You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
. Use the `ccoctl` tool to process all `CredentialsRequest` objects by running the command for your cloud provider. The following commands process `CredentialsRequest` objects:
<1> To create the AWS resources individually, use the "Creating AWS resources individually" procedure in the "Installing a cluster on AWS with customizations" content. This option might be useful if you need to review the JSON files that the `ccoctl` tool creates before modifying AWS resources, or if the process the `ccoctl` tool uses to create AWS resources automatically does not meet the requirements of your organization.
40
58
<2> Specify the name used to tag any cloud resources that are created for tracking.
41
59
<3> Specify the AWS region in which cloud resources will be created.
42
60
<4> Specify the directory containing the files for the component `CredentialsRequest` objects.
43
-
<5> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
44
-
<6> Optional: By default, the `ccoctl` utility stores the OpenID Connect (OIDC) configuration files in a public S3 bucket and uses the S3 URL as the public OIDC endpoint. To store the OIDC configuration in a private S3 bucket that is accessed by the IAM identity provider through a public CloudFront distribution URL instead, use the `--create-private-s3-bucket` parameter.
61
+
<5> Specify the path to the output directory.
62
+
<6> Specify the path to the `serviceaccount-signer.public` file that you extracted from the cluster.
63
+
<7> Optional: By default, the `ccoctl` utility stores the OpenID Connect (OIDC) configuration files in a public S3 bucket and uses the S3 URL as the public OIDC endpoint. To store the OIDC configuration in a private S3 bucket that is accessed by the IAM identity provider through a public CloudFront distribution URL instead, use the `--create-private-s3-bucket` parameter.
<1> Specify the user-defined name for all created {gcp-short} resources used for tracking.
60
80
<2> Specify the {gcp-short} region in which cloud resources will be created.
61
81
<3> Specify the {gcp-short} project ID in which cloud resources will be created.
62
82
<4> Specify the directory containing the files of `CredentialsRequest` manifests to create {gcp-short} service accounts.
63
-
<5> Optional: Specify the directory in which you want the `ccoctl` utility to create objects. By default, the utility creates objects in the directory in which the commands are run.
83
+
<5> Specify the path to the output directory.
84
+
<6> Specify the path to the `serviceaccount-signer.public` file that you extracted from the cluster.
<1> The value of the `name` parameter is used to create an Azure resource group.
99
120
To use an existing Azure resource group instead of creating a new one, specify the `--oidc-resource-group-name` argument with the existing group name as its value.
100
-
<2> Specify the region of the existing cluster.
101
-
<3> Specify the subscription ID of the existing cluster.
102
-
<4> Specify the OIDC issuer URL from the existing cluster.
121
+
<2> Specify the path to the output directory.
122
+
<3> Specify the region of the existing cluster.
123
+
<4> Specify the subscription ID of the existing cluster.
124
+
<5> Specify the directory containing the files for the component `CredentialsRequest` objects.
125
+
<6> Specify the OIDC issuer URL from the existing cluster.
103
126
You can obtain this value by running the following command:
104
127
+
105
128
[source,terminal]
@@ -108,8 +131,8 @@ $ oc get authentication cluster \
108
131
-o jsonpath \
109
132
--template='{ .spec.serviceAccountIssuer }'
110
133
----
111
-
<5> Specify the name of the resource group that contains the DNS zone.
112
-
<6> Specify the {azure-short} resource group name.
134
+
<7> Specify the name of the resource group that contains the DNS zone.
135
+
<8> Specify the {azure-short} resource group name.
113
136
You can obtain this value by running the following command:
0 commit comments