Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Create a config file named user-auth-config.yaml, containing credential information, in the following format:

Info

To retrieve User OCID value, see https://docs.oracle.com/en-us/iaas/Content/API/Concepts/apisigningkey.htm#five.

Code Block
auth:
  region: <region-identifier> from terraform output>
  user: <user-ocid>_ocid configured in terraform.tfvars>
  fingerprint: <fingerprint> <fingerprint configured in terraform.tfvars>
  tenancy: <tenancy-ocid>_ocid from terraform output>
  1. Create a Kubernetes secret resource named oci-config in the cluster by running the following command:

...

  1. Create a Kubernetes secret containing the Oracle Cloud Infrastructure user authentication details for that the ExternalDNS can use when connecting to the Oracle Cloud Infrastructure API for inserting and updating DNS records in the DNS zone. Create a credentials file named oci.yaml with the following content:

    Code Block
    languagebash
    auth:
      region: <region-identifier> from terraform output>
      tenancy: <tenancy-ocid>_ocid from terraform output>
      user: <user-ocid>_ocid configured in terraform.tfvars>
      key: |
        -----BEGIN RSA PRIVATE KEY-----
       <private-key>
        -----END RSA PRIVATE KEY-----
      fingerprint: <fingerprint>
      # Omit if there is not a password for the key
      passphrase: <passphrase>
    compartment: <compartment-ocid>
  2. Create a Kubernetes secret named external-dns-config from the credentials file you just created by running the following command:

...