
+
You can create a Cluster Admin user for your cluster using Terraform.
11
+
12
+
## Prerequisites
13
+
14
+
1. You created your [account roles using Terraform](../examples/create_rosa_cluster/create_rosa_sts_cluster/classic_sts/account_roles/README.md).
15
+
16
+
## Creating a cluster administrator by using Terraform
17
+
18
+
You must implement the following parameters to create your Cluster Admin role on cluster creation using the htpsswd identity provider.
19
+
20
+
| Parameter | Type | Description |
21
+
|-----------|------|-------------|
22
+
|`admin_credentials`| Attributes | This attribute list defines the user name and password for a cluster admin user. |
23
+
|`password`| Case-sensitive String | Enter the cluster admin's password that will be created with the cluster. NOTE: This field is case sensitive. |
24
+
|`username`| String | Enter your cluster admin's username that will be created with the cluster. |
25
+
26
+
1. Add these parameters to your cluster creation `variables.tf` and `main.tf` files.
27
+
1. Run `terraform apply` to upgrade your cluster.
28
+
29
+
## OpenShift documentation
30
+
31
+
-[Configuring an htpasswd identity provider](https://docs.openshift.com/rosa/rosa_install_access_delete_clusters/rosa-sts-config-identity-providers.html#config-htpasswd-idp_rosa-sts-config-identity-providers)
Copy file name to clipboardExpand all lines: docs/index.md
+4-23Lines changed: 4 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,35 +62,16 @@ This provider is currently under development, and new releases are regularly mad
62
62
63
63
There are two distinct types of releases:
64
64
65
-
* Stable releases: Any release identified by a version number without any preffix, such as 1.2.0. These versions are officially supported by RedHat.
65
+
* Stable releases: Any release identified by a version number without any prefix, such as 1.2.0. These versions are officially supported by RedHat.
66
66
* Pre-release versions: These are beta versions of the provider, identified by a version number with a suffix introduced by a dash, such as 1.2.0-beta. While users can utilize these pre-release versions, it's important to note that doing so comes with the responsibility of the user, as they may not be as stable or fully supported as official releases.
67
67
68
68
## Prerequisites
69
69
70
70
To use the Red Hat Cloud Services provider inside your Terraform configuration you must meet the following:
71
71
72
-
* Completed [the ROSA getting started](https://console.redhat.com/openshift/create/rosa/getstarted) requirements
73
-
74
-
You must complete some AWS account and local configurations to create and managed ROSA clusters.
75
-
76
-
* An offline [OCM token](https://console.redhat.com/openshift/token/rosa)
77
-
78
-
This token is generated through the Red Hat Hybrid Cloud Console. The purpose of this token is to verify that you have access and permission to create and upgrade clusters. This token is unique to your account and should not be shared.
79
-
80
-
*[GoLang version 1.20 or newer](https://go.dev/doc/install)
81
-
82
-
To build components with Terraform, you must have the latest version of Go installed and usable on your system.
83
-
84
-
*[Terraform version 1.4.6 or newer](https://developer.hashicorp.com/terraform/downloads)
85
-
86
-
You need to have Terraform configured for your local system. The Terraform website contains installation options for MacOS, Windows, and Linux.
You need to have created the AWS account-wide roles. The specific account-wide IAM roles and policies provide the STS permissions required for ROSA support, installation, control plane, and compute functionality. This includes account-wide Operator policies.
91
-
92
-
To create the account roles using Terraform, see the [Account Roles Terraform example](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.4.0/examples/create_account_roles/).
93
-
72
+
* You completed [the ROSA getting started](https://console.redhat.com/openshift/create/rosa/getstarted) requirements.
73
+
* You generated an offline [OCM token](https://console.redhat.com/openshift/token/rosa). This token is generated through the Red Hat Hybrid Cloud Console. Do not share this token.
74
+
* You have [Terraform version 1.4.6 or newer](https://developer.hashicorp.com/terraform/downloads) installed.
94
75
* AWS Permissions
95
76
96
77
The following excerpt lists the minimum AWS permissions required to run Terraform.
-`admin_credentials` (Attributes) Admin user credentials (see [below for nested schema](#nestedatt--admin_credentials))
56
+
-`admin_credentials` (Attributes) This attribute list defines the user name and password for a cluster admin user. (see [below for nested schema](#nestedatt--admin_credentials))
0 commit comments