@@ -67,20 +67,21 @@ DIGITALOCEAN_TOKEN
67
67
68
68
## Infrastructure
69
69
70
- First the GKE and EKS cluster will be created, along with secrets to be used for
71
- OIDC authentication for each cluster. The Amazon Terraform module has dependant
72
- resources on the Google module, so the Google module must be created first.
70
+ First the clusters will be created, along with secrets to be used for OIDC
71
+ authentication for each cluster. The Amazon and Digitalocean Terraform module
72
+ has dependant resources on the Google module, so the Google module must be
73
+ created first.
73
74
74
75
```
75
76
CLOUD=google make terraform_apply
76
77
CLOUD=amazon make terraform_apply
77
78
CLOUD=digitalocean make terraform_apply
78
79
```
79
80
80
- This will create a Kubernetes cluster in EKS and GKE, a Service
81
- Account to manage Google Cloud DNS records for DNS challenges and OIDC secrets
82
- for all clusters. It should generate a JSON configuration file for all clusters
83
- in ` ./manifests/[google|amazon|digitalocean]-config.json ` respectively.
81
+ This will create cluster themselves and a Service Account to manage Google
82
+ Cloud DNS records for DNS challenges and OIDC secrets for all clusters. It
83
+ should generate a JSON configuration file for each cluster in
84
+ ` ./manifests/[google|amazon|digitalocean]-config.json ` respectively.
84
85
85
86
## Configuration
86
87
@@ -224,6 +225,6 @@ $ kubectl get svc -n auth
224
225
```
225
226
226
227
When components have their TLS secrets, you will then be able to login to the
227
- Gangway portal on EKS and download your Kubeconfig. Again, when trying this
228
- Kubeconfig, you will initially be greeted with an "unauthorized" error message
229
- until RBAC permissions have been granted to this user.
228
+ Gangway portal on Amazon/DigitalOcean and download your Kubeconfig. Again, when
229
+ trying this Kubeconfig, you will initially be greeted with an "unauthorized"
230
+ error message until RBAC permissions have been granted to this user.
0 commit comments