You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By default, `ccoctl` creates objects in the directory in which the commands are run. To specify a directory, use the `--output-dir` flag. This procedure uses `<path_to_ccoctl_output_dir>` to refer to this location.
46
+
By default, `ccoctl` creates objects in the directory in which the commands are run. To create the objects in a different directory, use the `--output-dir` flag. This procedure uses `<path_to_ccoctl_output_dir>` to refer to this directory.
**`<name>` is the name used to tag any cloud resources that are created for tracking.
98
111
**`<aws_region>` is the AWS region in which cloud resources will be created.
99
112
**`<path_to_directory_with_list_of_credentials_requests>/credrequests` is the directory containing the files for the component `CredentialsRequest` objects.
113
+
--
114
+
+
115
+
[NOTE]
116
+
====
117
+
If your cluster uses Technology Preview features that are enabled by the `TechPreviewNoUpgrade` feature set, you must include the `--enable-tech-preview` parameter.
**`<name>` is the user-defined name for all created GCP resources used for tracking.
110
134
**`<gcp_region>` is the GCP region in which cloud resources will be created.
111
135
**`<gcp_project_id>` is the GCP project ID in which cloud resources will be created.
112
136
**`<path_to_directory_with_list_of_credentials_requests>/credrequests` is the directory containing the files of `CredentialsRequest` manifests to create GCP service accounts.
137
+
--
138
+
+
139
+
[NOTE]
140
+
====
141
+
If your cluster uses Technology Preview features that are enabled by the `TechPreviewNoUpgrade` feature set, you must include the `--enable-tech-preview` parameter.
**`<name>` is the name used to tag any cloud resources that are created for tracking.
128
163
**`<alibaba_region>` is the Alibaba Cloud region in which cloud resources will be created.
129
164
**`<path_to_directory_with_list_of_credentials_requests>/credrequests` is the directory containing the files for the component `CredentialsRequest` objects.
130
165
**`<path_to_ccoctl_output_dir>` is the directory where the generated component credentials secrets will be placed.
166
+
--
167
+
+
168
+
[NOTE]
169
+
====
170
+
If your cluster uses Technology Preview features that are enabled by the `TechPreviewNoUpgrade` feature set, you must include the `--enable-tech-preview` parameter.
Copy file name to clipboardExpand all lines: modules/cco-ccoctl-creating-individually.adoc
+44-31Lines changed: 44 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ Otherwise, you can use the `ccoctl aws create-all` command to create the AWS res
14
14
15
15
[NOTE]
16
16
====
17
-
By default, `ccoctl` creates objects in the directory in which the commands are run. To specify a directory, use the `--output-dir` flag. This procedure uses `_<path_to_ccoctl_output_dir>_` to refer to this location.
17
+
By default, `ccoctl` creates objects in the directory in which the commands are run. To create the objects in a different directory, use the `--output-dir` flag. This procedure uses `<path_to_ccoctl_output_dir>` to refer to this directory.
18
18
19
-
Some `ccoctl` commands make AWS API calls to create or modify AWS resources. To place JSON files on the local file system instead, use the `--dry-run` flag. These JSON files can be reviewed or modified and then applied with the AWS CLI tool using the `--cli-input-json` parameters.
19
+
Some `ccoctl` commands make AWS API calls to create or modify AWS resources. You can use the `--dry-run` flag to avoid making API calls. Using this flag creates JSON files on the local file system instead. You can review and modify the JSON files and then apply them with the AWS CLI tool using the `--cli-input-json` parameters.
20
20
====
21
21
22
22
.Prerequisites
@@ -34,89 +34,102 @@ $ ccoctl aws create-key-pair
34
34
+
35
35
.Example output:
36
36
+
37
-
[source,terminal,subs="+quotes"]
37
+
[source,terminal]
38
38
----
39
39
2021/04/13 11:01:02 Generating RSA keypair
40
-
2021/04/13 11:01:03 Writing private key to /__<path_to_ccoctl_output_dir>__/serviceaccount-signer.private
41
-
2021/04/13 11:01:03 Writing public key to /__<path_to_ccoctl_output_dir>__/serviceaccount-signer.public
40
+
2021/04/13 11:01:03 Writing private key to /<path_to_ccoctl_output_dir>/serviceaccount-signer.private
41
+
2021/04/13 11:01:03 Writing public key to /<path_to_ccoctl_output_dir>/serviceaccount-signer.public
42
42
2021/04/13 11:01:03 Copying signing key for use by installer
43
43
----
44
44
+
45
45
where `serviceaccount-signer.private` and `serviceaccount-signer.public` are the generated key files.
46
46
+
47
-
This command also creates a private key that the cluster requires during installation in `/_<path_to_ccoctl_output_dir>_/tls/bound-service-account-signing-key.key`.
47
+
This command also creates a private key that the cluster requires during installation in `/<path_to_ccoctl_output_dir>/tls/bound-service-account-signing-key.key`.
48
48
49
49
. Create an OpenID Connect identity provider and S3 bucket on AWS:
**`_<name>_` is the name used to tag any cloud resources that are created for tracking.
59
-
**`_<aws-region>_` is the AWS region in which cloud resources will be created.
60
-
**`_<path_to_ccoctl_output_dir>_` is the path to the public key file that the `ccoctl aws create-key-pair` command generated.
61
+
--
62
+
**`<name>` is the name used to tag any cloud resources that are created for tracking.
63
+
**`<aws-region>` is the AWS region in which cloud resources will be created.
64
+
**`<path_to_ccoctl_output_dir>` is the path to the public key file that the `ccoctl aws create-key-pair` command generated.
65
+
--
61
66
+
62
67
.Example output:
63
68
+
64
-
[source,terminal,subs="+quotes"]
69
+
[source,terminal]
65
70
----
66
-
2021/04/13 11:16:09 Bucket __<name>__-oidc created
67
-
2021/04/13 11:16:10 OpenID Connect discovery document in the S3 bucket __<name>__-oidc at .well-known/openid-configuration updated
71
+
2021/04/13 11:16:09 Bucket <name>-oidc created
72
+
2021/04/13 11:16:10 OpenID Connect discovery document in the S3 bucket <name>-oidc at .well-known/openid-configuration updated
68
73
2021/04/13 11:16:10 Reading public key
69
-
2021/04/13 11:16:10 JSON web key set (JWKS) in the S3 bucket __<name>__-oidc at keys.json updated
70
-
2021/04/13 11:16:18 Identity Provider created with ARN: arn:aws:iam::__<aws_account_id>__:oidc-provider/__<name>__-oidc.s3.__<aws_region>__.amazonaws.com
74
+
2021/04/13 11:16:10 JSON web key set (JWKS) in the S3 bucket <name>-oidc at keys.json updated
75
+
2021/04/13 11:16:18 Identity Provider created with ARN: arn:aws:iam::<aws_account_id>:oidc-provider/<name>-oidc.s3.<aws_region>.amazonaws.com
71
76
----
72
77
+
73
78
where `02-openid-configuration` is a discovery document and `03-keys.json` is a JSON web key set file.
74
79
+
75
-
This command also creates a YAML configuration file in `/_<path_to_ccoctl_output_dir>_/manifests/cluster-authentication-02-config.yaml`. This file sets the issuer URL field for the service account tokens that the cluster generates, so that the AWS IAM identity provider trusts the tokens.
80
+
This command also creates a YAML configuration file in `/<path_to_ccoctl_output_dir>/manifests/cluster-authentication-02-config.yaml`. This file sets the issuer URL field for the service account tokens that the cluster generates, so that the AWS IAM identity provider trusts the tokens.
76
81
77
82
. Create IAM roles for each component in the cluster.
78
83
79
84
.. Extract the list of `CredentialsRequest` objects from the {product-title} release image:
For AWS environments that use alternative IAM API endpoints, such as GovCloud, you must also specify your region with the `--region` parameter.
107
+
108
+
If your cluster uses Technology Preview features that are enabled by the `TechPreviewNoUpgrade` feature set, you must include the `--enable-tech-preview` parameter.
96
109
====
97
110
+
98
111
For each `CredentialsRequest` object, `ccoctl` creates an IAM role with a trust policy that is tied to the specified OIDC identity provider, and a permissions policy as defined in each `CredentialsRequest` object from the {product-title} release image.
99
112
100
113
.Verification
101
114
102
-
* To verify that the {product-title} secrets are created, list the files in the `_<path_to_ccoctl_output_dir>_/manifests` directory:
115
+
* To verify that the {product-title} secrets are created, list the files in the `<path_to_ccoctl_output_dir>/manifests` directory:
0 commit comments