Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Create a config file named user-auth-config.yaml, containing credential information, in the following format:

To retrieve User OCID value, see https://docs.oracle.com/en-us/iaas/Content/API/Concepts/apisigningkey.htm#five.

Info
Code Block
auth:
  region: <region from terraform output>
  user: <user_ocid configured in terraform.tfvars>
  fingerprint: <fingerprint configured in terraform.tfvars>
  tenancy: <tenancy_ocid from terraform output>

...

Code Block
apiVersion: "ingress.oraclecloud.com/v1beta1"
kind: IngressClassParameters
metadata:
  name: native-ic-params
  namespace: uepe
spec:
  compartmentId: "<ocid of compartment><compartment_ocid from terraform output>"
  subnetId: "<loadbalancer_subnet_ocid from terraform output>"
  loadBalancerName: "native-ic-lb-<your cluster name><cluster_name from terraform output>"
  isPrivate: false
  maxBandwidthMbps: 400
  minBandwidthMbps: 100

...

  1. Create a Kubernetes secret containing the Oracle Cloud Infrastructure user authentication details for that the ExternalDNS can use when connecting to the Oracle Cloud Infrastructure API for inserting and updating DNS records in the DNS zone. Create a credentials file named oci.yaml with the following content:

    Code Block
    languagebash
    auth:
      region: <region from terraform output>
      tenancy: <tenancy_ocid from terraform output>
      user: <user_ocid configured in terraform.tfvars>
      key: |
        -----BEGIN RSA PRIVATE KEY-----
       <private-key>
        -----END RSA PRIVATE KEY-----
      fingerprint: <fingerprint> <fingerprint configured in terraform.tfvars>
      # Omit if there is not a password for the key
      passphrase: <passphrase>
    compartment: <compartment-ocid>_ocid from terraform output>
  2. Create a Kubernetes secret named external-dns-config from the credentials file you just created by running the following command:

...