$ rosa describe cluster -c <my_cluster_name> --debug
本文档介绍了如何排查集群部署错误。
如果集群部署失败,则集群将进入“错误”状态。
运行以下命令以获取更多信息
$ rosa describe cluster -c <my_cluster_name> --debug
osdCcsAdmin
错误创建集群如果集群创建操作失败,您可能会收到以下错误消息。
Failed to create cluster: Unable to create cluster spec: Failed to get access keys for user 'osdCcsAdmin': NoSuchEntity: The user with name osdCcsAdmin cannot be found.
要解决此问题
删除堆栈
$ rosa init --delete
重新初始化您的帐户
$ rosa init
如果您尚未在AWS账户中创建负载均衡器,则弹性负载均衡 (ELB) 的服务关联角色可能尚不存在。您可能会收到以下错误
Error: Error creating network Load Balancer: AccessDenied: User: arn:aws:sts::xxxxxxxxxxxx:assumed-role/ManagedOpenShift-Installer-Role/xxxxxxxxxxxxxxxxxxx is not authorized to perform: iam:CreateServiceLinkedRole on resource: arn:aws:iam::xxxxxxxxxxxx:role/aws-service-role/elasticloadbalancing.amazonaws.com/AWSServiceRoleForElasticLoadBalancing"
要解决此问题,请确保该角色存在于您的AWS账户中。如果不存在,请使用以下命令创建此角色
aws iam get-role --role-name "AWSServiceRoleForElasticLoadBalancing" || aws iam create-service-linked-role --aws-service-name "elasticloadbalancing.amazonaws.com"
此命令每个账户只需执行一次。 |
在特定情况下,如果您尝试删除集群,则会在OpenShift集群管理器中出现以下错误。
Error deleting cluster
CLUSTERS-MGMT-400: Failed to delete cluster <hash>: sts_user_role is not linked to your account. sts_ocm_role is linked to your organization <org number> which requires sts_user_role to be linked to your Red Hat account <account ID>.Please create a user role and link it to the account: User Account <account ID> is not authorized to perform STS cluster operations
Operation ID: b0572d6e-fe54-499b-8c97-46bf6890011c
如果您尝试从CLI删除集群,则会显示以下错误。
E: Failed to delete cluster <hash>: sts_user_role is not linked to your account. sts_ocm_role is linked to your organization <org_number> which requires sts_user_role to be linked to your Red Hat account <account_id>.Please create a user role and link it to the account: User Account <account ID> is not authorized to perform STS cluster operations
当user-role
未链接或已删除时,会发生此错误。
运行以下命令以创建user-role
IAM 资源
$ rosa create user-role
看到角色已创建后,您可以删除集群。以下内容确认该角色已创建并链接
I: Successfully linked role ARN <user role ARN> with account <account ID>