You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**`<name>` is the user-defined name for all created GCP resources used for tracking.
281
-
**`<gcp_region>` is the GCP region in which cloud resources will be created.
282
-
**`<gcp_project_id>` is the GCP project ID in which cloud resources will be created.
283
-
**`<path_to_directory_with_list_of_credentials_requests>/credrequests` is the directory containing the files of `CredentialsRequest` manifests to create GCP service accounts.
284
-
--
276
+
<1> Specify the user-defined name for all created GCP resources used for tracking.
277
+
<2> Specify the GCP region in which cloud resources will be created.
278
+
<3> Specify the GCP project ID in which cloud resources will be created.
279
+
<4> Specify the directory containing the files of `CredentialsRequest` manifests to create GCP service accounts.
**`<name>` is the name used to tag any cloud resources that are created for tracking.
310
-
**`<alibaba_region>` is the Alibaba Cloud region in which cloud resources will be created.
311
-
**`<path_to_directory_with_list_of_credentials_requests>/credrequests` is the directory containing the files for the component `CredentialsRequest` objects.
312
-
**`<path_to_ccoctl_output_dir>` is the directory where the generated component credentials secrets will be placed.
313
-
--
300
+
<1> Specify the name used to tag any cloud resources that are created for tracking.
301
+
<2> Specify the Alibaba Cloud region in which cloud resources will be created.
302
+
<3> Specify the directory containing the files for the component `CredentialsRequest` objects.
303
+
<4> Specify the directory where the generated component credentials secrets will be placed.
314
304
+
315
305
[NOTE]
316
306
====
@@ -332,9 +322,8 @@ If your cluster uses Technology Preview features that are enabled by the `TechPr
332
322
+
333
323
[NOTE]
334
324
====
335
-
A RAM user can have up to two AccessKeys at the same time. If you run `ccoctl alibabacloud create-ram-users` more than twice, the previous generated manifests secret becomes stale and you must reapply the newly generated secrets.
325
+
A RAM user can have up to two AccessKeys at the same time. If you run `ccoctl alibabacloud create-ram-users` more than twice, the previously generated manifests secret becomes stale and you must reapply the newly generated secrets.
336
326
====
337
-
// Above output was in AWS area but I believe belongs here.
338
327
339
328
.. Verify that the {product-title} secrets are created:
Copy file name to clipboardExpand all lines: modules/cco-ccoctl-upgrading.adoc
+95-21Lines changed: 95 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,6 @@ The process for upgrading an {product-title} cluster that was configured using t
11
11
12
12
[NOTE]
13
13
====
14
-
By default, `ccoctl` creates objects in the directory in which the commands are run. To create the objects in a different directory, use the `--output-dir` flag. This procedure uses `<path_to_ccoctl_output_dir>` to refer to this directory.
15
-
16
14
On AWS clusters, some `ccoctl` commands make AWS API calls to create or modify AWS resources. You can use the `--dry-run` flag to avoid making API calls. Using this flag creates JSON files on the local file system instead. You can review and modify the JSON files and then apply them with the AWS CLI tool using the `--cli-input-json` parameters.
17
15
====
18
16
@@ -28,18 +26,14 @@ On AWS clusters, some `ccoctl` commands make AWS API calls to create or modify A
* `<provider_type>` is the value for your cloud provider. Valid values are `alibabacloud`, `aws`, `gcp`, `ibmcloud`, and `nutanix`.
41
-
* `credrequests` is the directory where the list of `CredentialsRequest` objects is stored. This command creates the directory if it does not exist.
42
-
--
35
+
<1> Specify the value for your cloud provider. Valid values are `alibabacloud`, `aws`, `azure`, `gcp`, `ibmcloud`, and `nutanix`.
36
+
<2> Specify the directory where the list of `CredentialsRequest` objects is stored. This command creates the directory if it does not exist.
43
37
44
38
. For each `CredentialsRequest` CR in the release image, ensure that a namespace that matches the text in the `spec.secretRef.namespace` field exists in the cluster. This field is where the generated secrets that hold the credentials configuration are stored.
. Use the `ccoctl` tool to process all `CredentialsRequest` objects in the `credrequests` directory by running the command for your cloud provider. The following commands process `CredentialsRequest` objects:
<1> Specify the name used to tag any cloud resources that are created for tracking.
88
+
<2> Specify the Alibaba Cloud region in which cloud resources will be created.
89
+
<3> Specify the directory containing the files for the component `CredentialsRequest` objects.
90
+
<4> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
91
+
92
+
[NOTE]
93
+
=====
94
+
A RAM user can have up to two AccessKeys at the same time. If you run `ccoctl alibabacloud create-ram-users` more than twice, the previously generated manifests secret becomes stale and you must reapply the newly generated secrets.
<1> To create the AWS resources individually, use the "Creating AWS resources individually" procedure in the "Installing a cluster on AWS with customizations" content. This option might be useful if you need to review the JSON files that the `ccoctl` tool creates before modifying AWS resources, or if the process the `ccoctl` tool uses to create AWS resources automatically does not meet the requirements of your organization.
111
+
<2> Specify the name used to tag any cloud resources that are created for tracking.
112
+
<3> Specify the AWS region in which cloud resources will be created.
113
+
<4> Specify the directory containing the files for the component `CredentialsRequest` objects.
114
+
<5> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
115
+
<6> Optional: By default, the `ccoctl` utility stores the OpenID Connect (OIDC) configuration files in a public S3 bucket and uses the S3 URL as the public OIDC endpoint. To store the OIDC configuration in a private S3 bucket that is accessed by the IAM identity provider through a public CloudFront distribution URL instead, use the `--create-private-s3-bucket` parameter.
116
+
====
89
117
+
90
-
[IMPORTANT]
118
+
.Google Cloud Platform (GCP)
119
+
[%collapsible]
91
120
====
92
-
Refer to the `ccoctl` utility instructions in the installation content for your cloud provider for important platform-specific details about the required arguments and special considerations.
<1> Specify the user-defined name for all created GCP resources used for tracking.
131
+
<2> Specify the GCP region in which cloud resources will be created.
132
+
<3> Specify the GCP project ID in which cloud resources will be created.
133
+
<4> Specify the directory containing the files of `CredentialsRequest` manifests to create GCP service accounts.
134
+
<5> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
<1> Specify the directory containing the files for the component `CredentialsRequest` objects.
149
+
<2> Specify the name of the {product-title} cluster.
150
+
<3> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
151
+
<4> Optional: Specify the name of the resource group used for scoping the access policies.
<1> Specify the path to the directory that contains the files for the component `CredentialsRequests` objects.
165
+
<2> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
166
+
<3> Optional: Specify the directory that contains the credentials data YAML file. By default, `ccoctl` expects this file to be in `<home_directory>/.nutanix/credentials`.
93
167
====
94
168
+
95
169
For each `CredentialsRequest` object, `ccoctl` creates the required provider resources and a permissions policy as defined in each `CredentialsRequest` object from the {product-title} release image.
Copy file name to clipboardExpand all lines: modules/cco-determine-mode-cli.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,14 +50,14 @@ The following output values are possible, though not all are supported on all pl
50
50
+
51
51
[IMPORTANT]
52
52
====
53
-
To determine the specific configuration of an AWSor GCP cluster that has a `spec.credentialsMode` of `''`, `Mint`, or `Manual`, you must investigate further.
53
+
To determine the specific configuration of an AWS, GCP, or global Microsoft Azure cluster that has a `spec.credentialsMode` of `''`, `Mint`, or `Manual`, you must investigate further.
54
54
55
55
AWS and GCP clusters support using mint mode with the root secret deleted.
56
56
ifdef::update[]
57
57
If the cluster is specifically configured to use mint mode or uses mint mode by default, you must determine if the root secret is present on the cluster before updating.
58
58
endif::update[]
59
59
60
-
An AWSor GCP cluster that uses manual mode might be configured to create and manage cloud credentials from outside of the cluster using the AWS Security Token Service (STS) or GCP Workload Identity. You can determine whether your cluster uses this strategy by examining the cluster `Authentication` object.
60
+
An AWS, GCP, or global Microsoft Azure cluster that uses manual mode might be configured to create and manage cloud credentials from outside of the cluster with AWS STS, GCP Workload Identity, or Azure AD Workload Identity. You can determine whether your cluster uses this strategy by examining the cluster `Authentication` object.
61
61
====
62
62
63
63
ifdef::about-cco[]
@@ -95,7 +95,7 @@ where `<secret_name>` is `aws-creds` for AWS or `gcp-credentials` for GCP.
95
95
+
96
96
If the root secret is present, the output of this command returns information about the secret. An error indicates that the root secret is not present on the cluster.
97
97
98
-
. AWSor GCP clusters that use manual mode only: To determine whether the cluster is configured to create and manage cloud credentials from outside of the cluster, run the following command:
98
+
. AWS, GCP, or global Microsoft Azure clusters that use manual mode only: To determine whether the cluster is configured to create and manage cloud credentials from outside of the cluster, run the following command:
Copy file name to clipboardExpand all lines: modules/cco-determine-mode-gui.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,14 +49,14 @@ Only Amazon Web Services (AWS), global Microsoft Azure, and Google Cloud Platfor
49
49
+
50
50
[IMPORTANT]
51
51
====
52
-
To determine the specific configuration of an AWSor GCP cluster that has a `spec.credentialsMode` of `''`, `Mint`, or `Manual`, you must investigate further.
52
+
To determine the specific configuration of an AWS, GCP, or global Microsoft Azure cluster that has a `spec.credentialsMode` of `''`, `Mint`, or `Manual`, you must investigate further.
53
53
54
54
AWS and GCP clusters support using mint mode with the root secret deleted.
55
55
ifdef::update[]
56
56
If the cluster is specifically configured to use mint mode or uses mint mode by default, you must determine if the root secret is present on the cluster before updating.
57
57
endif::update[]
58
58
59
-
An AWSor GCP cluster that uses manual mode might be configured to create and manage cloud credentials from outside of the cluster using the AWS Security Token Service (STS) or GCP Workload Identity. You can determine whether your cluster uses this strategy by examining the cluster `Authentication` object.
59
+
An AWS, GCP, or global Microsoft Azure cluster that uses manual mode might be configured to create and manage cloud credentials from outside of the cluster with AWS STS, GCP Workload Identity, or Azure AD Workload Identity. You can determine whether your cluster uses this strategy by examining the cluster `Authentication` object.
60
60
====
61
61
62
62
ifdef::about-cco[]
@@ -117,7 +117,7 @@ Ensure that the *Project* dropdown is set to *All Projects*.
117
117
* If you do not see these values, your cluster is using the CCO in mint mode with the root secret removed.
118
118
--
119
119
120
-
. AWSor GCP clusters that use manual mode only: To determine whether the cluster is configured to create and manage cloud credentials from outside of the cluster, you must check the cluster `Authentication` object YAML values.
120
+
. AWS, GCP, or global Microsoft Azure clusters that use manual mode only: To determine whether the cluster is configured to create and manage cloud credentials from outside of the cluster, you must check the cluster `Authentication` object YAML values.
121
121
122
122
.. Navigate to *Administration* -> *Cluster Settings*.
<1> Specify the path to the directory that contains the files for the component `CredentialsRequests` objects.
94
-
<2> Specify the directory that contains the files of the component credentials secrets, under the `manifests` directory. By default, the `ccoctl` tool creates objects in the directory in which the commands are run. To create the objects in a different directory, use the `--output-dir` flag.
95
-
<3> Optional: Specify the directory that contains the credentials data YAML file. By default, `ccoctl` expects this file to be in `<home_directory>/.nutanix/credentials`. To specify a different directory, use the `--credentials-source-filepath` flag.
94
+
<2> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
95
+
<3> Optional: Specify the directory that contains the credentials data YAML file. By default, `ccoctl` expects this file to be in `<home_directory>/.nutanix/credentials`.
96
96
97
97
. Edit the `install-config.yaml` configuration file so that the `credentialsMode` parameter is set to `Manual`.
<1> Specify the directory containing the files for the component `CredentialsRequest` objects.
163
+
<2> Specify the name of the {product-title} cluster.
164
+
<3> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
165
+
<4> Optional: Specify the name of the resource group used for scoping the access policies.
0 commit comments