You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Download the CRD and controller manifests and define a few patches to use with the controller via Kustomize (note that the config files are all ending up in a sub-directory called gke and that we leave that at the end of these commands).
The above patch, managed-certificate-controller-secrets.yml, sets up so a volume will be mounted to access the secret file, and an environment variable has been defined that points to the file (as was shown is possible by @bmhatfieldhere). If you don't really know much about Kustomize, you can just edit the controller manifest manually. Here's the full manifest w/ the patch applied if this is confusing to you.
The next block of commands will take care of the following:
Create a new service account that can be used for the controller.
Create a custom role that will be assigned to that service account.
Assign the required permissions (referred to as compute-rw by @krzykwashere and enumerated by @bmhatfieldhere) to the custom role.
Export the keys for the service account so they can later be added as a Kubernetes secret.
Now wait for your load balancer to be created & assigned an external IP address. At that point, you can update your DNS records to point to that IP & wait for the SSL cert to become active.
If you want to tear this down so you don't get billed:
kubectl delete service hello-world # allows the load balancer to be deleted
gcloud container clusters delete ssl-test
Note that this does not delete the service account/role/keys that were created. Feel free to do that if you wish.
I managed to get this working today after reviewing this issue and various other issues on this repository. Here's what I had to do:
A few variables that you'll need to customize that will be used throughout:
Download the CRD and controller manifests and define a few patches to use with the controller via Kustomize (note that the config files are all ending up in a sub-directory called
gke
and that we leave that at the end of these commands).The above patch,
managed-certificate-controller-secrets.yml
, sets up so a volume will be mounted to access the secret file, and an environment variable has been defined that points to the file (as was shown is possible by @bmhatfield here). If you don't really know much about Kustomize, you can just edit the controller manifest manually. Here's the full manifest w/ the patch applied if this is confusing to you.The next block of commands will take care of the following:
Create the container and get the
kubectl
context all set up as normal:Now start sending things off to your cluster via
kubectl
:cluster-admin
role to the executing user as explained here.kustomize
.Ingress
w/ the SSL annotations.Now wait for your load balancer to be created & assigned an external IP address. At that point, you can update your DNS records to point to that IP & wait for the SSL cert to become active.
If you want to tear this down so you don't get billed:
kubectl delete service hello-world # allows the load balancer to be deleted gcloud container clusters delete ssl-test
Note that this does not delete the service account/role/keys that were created. Feel free to do that if you wish.
Originally posted by @wbyoung in #9 (comment)
The text was updated successfully, but these errors were encountered: