...
Code Block |
---|
auth: region: <region-identifier> from terraform output> user: <user-ocid>_ocid configured in terraform.tfvars> fingerprint: <fingerprint> <fingerprint configured in terraform.tfvars> tenancy: <tenancy-ocid>_ocid from terraform output> |
Create a Kubernetes secret resource named
oci-config
in the cluster by running the following command:
...
Code Block |
---|
apiVersion: "ingress.oraclecloud.com/v1beta1" kind: IngressClassParameters metadata: name: native-ic-params namespace: uepe spec: compartmentId: "<ocid of compartment><compartment_ocid from terraform output>" subnetId: "<loadbalancer_subnet_ocid from terraform output>" loadBalancerName: "native-ic-lb-<your cluster name><cluster_name from terraform output>" isPrivate: false maxBandwidthMbps: 400 minBandwidthMbps: 100 |
...
Create a Kubernetes secret containing the Oracle Cloud Infrastructure user authentication details for that the ExternalDNS can use when connecting to the Oracle Cloud Infrastructure API for inserting and updating DNS records in the DNS zone. Create a credentials file named
oci.yaml
with the following content:Code Block language bash auth: region: <region-identifier> from terraform output> tenancy: <tenancy-ocid>_ocid from terraform output> user: <user-ocid>_ocid configured in terraform.tfvars> key: | -----BEGIN RSA PRIVATE KEY----- <private-key> -----END RSA PRIVATE KEY----- fingerprint: <fingerprint> <fingerprint configured in terraform.tfvars> # Omit if there is not a password for the key passphrase: <passphrase> compartment: <compartment-ocid>_ocid from terraform output>
Create a Kubernetes secret named
external-dns-config
from the credentials file you just created by running the following command:
...