Skip to content

Commit 091fa2f

Browse files
Add instructions for creating a service account authentication token (#29)
* Add instructions for adding a service account * Update manifest link * Update README.md
1 parent ad30f60 commit 091fa2f

File tree

2 files changed

+26
-1
lines changed

2 files changed

+26
-1
lines changed

README.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can use the instructions [here.](https://docs.oracle.com/en-us/iaas/Content/
3030
### Deploy the cluster using the Oracle Cloud Resource Manager template
3131
You can easily deploy the cluster using the **Deploy to Oracle Cloud** button below.
3232

33-
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle-quickstart/oci-hpc-oke/releases/download/v24.7.0/oke-rdma-quickstart-v24.7.0.zip)
33+
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle-quickstart/oci-hpc-oke/releases/download/v24.7.1/oke-rdma-quickstart-v24.7.1.zip)
3434

3535
For the image ID, use the ID of the image that you imported in the previous step.
3636

@@ -49,6 +49,23 @@ NAME STATUS ROLES AGE VERSION
4949
10.0.96.82 Ready node 2d23h v1.25.6
5050
```
5151

52+
### Add a Service Account Authentication Token (optional but recommended)
53+
More info [here.](https://docs.oracle.com/en-us/iaas/Content/ContEng/Tasks/contengaddingserviceaccttoken.htm)
54+
55+
```
56+
kubectl -n kube-system create serviceaccount kubeconfig-sa
57+
58+
kubectl create clusterrolebinding add-on-cluster-admin --clusterrole=cluster-admin --serviceaccount=kube-system:kubeconfig-sa
59+
60+
kubectl apply -f https://raw.githubusercontent.com/oracle-quickstart/oci-hpc-oke/main/manifests/oke-kubeconfig-sa-token.yaml
61+
62+
TOKEN=$(kubectl -n kube-system get secret oke-kubeconfig-sa-token -o jsonpath='{.data.token}' | base64 --decode)
63+
64+
kubectl config set-credentials kubeconfig-sa --token=$TOKEN
65+
66+
kubectl config set-context --current --user=kubeconfig-sa
67+
```
68+
5269
### Using the host RDMA network interfaces in manifests
5370
In order to use the RDMA interfaces on the host in your pods, you should have the below sections in your manifests:
5471

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
apiVersion: v1
2+
kind: Secret
3+
metadata:
4+
name: oke-kubeconfig-sa-token
5+
namespace: kube-system
6+
annotations:
7+
kubernetes.io/service-account.name: kubeconfig-sa
8+
type: kubernetes.io/service-account-token

0 commit comments

Comments
 (0)