1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 21:46:22 +01:00
Files
openshift-docs/cli_reference/rosa_cli/rosa-manage-objects-cli.adoc
2025-09-17 00:56:10 +00:00

48 lines
2.6 KiB
Plaintext

:_mod-docs-content-type: ASSEMBLY
include::_attributes/attributes-openshift-dedicated.adoc[]
[id="rosa-managing-objects-cli"]
= Managing objects with the ROSA CLI
:context: rosa-managing-objects-cli
toc::[]
Managing objects with the {rosa-cli-first}, such as adding `dedicated-admin` users, managing clusters, and scheduling cluster upgrades.
[NOTE]
====
To access a cluster that is accessible only over an HTTP proxy server, you can set the `HTTP_PROXY`, `HTTPS_PROXY`, and `NO_PROXY` variables. These environment variables are respected by the `rosa` CLI so that all communication with the cluster goes through the HTTP proxy.
====
include::modules/rosa-common-commands.adoc[leveloffset=+1]
include::modules/rosa-parent-commands.adoc[leveloffset=+1]
include::modules/rosa-create-objects.adoc[leveloffset=+1]
ifdef::openshift-rosa[]
[role="_additional-resources"]
== Additional resources
* See xref:../../rosa_architecture/rosa_policy_service_definition/rosa-service-definition.adoc#rosa-sdpolicy-aws-instance-types_rosa-service-definition[AWS Instance types] for a list of supported instance types.
* See xref:../../rosa_architecture/rosa-sts-about-iam-resources.adoc#rosa-sts-account-wide-roles-and-policies_rosa-sts-about-iam-resources[Account-wide IAM role and policy reference] for a list of IAM roles needed for cluster creation.
* See xref:../../rosa_install_access_delete_clusters/rosa-sts-creating-a-cluster-with-customizations.adoc#rosa-sts-understanding-aws-account-association_rosa-sts-creating-a-cluster-with-customizations[Understanding AWS account association] for more information about the OCM role and user role.
* See xref:../../rosa_install_access_delete_clusters/rosa_getting_started_iam/rosa-aws-prereqs.adoc#rosa-security-groups_prerequisites[Additional custom security groups] for information about security group requirements.
endif::openshift-rosa[]
include::modules/rosa-edit-objects.adoc[leveloffset=+1]
[role="_additional-resources_1"]
== Additional resources
ifdef::openshift-rosa[]
* See xref:../../networking/networking_operators/ingress-operator.adoc#configuring-ingress-controller[Configuring the Ingress Controller] for information regarding editing non-default application routers.
endif::openshift-rosa[]
//Classic to HCP breakout. Remove ROSA-specific conditionals when networking is added to HCP.
include::modules/rosa-delete-objects.adoc[leveloffset=+1]
include::modules/rosa-install-uninstall-addon.adoc[leveloffset=+1]
include::modules/rosa-list-objects.adoc[leveloffset=+1]
ifdef::openshift-rosa-hcp[]
include::modules/rosa-revoke-objects.adoc[leveloffset=+1]
endif::openshift-rosa-hcp[]
include::modules/rosa-upgrade-cluster-cli.adoc[leveloffset=+1]