$ openshift-install create manifests --dir=mycluster
The Cloud Credential Operator can be put into manual mode prior to installation
in environments where the cloud identity and access management (IAM) APIs are
not reachable, or the administrator prefers not to store an administrator-level
credential secret in the cluster kube-system
namespace.
Run the OpenShift Container Platform installer to generate manifests:
$ openshift-install create manifests --dir=mycluster
Insert a config map into the manifests directory so that the Cloud Credential Operator is placed in manual mode:
$ cat <<EOF > mycluster/manifests/cco-configmap.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: cloud-credential-operator-config
namespace: openshift-cloud-credential-operator
annotations:
release.openshift.io/create-only: "true"
data:
disabled: "true"
EOF
Remove the admin
credential secret created using your local cloud credentials.
This removal prevents your admin
credential from being stored in the cluster:
$ rm mycluster/openshift/99_cloud-creds-secret.yaml
Obtain the OpenShift Container Platform release image your openshift-install
binary is built
to use:
$ bin/openshift-install version
release image quay.io/openshift-release-dev/ocp-release:4.z.z-x86_64
Locate all CredentialsRequest
objects in this release image that target the cloud you
are deploying on:
$ oc adm release extract quay.io/openshift-release-dev/ocp-release:4.z.z-x86_64 --to ./release-image
Locate the CredentialsRequests
in the extracted file:
$ grep -l "apiVersion: cloudcredential.openshift.io" * | xargs cat
In a future OpenShift Container Platform release, there will be a new |
This displays the details for each request. Remember to ignore any
CredentialsRequests
where the spec.providerSpec.kind
does not match the cloud
provider you are installing to.
CredentialsRequest
objectapiVersion: cloudcredential.openshift.io/v1
kind: CredentialsRequest
metadata:
labels:
controller-tools.k8s.io: "1.0"
name: openshift-image-registry-gcs
namespace: openshift-cloud-credential-operator
spec:
secretRef:
name: installer-cloud-credentials
namespace: openshift-image-registry
providerSpec:
apiVersion: cloudcredential.openshift.io/v1
kind: GCPProviderSpec
predefinedRoles:
- roles/storage.admin
- roles/iam.serviceAccountUser
skipServiceCheck: true
Create YAML files for secrets in the openshift-install
manifests directory
that you generated previously. The secrets must be stored using the namespace
and secret name defined in each request.spec.secretRef
. The format for the
secret data varies for each cloud provider.
Proceed with cluster creation:
$ openshift-install create cluster --dir=mycluster
Before performing an upgrade, you might need to adjust your credentials if permissions have changed in the next release. In the future, the Cloud Credential Operator might prevent you from upgrading until you have indicated that you have addressed updated permissions. |
Each cloud provider uses a credentials root secret in the kube-system
namespace by convention, which is then used to satisfy all credentials requests
and create their respective secrets. This is done either by minting new
credentials, Mint Mode, or by copying the credentials root secret,
Passthrough Mode.
The format for the secret varies by cloud, and is also used for each
CredentialsRequest
secret.
apiVersion: v1
kind: secret
metadata:
namespace: kube-system
name: gcp-credentials
stringData:
service_account.json: <ServiceAccount>
Mint Mode is supported for AWS, GCP, and Azure.
The default and recommended best practice for running OpenShift Container Platform is to run
the installer with an administrator-level cloud credential. The admin
credential is
stored in the kube-system
namespace, and then used by the Cloud Credential
Operator to process the CredentialsRequest
objects in the cluster and create new users
for each with specific permissions.
The benefits of Mint Mode include:
Each cluster component only has the permissions it requires.
Automatic, on-going reconciliation for cloud credentials including upgrades, which might require additional credentials or permissions.
One drawback is that Mint Mode requires admin
credential storage in a cluster
kube-system
secret.