diff --git a/installing/installing_aws/installing-restricted-networks-aws.adoc b/installing/installing_aws/installing-restricted-networks-aws.adoc index 7d2b3d4cba..8995f3efcf 100644 --- a/installing/installing_aws/installing-restricted-networks-aws.adoc +++ b/installing/installing_aws/installing-restricted-networks-aws.adoc @@ -98,8 +98,13 @@ include::modules/installation-configure-proxy.adoc[leveloffset=+2] //include::modules/installation-three-node-cluster.adoc[leveloffset=+2] +// Creating the Kubernetes manifest and Ignition config files include::modules/installation-user-infra-generate-k8s-manifest-ignition.adoc[leveloffset=+2] +[role="_additional-resources"] +.Additional resources +* xref:../../installing/installing_aws/installing-restricted-networks-aws-installer-provisioned.adoc#manually-create-iam_installing-restricted-networks-aws-installer-provisioned[Manually creating long-term credentials] + include::modules/installation-extracting-infraid.adoc[leveloffset=+1] include::modules/installation-creating-aws-vpc.adoc[leveloffset=+1] diff --git a/installing/installing_azure_stack_hub/installing-azure-stack-hub-user-infra.adoc b/installing/installing_azure_stack_hub/installing-azure-stack-hub-user-infra.adoc index 0eb73fca0e..3141ac26b1 100644 --- a/installing/installing_azure_stack_hub/installing-azure-stack-hub-user-infra.adoc +++ b/installing/installing_azure_stack_hub/installing-azure-stack-hub-user-infra.adoc @@ -77,7 +77,14 @@ include::modules/installation-azure-stack-hub-config-yaml.adoc[leveloffset=+2] include::modules/installation-configure-proxy.adoc[leveloffset=+2] include::modules/installation-user-infra-exporting-common-variables-arm-templates.adoc[leveloffset=+2] + +// Creating the Kubernetes manifest and Ignition config files include::modules/installation-user-infra-generate-k8s-manifest-ignition.adoc[leveloffset=+2] + +[role="_additional-resources"] +.Additional resources +* xref:../../installing/installing_azure/manually-creating-iam-azure.adoc#manually-create-iam_manually-creating-iam-azure[Manually creating long-term credentials] + include::modules/installation-disk-partitioning-upi-templates.adoc[leveloffset=+2] include::modules/installation-azure-create-resource-group-and-identity.adoc[leveloffset=+1] diff --git a/modules/installation-user-infra-generate-k8s-manifest-ignition.adoc b/modules/installation-user-infra-generate-k8s-manifest-ignition.adoc index f9c47f4371..a136b1b0cc 100644 --- a/modules/installation-user-infra-generate-k8s-manifest-ignition.adoc +++ b/modules/installation-user-infra-generate-k8s-manifest-ignition.adoc @@ -179,9 +179,9 @@ ifndef::user-infra-vpc[] the Kubernetes manifest files that define the worker machines: endif::user-infra-vpc[] endif::gcp[] -ifdef::aws,azure,ash,user-infra-vpc[] +ifdef::azure,ash,user-infra-vpc[] . Remove the Kubernetes manifest files that define the worker machines: -endif::aws,azure,ash,user-infra-vpc[] +endif::azure,ash,user-infra-vpc[] ifdef::aws,azure,ash,gcp[] + [source,terminal] @@ -310,7 +310,6 @@ status: domain: '' selector: '' ---- - endif::user-infra-vpc[] ifdef::ash[] @@ -414,7 +413,22 @@ stringData: azure_resourcegroup: ${resource_group} azure_region: ${azure_region} ---- +endif::ash[] +ifdef::aws,ash[] +. Optional: If you manually created a cloud identity and access management (IAM) role, locate any `CredentialsRequest` objects with the `TechPreviewNoUpgrade` annotation in the release image by running the following command: ++ +[source,terminal] +---- +$ oc adm release extract quay.io/openshift-release-dev/ocp-release:4.y.z-x86_64 --credentials-requests --cloud= +---- ++ +.Example output +[source,terminal] +---- +0000_30_capi-operator_00_credentials-request.yaml: release.openshift.io/feature-set: TechPreviewNoUpgrade +---- ++ [IMPORTANT] ==== The release image includes `CredentialsRequest` objects for Technology Preview features that are enabled by the `TechPreviewNoUpgrade` feature set. You can identify these objects by their use of the `release.openshift.io/feature-set: TechPreviewNoUpgrade` annotation. @@ -423,22 +437,13 @@ The release image includes `CredentialsRequest` objects for Technology Preview f * If you are using any of these features, you must create secrets for the corresponding objects. ==== - -*** To find `CredentialsRequest` objects with the `TechPreviewNoUpgrade` annotation, run the following command: -+ -[source,terminal] ----- -$ grep "release.openshift.io/feature-set" * ----- -+ -.Example output -[source,terminal] ----- -0000_30_capi-operator_00_credentials-request.yaml: release.openshift.io/feature-set: TechPreviewNoUpgrade ----- // Right now, only the CAPI Operator is an issue, but it might make sense to update `0000_30_capi-operator_00_credentials-request.yaml` to `.yaml` for the future. ++ +.. Delete all `CredentialsRequest` objects that have the `TechPreviewNoUpgrade` annotation. +endif::aws,ash[] -.. Create a `cco-configmap.yaml` file in the manifests directory with the Cloud Credential Operator (CCO) disabled: +ifdef::ash[] +. Create a `cco-configmap.yaml` file in the manifests directory with the Cloud Credential Operator (CCO) disabled: + .Sample `ConfigMap` object [source,yaml]