You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,7 @@ Sub-modules included in this module:
34
34
35
35
- account-iam-resource: Handles the provisioning of Identity and Access Management (IAM) resources required for managing access and permissions in the AWS account associated with the ROSA HCP cluster.
36
36
- idp: Responsible for configuring Identity Providers (IDPs) within the ROSA HCP cluster, faciliting seamless integration with external authentication system such as Github (GH), GitLab, Google, HTPasswd, LDAP and OpenID Connect (OIDC).
37
+
- image-mirrors: Manages the configuration of image digest mirror sets for ROSA HCP clusters, enabling container image mirroring to redirect image pulls from source registries to mirror registries for zero-egress networking and improved performance.
37
38
- machine-pool: Facilitates the management of machine pools within the ROSA HCP cluster, enabling users to scale resources and adjust specifications based on workload demands.
38
39
- oidc-config-and-provider: Manages the configuration of OpenID Connect (OIDC) hosted files and providers for ROSA HCP clusters, enabling secure authentication and access control mechanisms for operator roles.
39
40
- operator-roles: Oversees the management of roles assigned to operators within the ROSA HCP cluster, enabling to perform required actions with appropriate permissions on the lifecyle of a cluster.
@@ -80,6 +81,7 @@ We recommend you install the following CLI tools:
@@ -131,6 +133,7 @@ We recommend you install the following CLI tools:
131
133
| <aname="input_https_proxy"></a> [https\_proxy](#input\_https\_proxy)| A proxy URL to use for creating HTTPS connections outside the cluster. |`string`|`null`| no |
132
134
| <aname="input_identity_providers"></a> [identity\_providers](#input\_identity\_providers)| Provides a generic approach to add multiple identity providers after the creation of the cluster. This variable allows users to specify configurations for multiple identity providers in a flexible and customizable manner, facilitating the management of resources post-cluster deployment. For additional details regarding the variables utilized, refer to the [idp sub-module](./modules/idp). For non-primitive variables (such as maps, lists, and objects), supply the JSON-encoded string. |`map(any)`|`{}`| no |
133
135
| <aname="input_ignore_machine_pools_deletion_error"></a> [ignore\_machine\_pools\_deletion\_error](#input\_ignore\_machine\_pools\_deletion\_error)| Ignore machine pool deletion error. Assists when cluster resource is managed within the same file for the destroy use case |`bool`|`false`| no |
136
+
| <aname="input_image_mirrors"></a> [image\_mirrors](#input\_image\_mirrors)| Provides a generic approach to add multiple image mirrors after the creation of the cluster. This variable allows users to specify configurations for multiple image mirrors in a flexible and customizable manner, facilitating the management of resources post-cluster deployment. For additional details regarding the variables utilized, refer to the [image-mirrors sub-module](./modules/image-mirrors). For non-primitive variables (such as maps, lists, and objects), supply the JSON-encoded string. |`map(any)`|`{}`| no |
134
137
| <aname="input_kms_key_arn"></a> [kms\_key\_arn](#input\_kms\_key\_arn)| The key ARN is the Amazon Resource Name (ARN) of a CMK. It is a unique, fully qualified identifier for the CMK. A key ARN includes the AWS account, Region, and the key ID. |`string`|`null`| no |
135
138
| <aname="input_kubelet_configs"></a> [kubelet\_configs](#input\_kubelet\_configs)| Provides a generic approach to add multiple kubelet configs after the creation of the cluster. This variable allows users to specify configurations for multiple kubelet configs in a flexible and customizable manner, facilitating the management of resources post-cluster deployment. For additional details regarding the variables utilized, refer to the [idp sub-module](./modules/kubelet-configs). For non-primitive variables (such as maps, lists, and objects), supply the JSON-encoded string. |`map(any)`|`{}`| no |
136
139
| <aname="input_machine_cidr"></a> [machine\_cidr](#input\_machine\_cidr)| Block of IP addresses used by OpenShift while installing the cluster, for example "10.0.0.0/16". |`string`|`null`| no |
@@ -168,6 +171,7 @@ We recommend you install the following CLI tools:
168
171
| <aname="output_cluster_domain"></a> [cluster\_domain](#output\_cluster\_domain)| The DNS domain of cluster. |
169
172
| <aname="output_cluster_id"></a> [cluster\_id](#output\_cluster\_id)| Unique identifier of the cluster. |
170
173
| <aname="output_cluster_state"></a> [cluster\_state](#output\_cluster\_state)| The state of the cluster. |
174
+
| <aname="output_image_mirror_ids"></a> [image\_mirror\_ids](#output\_image\_mirror\_ids)| A map of image mirror names to their unique identifiers. |
171
175
| <aname="output_oidc_config_id"></a> [oidc\_config\_id](#output\_oidc\_config\_id)| The unique identifier associated with users authenticated through OpenID Connect (OIDC) generated by this OIDC config. |
172
176
| <aname="output_oidc_endpoint_url"></a> [oidc\_endpoint\_url](#output\_oidc\_endpoint\_url)| Registered OIDC configuration issuer URL, generated by this OIDC config. |
173
177
| <aname="output_operator_role_prefix"></a> [operator\_role\_prefix](#output\_operator\_role\_prefix)| Prefix used for generated AWS operator policies. |
Copy file name to clipboardExpand all lines: examples/rosa-hcp-public-with-multiple-machinepools-and-idps/README.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,7 @@ This example includes:
9
9
- All AWS resources (IAM and networking) that are created as part of the ROSA cluster module execution
10
10
- "Day 2" Machine pool resources - created as part of the root module execution - map of multiple resources is provided.
11
11
- "Day 2" Identity provider resource - created as part of the root module execution - map of multiple resources is provided.
12
+
- "Day 2" Image mirror resources - created as part of the root module execution - map of multiple resources is provided.
12
13
13
14
Note: This example involves the creation of various identity providers using placeholder values for illustrative purposes. These providers will not grant access to the cluster with the exception of the HTPasswd identity provider. You must supply your own pre-configured values for authentic identity providers.
This Terraform sub-module manages the image mirrors for ROSA HCP clusters. It enables you to efficiently configure image digest mirror sets after cluster deployment. With this module, you can easily set up container image mirroring to redirect image pulls from source registries to mirror registries, enabling zero-egress networking and improved performance.
0 commit comments