Skip to content

Commit 0533791

Browse files
kianjones9BBBmau
authored andcommitted
Update using_gke_with_terraform.html.markdown (GoogleCloudPlatform#13961)
1 parent 50498da commit 0533791

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

mmv1/third_party/terraform/website/docs/guides/using_gke_with_terraform.html.markdown

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ provider "kubernetes" {
5959
)
6060
}
6161
```
62-
Although the above can result in authentication errors, over time, as the token recorded in the google_client_cofig data resource is short lived (thus it expires) and it's stored in state. Fortunately, the [kubernetes provider can accept valid credentials from an exec-based plugin](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs#exec-plugins) to fetch a new token before each Terraform operation (so long as you have the [gke-cloud-auth-plugin for kubectl installed](https://cloud.google.com/blog/products/containers-kubernetes/kubectl-auth-changes-in-gke)), like so:
62+
Although the above can result in authentication errors, over time, as the token recorded in the google_client_config data resource is short lived (thus it expires) and it's stored in state. Fortunately, the [kubernetes provider can accept valid credentials from an exec-based plugin](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs#exec-plugins) to fetch a new token before each Terraform operation (so long as you have the [gke-cloud-auth-plugin for kubectl installed](https://cloud.google.com/blog/products/containers-kubernetes/kubectl-auth-changes-in-gke)), like so:
6363

6464
```hcl
6565
# Retrieve an access token as the Terraform runner

0 commit comments

Comments
 (0)