@@ -205,18 +205,17 @@ Briefly after creating these objects, the resulting kubeconfig Secrets should ap
205205namespace. For installing the init-agent, we now need to fetch the admin kubecofig (the first one) :
206206
207207` ` ` bash
208- kubectl --namespace my-kcp get secret my-admin-kubeconfig --output json |
209- jq -r '.data.kubeconfig' |
208+ kubectl --namespace my-kcp get secret my-admin-kubeconfig --output jsonpath="{.data.kubeconfig}" |
210209 base64 -d > kcp-admin.kubeconfig
211210` ` `
212211
213212The 2nd kubeconfig Secret can stay in the host cluster, the init-agent will pick it up itself.
214213
215214# ## kcp Access
216215
217- Since in this guide, kind is used to provision the hosting cluster, no real Ingress/Gateway exists
218- for the kcp-front-proxy. Instead, we will be creating port-forwardings to the front-proxy in order
219- to install the init-agent.
216+ Since this guide uses kind to provision the hosting cluster, no real Ingress/Gateway exists for the
217+ kcp-front-proxy. Instead, we will be creating port-forwardings to the front-proxy in order to
218+ install the init-agent.
220219
221220To accomplish this, **either** edit the `kcp-admin.kubeconfig` and replace the hostnames with
222221" localhost" , **or** setup a host alias in your system's `/etc/hosts` file. In this guide, we will
@@ -343,3 +342,5 @@ This completes the installation :-) If you have more workspaces than `:root:my-t
343342
344343You are now ready to create `InitTarget` objects inside the `:root:init-agent` workspace, referring
345344to `WorkspaceTypes` in the `:root:my-types` workspace.
345+
346+ [kcp] : https://kcp.io
0 commit comments