Replace the default service account in docs
Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
This commit is contained in:
@@ -242,9 +242,7 @@ mkdir -p ./clusters/my-cluster/flux-system
|
|||||||
Generate the Flux manifests with:
|
Generate the Flux manifests with:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
# on ARM64/AARCH64 clusters use --arch=arm64
|
|
||||||
flux install --version=latest \
|
flux install --version=latest \
|
||||||
--arch=amd64 \
|
|
||||||
--export > ./clusters/my-cluster/flux-system/gotk-components.yaml
|
--export > ./clusters/my-cluster/flux-system/gotk-components.yaml
|
||||||
```
|
```
|
||||||
|
|
||||||
@@ -388,7 +386,6 @@ Kubernetes manifests that can be used to install or upgrade Flux:
|
|||||||
```hcl
|
```hcl
|
||||||
data "flux_install" "main" {
|
data "flux_install" "main" {
|
||||||
target_path = "clusters/my-cluster"
|
target_path = "clusters/my-cluster"
|
||||||
arch = "amd64"
|
|
||||||
network_policy = false
|
network_policy = false
|
||||||
version = "latest"
|
version = "latest"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -107,8 +107,9 @@ secrets by iterating over all the private keys until it finds one that works.
|
|||||||
### Using various cloud providers
|
### Using various cloud providers
|
||||||
|
|
||||||
When using AWS/GCP KMS, you don't have to include the gpg `secretRef` under
|
When using AWS/GCP KMS, you don't have to include the gpg `secretRef` under
|
||||||
`spec.provider` (you can skip the `--decryption-secret` flag when running `flux create kustomization`), instead you'll have to bind an IAM Role with access to the KMS
|
`spec.provider` (you can skip the `--decryption-secret` flag when running `flux create kustomization`),
|
||||||
keys to the `default` service account of the `flux-system` namespace for
|
instead you'll have to bind an IAM Role with access to the KMS
|
||||||
|
keys to the `kustomize-controller` service account of the `flux-system` namespace for
|
||||||
kustomize-controller to be able to fetch keys from KMS.
|
kustomize-controller to be able to fetch keys from KMS.
|
||||||
|
|
||||||
#### AWS
|
#### AWS
|
||||||
@@ -145,13 +146,12 @@ or with [add-pod-identity](https://github.com/Azure/aad-pod-identity).
|
|||||||
Please ensure that the GKE cluster has Workload Identity enabled.
|
Please ensure that the GKE cluster has Workload Identity enabled.
|
||||||
|
|
||||||
1. Create a service account with the role `Cloud KMS CryptoKey Encrypter/Decrypter`.
|
1. Create a service account with the role `Cloud KMS CryptoKey Encrypter/Decrypter`.
|
||||||
2. Create an IAM policy binding between the GCP service account to the `default` service account of the `flux-system`.
|
2. Create an IAM policy binding between the GCP service account to the `kustomize-controller` service account of the `flux-system`.
|
||||||
3. Annotate the `default` service account in the `flux-system` with the GCP service account.
|
3. Annotate the `kustomize-controller` service account in the `flux-system` with the GCP service account.
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
kubectl annotate serviceaccount \
|
kubectl annotate serviceaccount kustomize-controller \
|
||||||
--namespace flux-system \
|
--namespace flux-system \
|
||||||
default \
|
|
||||||
iam.gke.io/gcp-service-account=<name-of-serviceaccount>@project-id.iam.gserviceaccount.com
|
iam.gke.io/gcp-service-account=<name-of-serviceaccount>@project-id.iam.gserviceaccount.com
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user