You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: authentication/managing_cloud_provider_credentials/about-cloud-credential-operator.adoc
+1-6Lines changed: 1 addition & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Mint mode is the default and recommended best practice setting for the CCO to us
40
40
41
41
42
42
|Microsoft Azure
43
-
|X ^[1]^
43
+
|
44
44
|X ^[1]^
45
45
|X
46
46
@@ -76,11 +76,6 @@ For platforms on which multiple modes are supported (AWS, Azure, and GCP), when
76
76
77
77
By default, the CCO determines whether the credentials are sufficient for mint mode, which is the preferred mode of operation, and uses those credentials to create appropriate credentials for components in the cluster. If the credentials are not sufficient for mint mode, it determines whether they are sufficient for passthrough mode. If the credentials are not sufficient for passthrough mode, the CCO cannot adequately process `CredentialsRequest` CRs.
78
78
79
-
[NOTE]
80
-
====
81
-
The CCO cannot verify whether Azure credentials are sufficient for passthrough mode. If Azure credentials are insufficient for mint mode, the CCO operates with the assumption that the credentials are sufficient for passthrough mode.
82
-
====
83
-
84
79
If the provided credentials are determined to be insufficient during installation, the installation fails. For AWS, the installer fails early in the process and indicates which required permissions are missing. Other providers might not provide specific information about the cause of the error until errors are encountered.
85
80
86
81
If the credentials are changed after a successful installation and the CCO determines that the new credentials are insufficient, the CCO puts conditions on any new `CredentialsRequest` CRs to indicate that it cannot process them because of the insufficient credentials.
Mint mode is supported for Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
9
+
Mint mode is supported for Amazon Web Services (AWS) and Google Cloud Platform (GCP).
10
10
11
-
Mint mode is the default and recommended best practice setting for the Cloud Credential Operator (CCO) to use on the platforms for which it is supported. In this mode, the CCO uses the provided administrator-level cloud credential to create new credentials for components in the cluster with only the specific permissions that are required.
11
+
Mint mode is the default mode on the platforms for which it is supported. In this mode, the Cloud Credential Operator (CCO) uses the provided administrator-level cloud credential to create new credentials for components in the cluster with only the specific permissions that are required.
12
12
13
13
If the credential is not removed after installation, it is stored and used by the CCO to process `CredentialsRequest` CRs for components in the cluster and create new credentials for each with only the specific permissions that are required. The continuous reconciliation of cloud credentials in mint mode allows actions that require additional credentials or permissions, such as upgrading, to proceed.
14
14
15
-
If the requirement that mint mode stores the administrator-level credential in the cluster `kube-system` namespace does not suit the security requirements of your organization, see _Alternatives to storing administrator-level secrets in the kube-system project_ for xref:../../installing/installing_aws/manually-creating-iam.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-aws[AWS], xref:../../installing/installing_azure/manually-creating-iam-azure.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-azure[Azure], or xref:../../installing/installing_gcp/manually-creating-iam-gcp.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-gcp[GCP].
16
-
17
-
[NOTE]
18
-
====
19
-
xref:../../authentication/managing_cloud_provider_credentials/cco-mode-manual.adoc#cco-mode-manual[Manual mode] is the only supported CCO configuration for Microsoft Azure Stack Hub.
20
-
====
15
+
Mint mode stores the administrator-level credential in the cluster `kube-system` namespace. If this approach does not meet the security requirements of your organization, see _Alternatives to storing administrator-level secrets in the kube-system project_ for xref:../../installing/installing_aws/manually-creating-iam.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-aws[AWS] or xref:../../installing/installing_gcp/manually-creating-iam-gcp.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-gcp[GCP].
21
16
22
17
[id="mint-mode-permissions"]
23
18
== Mint mode permissions requirements
@@ -39,10 +34,6 @@ The credential you provide for mint mode in AWS must have the following permissi
39
34
* `iam:TagUser`
40
35
* `iam:SimulatePrincipalPolicy`
41
36
42
-
[id="mint-mode-permissions-azure"]
43
-
=== Microsoft Azure permissions
44
-
The credential you provide for mint mode in Azure must have a service principal with the permissions specified in xref:../../installing/installing_azure/installing-azure-account.adoc#installation-azure-service-principal_installing-azure-account[Creating a service principal].
45
-
46
37
[id="mint-mode-permissions-gcp"]
47
38
=== Google Cloud Platform (GCP) permissions
48
39
The credential you provide for mint mode in GCP must have the following permissions:
* xref:../../installing/installing_aws/manually-creating-iam.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-aws[Alternatives to storing administrator-level secrets in the kube-system project] for AWS
74
-
* xref:../../installing/installing_azure/manually-creating-iam-azure.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-azure[Alternatives to storing administrator-level secrets in the kube-system project] for Azure
75
65
* xref:../../installing/installing_gcp/manually-creating-iam-gcp.adoc#alternatives-to-storing-admin-secrets-in-kube-system_manually-creating-iam-gcp[Alternatives to storing administrator-level secrets in the kube-system project] for GCP
76
-
* xref:../../installing/installing_azure/installing-azure-account.adoc#installation-azure-service-principal_installing-azure-account[Creating a service principal] in Azure
Each cloud provider uses a credentials root secret in the `kube-system`
19
20
namespace by convention, which is then used to satisfy all credentials requests
20
-
and create their respective secrets. This is done either by minting new
21
-
credentials, with _mint mode_, or by copying the credentials root secret, with
22
-
_passthrough mode_.
21
+
and create their respective secrets.
22
+
ifndef::azure[]
23
+
This is done either by minting new credentials with _mint mode_, or by copying the credentials root secret with _passthrough mode_.
24
+
endif::azure[]
25
+
ifdef::azure[]
26
+
This is done by copying the credentials root secret with _passthrough mode_.
27
+
endif::azure[]
23
28
24
29
The format for the secret varies by cloud, and is also used for each
25
30
`CredentialsRequest` secret.
@@ -63,9 +68,7 @@ stringData:
63
68
azure_region: <Region>
64
69
----
65
70
66
-
On Microsoft Azure, the credentials secret format includes two properties that must
67
-
contain the cluster's infrastructure ID, generated randomly for each cluster
68
-
installation. This value can be found after running create manifests:
71
+
On Microsoft Azure, the credentials secret format includes two properties that must contain the cluster's infrastructure ID, generated randomly for each cluster installation. This value can be found after running create manifests:
Copy file name to clipboardExpand all lines: modules/manually-rotating-cloud-creds.adoc
+6-10Lines changed: 6 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,19 +22,14 @@ You can also use the command line interface to complete all parts of this proced
22
22
23
23
* Your cluster is installed on a platform that supports rotating cloud credentials manually with the CCO mode that you are using:
24
24
25
-
** For mint mode, AWS, Azure, and GCP are supported.
25
+
** For mint mode, AWS and GCP are supported.
26
26
27
27
** For passthrough mode, AWS, Azure, GCP, {rh-openstack-first}, {rh-virtualization-first}, and VMware vSphere are supported.
28
28
29
29
* You have changed the credentials that are used to interface with your cloud provider.
30
30
31
31
* The new credentials have sufficient permissions for the mode CCO is configured to use in your cluster.
32
32
33
-
[NOTE]
34
-
====
35
-
When rotating the credentials for an Azure cluster that is using mint mode, do not delete or replace the service principal that was used during installation. Instead, generate new Azure service principal client secrets and update the {product-title} secrets accordingly.
36
-
====
37
-
38
33
.Procedure
39
34
40
35
. In the *Administrator* perspective of the web console, navigate to *Workloads*->*Secrets*.
@@ -88,7 +83,6 @@ Where `<provider_spec>` is the corresponding value for your cloud provider: `AWS
You do not need to manually delete the credentials from your provider console. Deleting the referenced component secrets will cause the CCO to delete the existing credentials from the platform and create new ones.
111
105
112
-
. To verify that the credentials have changed:
106
+
.Verification
107
+
108
+
To verify that the credentials have changed:
113
109
114
-
.. In the *Administrator* perspective of the web console, navigate to *Workloads* -> *Secrets*.
110
+
. In the *Administrator* perspective of the web console, navigate to *Workloads*->*Secrets*.
115
111
116
-
.. Verify that the contents of the *Value* field or fields are different than the previously recorded information.
112
+
. Verify that the contents of the *Value* field or fields have changed.
117
113
118
114
////
119
115
// Provider-side verification also possible, though cluster-side is cleaner process.
Mint mode is the default and recommended Cloud Credential Operator (CCO) credentials mode for {product-title}. In this mode, the CCO uses the provided administrator-level cloud credential to run the cluster. Mint mode is supported for AWS, GCP, and Azure.
10
+
Mint mode is the default Cloud Credential Operator (CCO) credentials mode for {product-title} on platforms that support it. In this mode, the CCO uses the provided administrator-level cloud credential to run the cluster. Mint mode is supported for AWSand GCP.
11
11
12
12
In mint mode, the `admin` credential is stored in the `kube-system` namespace and then used by the CCO to process the `CredentialsRequest` objects in the cluster and create users for each with specific permissions.
0 commit comments