...
Create a config file named
user-auth-config.yaml
, containing credential information, in the following format:
Info |
---|
Code Block |
auth: region: <region from terraform output> user: <user_ocid configured in terraform.tfvars> fingerprint: <fingerprint configured in terraform.tfvars> tenancy: <tenancy_ocid from terraform output> |
...
Code Block |
---|
apiVersion: "ingress.oraclecloud.com/v1beta1" kind: IngressClassParameters metadata: name: native-ic-params namespace: uepe spec: compartmentId: "<ocid of compartment><compartment_ocid from terraform output>" subnetId: "<loadbalancer_subnet_ocid from terraform output>" loadBalancerName: "native-ic-lb-<your cluster name><cluster_name from terraform output>" isPrivate: false maxBandwidthMbps: 400 minBandwidthMbps: 100 |
...
Create a Kubernetes secret containing the Oracle Cloud Infrastructure user authentication details for that the ExternalDNS can use when connecting to the Oracle Cloud Infrastructure API for inserting and updating DNS records in the DNS zone. Create a credentials file named
oci.yaml
with the following content:Code Block language bash auth: region: <region from terraform output> tenancy: <tenancy_ocid from terraform output> user: <user_ocid configured in terraform.tfvars> key: | -----BEGIN RSA PRIVATE KEY----- <private-key> -----END RSA PRIVATE KEY----- fingerprint: <fingerprint> <fingerprint configured in terraform.tfvars> # Omit if there is not a password for the key passphrase: <passphrase> compartment: <compartment-ocid>_ocid from terraform output>
Create a Kubernetes secret named
external-dns-config
from the credentials file you just created by running the following command:
...