Skip to content

Commit b1d6aa1

Browse files
committed
Fix command for helm
1 parent 9d977c9 commit b1d6aa1

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

docs/content/docs/tutorials/pca-example.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Creating a Certificate Authority (CA) Hierarchy with the AWS Private CA ACK Controller"
33
lead: "Use the AWS Private CA ACK Controller to create a CA Hierarchy with a Root and Subordinate CA"
44
draft: false
5-
menu:
5+
menu:
66
docs:
77
parent: "tutorials"
88
weight: 40
@@ -13,11 +13,11 @@ The CA hierarchy will consist of a root CA that signs the certificate of a subor
1313

1414
## Setup
1515

16-
Although it is not necessary to use Amazon Elastic Kubernetes Service (Amazon EKS) with ACK, this guide assumes that you have access to an Amazon EKS cluster.
16+
Although it is not necessary to use Amazon Elastic Kubernetes Service (Amazon EKS) with ACK, this guide assumes that you have access to an Amazon EKS cluster.
1717

18-
For automated cluster creation using `eksctl`, see [Getting started with Amazon EKS - `eksctl`](https://docs.aws.amazon.com/eks/latest/userguide/getting-started-eksctl.html).
18+
For automated cluster creation using `eksctl`, see [Getting started with Amazon EKS - `eksctl`](https://docs.aws.amazon.com/eks/latest/userguide/getting-started-eksctl.html).
1919

20-
## Prerequisites
20+
## Prerequisites
2121

2222
This guide assumes that you have:
2323
- Created an EKS cluster with Kubernetes version 1.16 or higher
@@ -39,23 +39,23 @@ export REGION=us-east-1
3939
### 2. Install the latest version of the AWS Private Certificate Authority ACK controller into the EKS cluster
4040

4141
```
42-
export RELEASE_VERSION=$(curl -sL https://api.github.com/repos/aws- controllers-k8s/acmpca-controller/releases/latest | jq -r '.tag_name | ltrimstr("v")')
42+
export RELEASE_VERSION=$(curl -sL https://api.github.com/repos/aws- controllers-k8s/acmpca-controller/releases/latest | jq -r '.tag_name | ltrimstr("v")')
4343
44-
aws ecr-public get-login-password --region us-east-1 | helm registry login -- username AWS --password-stdin public.ecr.aws
44+
aws ecr-public get-login-password --region us-east-1 | helm registry login --username AWS --password-stdin public.ecr.aws
4545
46-
helm install --create-namespace -n ack-system ack-acmpca-controller \ oci://public.ecr.aws/aws-controllers-k8s/acmpca-chart -- version=$RELEASE_VERSION --set=aws.region=$REGION
46+
helm install --create-namespace -n ack-system ack-acmpca-controller \ oci://public.ecr.aws/aws-controllers-k8s/acmpca-chart -- version=$RELEASE_VERSION --set=aws.region=$REGION
4747
```
4848

4949
You can verify the installation succeeded by doing the following:
5050

5151
```
52-
kubectl --namespace ack-system get pods -l "app.kubernetes.io/instance=ack-acmpca-controller"
52+
kubectl --namespace ack-system get pods -l "app.kubernetes.io/instance=ack-acmpca-controller"
5353
```
5454

5555
The output from the above command should look like this. The STATUS of Running shows us that the pod has come up successfully:
5656

5757
```
58-
NAME READY STATUS RESTARTS AGE
58+
NAME READY STATUS RESTARTS AGE
5959
ack-acmpca-controller-acmpca-chart-8664d4979b-fcm5h 1/1 Running 0 20h
6060
```
6161

@@ -228,7 +228,7 @@ Explanation of the resources listed in the file above:
228228
- `CertificateAuthorityActivation`: This resource is responsible for taking an AWS Private CA that is in the PENDING_CERTIFICATE state into an ACTIVE state by having you pass in a Certificate Authority as well as the signed CA CSR and the chain of trust for that CA.
229229
- `Certificate`: A certificate issued by the referenced CA with the given CSR.
230230

231-
If you want to have a closer look at the fields that can be passed into the resources, you can find that [here](https://aws-controllers-k8s.github.io/community/reference/) under the `PCA` header.
231+
If you want to have a closer look at the fields that can be passed into the resources, you can find that [here](https://aws-controllers-k8s.github.io/community/reference/) under the `PCA` header.
232232

233233
Run the following command to create the hierarchy:
234234

@@ -306,7 +306,7 @@ Here we see a `Status: ACTIVE` which indicates the successful creation of the su
306306
307307
If the CA Status ends up in a `FAILED` state, there should be messages in the status that should explain why. Remedy this issue and retry creating the CA hierarchy. First you should run `kubectl delete -f certificate_hierarchy.yaml` to clean up what you have done thus far. Afterwards return to step 4 and reattempt creating the CA hierarchy.
308308

309-
## Importing an Existing CA into ACK
309+
## Importing an Existing CA into ACK
310310

311311
If you already have an existing activated CA that you want to now manage via the ACK controller, you can do the following.
312312

@@ -319,7 +319,7 @@ apiVersion: services.k8s.aws/v1alpha1
319319
kind: AdoptedResource
320320
metadata:
321321
name: adopted-ca
322-
spec:
322+
spec:
323323
aws:
324324
arn: arn:aws:acm-pca:us-east-1:111111111111:certificate-authority/9f0d73ed-be9c-49bb-a8bf-009bee09fdc8
325325
kubernetes:

0 commit comments

Comments
 (0)