You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using passthrough mode, each component has the same permissions used by all other components. If you do not reduce the permissions after installing, all components have the broad permissions that are required to run the installer.
. Click the *Options* menu {kebab} in the same row as the secret and select *Edit Secret*.
@@ -82,8 +86,39 @@ endif::mint[]
82
86
83
87
. Update the text in the *Value* field or fields with the new authentication information for your cloud provider, and then click *Save*.
84
88
89
+
ifndef::mint[]
90
+
. If you are updating the credentials for a vSphere cluster that does not have the vSphere CSI Driver Operator enabled, you must force a rollout of the Kubernetes controller manager to apply the updated credentials.
91
+
+
92
+
[NOTE]
93
+
====
94
+
If the vSphere CSI Driver Operator is enabled, this step is not required.
95
+
====
96
+
+
97
+
To apply the updated vSphere credentials, log in to the {product-title} CLI as a user with the `cluster-admin` role and run the following command:
98
+
+
99
+
[source,terminal]
100
+
----
101
+
$ oc patch kubecontrollermanager cluster \
102
+
-p='{"spec": {"forceRedeploymentReason": "recovery-'"$( date )"'"}}' \
103
+
--type=merge
104
+
----
105
+
+
106
+
While the credentials are rolling out, the status of the Kubernetes Controller Manager Operator reports `Progressing=true`. To view the status, run the following command:
107
+
+
108
+
[source,terminal]
109
+
----
110
+
$ oc get co kube-controller-manager
111
+
----
112
+
endif::mint[]
113
+
114
+
ifdef::post-install[]
85
115
. If the CCO for your cluster is configured to use mint mode, delete each component secret that is referenced by the individual `CredentialsRequest` objects.
116
+
endif::post-install[]
117
+
ifdef::mint[]
118
+
. Delete each component secret that is referenced by the individual `CredentialsRequest` objects.
119
+
endif::mint[]
86
120
121
+
ifndef::passthrough[]
87
122
.. Log in to the {product-title} CLI as a user with the `cluster-admin` role.
88
123
89
124
.. Get the names and namespaces of all referenced component secrets:
@@ -98,15 +133,7 @@ where `<provider_spec>` is the corresponding value for your cloud provider:
You do not need to manually delete the credentials from your provider console. Deleting the referenced component secrets will cause the CCO to delete the existing credentials from the platform and create new ones.
172
+
endif::passthrough[]
145
173
146
174
.Verification
147
175
@@ -201,9 +229,12 @@ Where `<example-iam-username>` is the name of an IAM user on the cloud provider.
201
229
.. For each IAM username, view the details for the user on the cloud provider. The credentials should show that they were created after being rotated on the cluster.
0 commit comments