You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
. From the directory that contains the installation program, set a `$RELEASE_IMAGE` variable with the release image from your installation file by running the following command:
92
+
. From the directory that includes the installation program, set a `$RELEASE_IMAGE` variable with the release image from your installation file by running the following command:
<1> The `--included` parameter includes only the manifests that your specific cluster configuration requires.
101
-
<2> Specify the location of the `install-config.yaml` file.
102
-
<3> Specify the path to the directory where you want to store the `CredentialsRequest` objects. If the specified directory does not exist, this command creates it.
110
+
* `--included`: Includes only the manifests that your specific cluster configuration requires.
111
+
* `<path_to_directory_with_installation_configuration>`: Specify the location of the `install-config.yaml` file.
112
+
* `<path_to_directory_for_credentials_requests>`: Specify the path to the directory where you want to store the `CredentialsRequest` objects. If the specified directory does not exist, this command creates it.
103
113
+
104
114
This command creates a YAML file for each `CredentialsRequest` object.
105
115
+
@@ -143,22 +153,22 @@ This command creates a YAML file for each `CredentialsRequest` object.
<1> Specify the directory containing the files for the component `CredentialsRequest` objects.
152
-
<2> Specify the name of the {product-title} cluster.
153
-
<3> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
154
-
<4> Optional: Specify the name of the resource group used for scoping the access policies.
* `<path_to_credential_requests_directory>`: Specify the directory containing the files for the `CredentialsRequest` objects.
162
+
* `<cluster_name>`: Specify the name of the {product-title} cluster.
163
+
* `<installation_directory>`: Optional parameter. Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which you run the commands.
164
+
* `<resource_group_name>`: Optional parameter. Specify the name of the resource group used for scoping the access policies.
155
165
+
156
166
--
157
167
[NOTE]
158
168
====
159
-
If your cluster uses Technology Preview features that are enabled by the `TechPreviewNoUpgrade` feature set, you must include the `--enable-tech-preview` parameter.
169
+
If you enabled Technology Preview features by using the `TechPreviewNoUpgrade` feature set for your cluster, you must include the `--enable-tech-preview` parameter in the configuration for the `CredentialsRequest` object.
160
170
161
-
If an incorrect resource group name is provided, the installation fails during the bootstrap phase. To find the correct resource group name, run the following command:
171
+
If you provided a wrong resource group name, the installation fails during the bootstrap phase. To find the correct resource group name, run the following command:
162
172
163
173
ifdef::ibm-vpc[]
164
174
[source,terminal]
@@ -177,7 +187,7 @@ endif::ibm-power-vs[]
177
187
178
188
.Verification
179
189
180
-
* Ensure that the appropriate secrets were generated in your cluster's `manifests` directory.
190
+
* Check that the appropriate secrets exist in the `manifests` directory of your cluster.
= Required {gcp-short} permissions for shared VPC installations
8
8
9
-
When you are installing a cluster to a link:https://cloud.google.com/vpc/docs/shared-vpc[shared VPC], you must configure the service account for both the host project and the service project. If you are not installing to a shared VPC, you can skip this section.
9
+
When you are installing a cluster to a link:https://cloud.google.com/vpc/docs/shared-vpc[shared VPC], you must configure the service account for both the host project and the service project.
10
10
11
-
You must apply the minimum roles required for a standard installation as listed above, to the service project.
11
+
[IMPORTANT]
12
+
====
13
+
You can use granular permissions for a Cloud Credential Operator that operates in either Manual or Mint credentials mode. For more information about the minimum permissions required for a standard installation that is configured with either of these credentials modes, see "Required Google Cloud permissions for installer-provisioned infrastructure".
14
+
15
+
You cannot use granular permissions in Passthrough credentials mode. For more information about the minimum roles required, see "Required Google Cloud roles".
16
+
====
17
+
18
+
If you are not installing to a shared Virtual Private Cloud (VPC), you can skip the procedure.
12
19
13
20
[IMPORTANT]
14
21
====
15
-
You can use granular permissions for a Cloud Credential Operator that operates in either manual or mint credentials mode. You cannot use granular permissions in passthrough credentials mode.
22
+
When installing a cluster on shared Virtual Private Cloud (VPC) infrastructure and you want to manually create credentials, grant the `compute.subnetworks.use` permission on the host project to the credentials that the Machine API Operator uses.
16
23
====
17
24
18
25
Ensure that the host project applies one of the following configurations to the service account:
19
26
20
27
.Required permissions for creating firewalls in the host project
If you do not supply a service account for control plane nodes in the `install-config.yaml` file, please grant the following permissions to the service account in the host project. If you do not supply a service account for compute nodes in the `install-config.yaml` file, please grant the following permissions to the service account in the host project for cluster destruction. If you do supply service accounts for control plane and compute nodes, you do not need to grant the following permissions.
49
+
If you do not supply a service account for control plane nodes in the `install-config.yaml` file, grant the following permissions to the service account in the host project. If you do not supply a service account for compute nodes in the `install-config.yaml` file, grant the following permissions to the service account in the host project for cluster destruction. If you do supply service accounts for control plane and compute nodes, you do not need to grant the following permissions.
43
50
44
-
[%collapsible]
45
-
====
51
+
[source,text]
52
+
----
46
53
* `resourcemanager.projects.getIamPolicy`
47
54
* `resourcemanager.projects.setIamPolicy`
48
-
====
55
+
----
49
56
50
57
The following permissions are required when you select a separate project for the location of the DNS zone or zones. These permissions are also required when the DNS zone or zones are located in a third project.
51
58
52
59
.Required minimal permissions for provisioning DNS resources in a separate project
53
-
====
60
+
[source,text]
61
+
----
54
62
* `dns.changes.create`
55
63
* `dns.changes.get`
56
64
* `dns.managedZones.create`
@@ -61,4 +69,4 @@ The following permissions are required when you select a separate project for th
0 commit comments