|
1 | 1 | // Module included in the following assemblies: |
2 | 2 | // |
| 3 | +// * installing/installing_aws/manually-creating-iam.adoc |
| 4 | +// * installing/installing_azure/manually-creating-iam-azure.adoc |
3 | 5 | // * installing/installing_gcp/manually-creating-iam-gcp.adoc |
4 | 6 |
|
| 7 | +ifeval::["{context}" == "manually-creating-iam-aws"] |
| 8 | +:aws: |
| 9 | +endif::[] |
| 10 | +ifeval::["{context}" == "manually-creating-iam-azure"] |
| 11 | +:azure: |
| 12 | +endif::[] |
| 13 | +ifeval::["{context}" == "manually-creating-iam-gcp"] |
| 14 | +:google-cloud-platform: |
| 15 | +endif::[] |
| 16 | + |
5 | 17 | [id="alternatives-to-storing-admin-secrets-in-kube-system.adoc_{context}"] |
6 | | -= Alternatives to storing administrator-level secrets in the `kube-system` project |
| 18 | += Alternatives to storing administrator-level secrets in the kube-system project |
7 | 19 |
|
8 | 20 | The Cloud Credential Operator (CCO) manages cloud provider credentials as Kubernetes custom resource definitions (CRDs). You can configure the CCO to suit the security requirements of your organization by setting different values for the `credentialsMode` parameter in the `install-config.yaml` file. |
9 | 21 |
|
10 | | -If you prefer not to store an administrator-level credential secret in the cluster `kube-system` project, you can choose one of the following options when installing {product-title} on AWS: |
| 22 | +ifdef::aws,google-cloud-platform[] |
| 23 | +If you prefer not to store an administrator-level credential secret in the cluster `kube-system` project, you can choose one of the following options when installing {product-title}: |
| 24 | + |
| 25 | +* *Manage cloud credentials manually*: |
| 26 | ++ |
| 27 | +You can set the `credentialsMode` parameter for the CCO to `Manual` to manage cloud credentials manually. Using manual mode allows each cluster component to have only the permissions it requires, without storing an administrator-level credential in the cluster. You can also use this mode if your environment does not have connectivity to the cloud provider public IAM endpoint. However, you must manually reconcile permissions with new release images for every upgrade. You must also manually supply credentials for every component that requests them. |
| 28 | + |
| 29 | +* *Remove the administrator-level credential secret after installing {product-title} with mint mode*: |
| 30 | ++ |
| 31 | +If you are using the CCO with the `credentialsMode` parameter set to `Mint`, you can remove or rotate the administrator-level credential after installing {product-title}. Mint mode is the default configuration for the CCO. This option requires the presence of the administrator-level credential during an installation. The administrator-level credential is used during the installation to mint other credentials with some permissions granted. The original credential secret is not stored in the cluster permanently. |
| 32 | + |
| 33 | +[NOTE] |
| 34 | +==== |
| 35 | +Prior to a non z-stream upgrade, you must reinstate the credential secret with the administrator-level credential. If the credential is not present, the upgrade might be blocked. |
| 36 | +==== |
| 37 | + |
| 38 | +endif::aws,google-cloud-platform[] |
11 | 39 |
|
12 | | -* *Manage cloud credentials manually*. You can set the `credentialsMode` for the CCO to `Manual` to manage cloud credentials manually. Using manual mode allows each cluster component to have only the permissions it requires, without storing an administrator-level credential in the cluster. You can also use this mode if your environment does not have connectivity to the AWS public IAM endpoint. However, you must manually reconcile permissions with new release images for every upgrade. You must also manually supply credentials for every component that requests them. |
| 40 | +ifdef::azure[] |
| 41 | +If you prefer not to store an administrator-level credential secret in the cluster `kube-system` project, you can set the `credentialsMode` parameter for the CCO to `Manual` when installing {product-title} and manage your cloud credentials manually. |
13 | 42 |
|
14 | | -* *Remove the administrator-level credential secret after installing {product-title} with mint mode*. You can remove or rotate the administrator-level credential after installing {product-title} with the `Mint` CCO credentials mode applied. The `Mint` CCO credentials mode is the default. This option requires the presence of the administrator-level credential during an installation. The administrator-level credential is used during the installation to mint other credentials with some permissions granted. The original credential secret is not stored in the cluster permanently. |
| 43 | +Using manual mode allows each cluster component to have only the permissions it requires, without storing an administrator-level credential in the cluster. You can also use this mode if your environment does not have connectivity to the cloud provider public IAM endpoint. However, you must manually reconcile permissions with new release images for every upgrade. You must also manually supply credentials for every component that requests them. |
| 44 | +endif::azure[] |
0 commit comments