Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-15609: docs - add AWS CLI commands for STS instructions #97

Merged

Conversation

alebedev87
Copy link
Contributor

@alebedev87 alebedev87 commented Aug 2, 2023

This PR updates the documentation about the manual configuration for STS clusters. The main goal is to provide AWS CLI commands as alternative to ccoctl commands because the latter

  • is not available on some OSes (Mac, Windows)
  • cannot be installed in a convenient way
  • not transparent about the AWS permissions it takes from the user's AWS credentials

Makefile's generate target is updated to generate the missing permission policy for the operator. This permission policy is required by AWS to create a IAM role.

Manual test on ROSA STS cluster:

$ oc get awsloadbalancercontroller cluster -o yaml | yq .spec
credentials:
  name: aws-load-balancer-controller-cluster
ingressClass: alb
subnetTagging: Auto

$ oc -n aws-load-balancer-operator get pods
NAME                                                            READY   STATUS    RESTARTS   AGE
aws-load-balancer-controller-cluster-64697c78bf-chdkn           1/1     Running   0          16m
aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs   2/2     Running   0          166m

$ oc -n aws-load-balancer-operator get pods aws-load-balancer-controller-cluster-64697c78bf-chdkn -o yaml | yq .spec.volumes
- name: aws-credentials
  secret:
    defaultMode: 420
    secretName: aws-load-balancer-controller-cluster
    
$ oc -n aws-load-balancer-operator get pods aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs -o yaml | yq .spec.volumes
- name: aws-credentials
  secret:
    defaultMode: 420
    items:
      - key: credentials
        path: credentials
    secretName: aws-load-balancer-operator
  
$ oc -n aws-load-balancer-operator get secret aws-load-balancer-operator -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-operator
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

$ oc -n aws-load-balancer-operator get secret aws-load-balancer-controller-cluster -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-controller
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

@openshift-ci-robot openshift-ci-robot added jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Aug 2, 2023
@openshift-ci-robot
Copy link

@alebedev87: This pull request references Jira Issue OCPBUGS-15609, which is invalid:

  • expected the bug to target the "4.14.0" version, but no target version was set

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

This PR updates the documentation about the manual configuration for STS clusters. The main goal is to provide AWS CLI commands as alternative to ccoctl commands because the latter

  • is not available on some OSes (Mac, Windows)
  • doesn't provide a convenient way for the installation
  • not transparent about the AWS permissions it takes from the user's AWS credentials

Makefile's generate target is updated to generated the missing permission policy for the operator. This permission policy is required by AWS to create IAM role.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot requested review from Miciah and thejasn August 2, 2023 12:30
@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 2, 2023
@openshift-ci-robot
Copy link

@alebedev87: This pull request references Jira Issue OCPBUGS-15609, which is invalid:

  • expected the bug to target the "4.14.0" version, but no target version was set

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

This PR updates the documentation about the manual configuration for STS clusters. The main goal is to provide AWS CLI commands as alternative to ccoctl commands because the latter

  • is not available on some OSes (Mac, Windows)
  • doesn't provide a convenient way for the installation
  • not transparent about the AWS permissions it takes from the user's AWS credentials

Makefile's generate target is updated to generated the missing permission policy for the operator. This permission policy is required by AWS to create IAM role.

Manual test on ROSA STS cluster:

$ oc get awsloadbalancercontroller cluster -o yaml | yq .spec
credentials:
 name: aws-load-balancer-controller-cluster
ingressClass: alb
subnetTagging: Auto

$ oc -n aws-load-balancer-operator get pods
NAME                                                            READY   STATUS    RESTARTS   AGE
aws-load-balancer-controller-cluster-64697c78bf-chdkn           1/1     Running   0          16m
aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs   2/2     Running   0          166m

$ oc -n aws-load-balancer-operator get pods aws-load-balancer-controller-cluster-64697c78bf-chdkn -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   secretName: aws-load-balancer-controller-cluster
   
$ oc -n aws-load-balancer-operator get pods aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   items:
     - key: credentials
       path: credentials
   secretName: aws-load-balancer-operator
 
$ oc -n aws-load-balancer-operator get secret aws-load-balancer-operator -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-operator
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

$ oc -n aws-load-balancer-operator get secret aws-load-balancer-controller-cluster -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-controller
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@alebedev87
Copy link
Contributor Author

/jira refresh

@openshift-ci-robot
Copy link

@alebedev87: This pull request references Jira Issue OCPBUGS-15609, which is invalid:

  • expected the bug to target the "4.14.0" version, but no target version was set

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@alebedev87
Copy link
Contributor Author

/jira refresh

@openshift-ci-robot
Copy link

@alebedev87: This pull request references Jira Issue OCPBUGS-15609, which is invalid:

  • expected the bug to target the "4.14.0" version, but no target version was set

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@alebedev87
Copy link
Contributor Author

/jira refresh

@openshift-ci-robot openshift-ci-robot added jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. and removed jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Aug 2, 2023
@openshift-ci-robot
Copy link

@alebedev87: This pull request references Jira Issue OCPBUGS-15609, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.14.0) matches configured target version for branch (4.14.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @ShudiLi

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot requested a review from ShudiLi August 2, 2023 12:52
@openshift-ci-robot
Copy link

@alebedev87: This pull request references Jira Issue OCPBUGS-15609, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.14.0) matches configured target version for branch (4.14.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @ShudiLi

In response to this:

This PR updates the documentation about the manual configuration for STS clusters. The main goal is to provide AWS CLI commands as alternative to ccoctl commands because the latter

  • is not available on some OSes (Mac, Windows)
  • doesn't provide a convenient way for the installation
  • not transparent about the AWS permissions it takes from the user's AWS credentials

Makefile's generate target is updated to generate the missing permission policy for the operator. This permission policy is required by AWS to create a IAM role.

Manual test on ROSA STS cluster:

$ oc get awsloadbalancercontroller cluster -o yaml | yq .spec
credentials:
 name: aws-load-balancer-controller-cluster
ingressClass: alb
subnetTagging: Auto

$ oc -n aws-load-balancer-operator get pods
NAME                                                            READY   STATUS    RESTARTS   AGE
aws-load-balancer-controller-cluster-64697c78bf-chdkn           1/1     Running   0          16m
aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs   2/2     Running   0          166m

$ oc -n aws-load-balancer-operator get pods aws-load-balancer-controller-cluster-64697c78bf-chdkn -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   secretName: aws-load-balancer-controller-cluster
   
$ oc -n aws-load-balancer-operator get pods aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   items:
     - key: credentials
       path: credentials
   secretName: aws-load-balancer-operator
 
$ oc -n aws-load-balancer-operator get secret aws-load-balancer-operator -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-operator
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

$ oc -n aws-load-balancer-operator get secret aws-load-balancer-controller-cluster -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-controller
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot
Copy link

@alebedev87: This pull request references Jira Issue OCPBUGS-15609, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.14.0) matches configured target version for branch (4.14.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @ShudiLi

In response to this:

This PR updates the documentation about the manual configuration for STS clusters. The main goal is to provide AWS CLI commands as alternative to ccoctl commands because the latter

  • is not available on some OSes (Mac, Windows)
  • cannot be installed in a convenient way
  • not transparent about the AWS permissions it takes from the user's AWS credentials

Makefile's generate target is updated to generate the missing permission policy for the operator. This permission policy is required by AWS to create a IAM role.

Manual test on ROSA STS cluster:

$ oc get awsloadbalancercontroller cluster -o yaml | yq .spec
credentials:
 name: aws-load-balancer-controller-cluster
ingressClass: alb
subnetTagging: Auto

$ oc -n aws-load-balancer-operator get pods
NAME                                                            READY   STATUS    RESTARTS   AGE
aws-load-balancer-controller-cluster-64697c78bf-chdkn           1/1     Running   0          16m
aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs   2/2     Running   0          166m

$ oc -n aws-load-balancer-operator get pods aws-load-balancer-controller-cluster-64697c78bf-chdkn -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   secretName: aws-load-balancer-controller-cluster
   
$ oc -n aws-load-balancer-operator get pods aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   items:
     - key: credentials
       path: credentials
   secretName: aws-load-balancer-operator
 
$ oc -n aws-load-balancer-operator get secret aws-load-balancer-operator -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-operator
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

$ oc -n aws-load-balancer-operator get secret aws-load-balancer-controller-cluster -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-controller
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@candita
Copy link

candita commented Aug 23, 2023

/assign

docs/install.md Outdated Show resolved Hide resolved
secret needs to be provisioned manually. The **aws-load-balancer-operator** will wait until the required
secret is created and available before spawning the **aws-load-balancer-controller** pod.

#### Pre-Requisites
### Post operator installation
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just add a little intro. Something like this, but tweak to make it correct.

Suggested change
### Post operator installation
### Post operator installation
There are three ways to manually create the required `CredentialsRequest`s. You can use the `ccoctl` binary on ____, but not on MacOS. Use the `ccoctl` binary to to use the `CredentialsRequest` created by the operator, or use a predefined Secret. Use the AWS CLI to create a predefined Secret if you prefer not to use `ccoctl`, or are running the process on MacOS.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

An intro is added.

docs/install.md Outdated Show resolved Hide resolved
docs/install.md Outdated
Comment on lines 68 to 69
In case the provisioning of the credentials secret should not be done by the **cloud-credential-operator**, the secret can to be explicitly referenced in `AWSLoadBalancerController` CR, see [credentials.name field description](./tutorial.md#credentialsname).
The credentials secret needs to reference a role with all the policies needed by the controller. There are multiple options of how to create the credentials secret.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
In case the provisioning of the credentials secret should not be done by the **cloud-credential-operator**, the secret can to be explicitly referenced in `AWSLoadBalancerController` CR, see [credentials.name field description](./tutorial.md#credentialsname).
The credentials secret needs to reference a role with all the policies needed by the controller. There are multiple options of how to create the credentials secret.
In some cases, the provisioning of the credentials secret cannot be done by the **cloud-credential-operator**, e.g. on the MacOS. Instead, the secret can be explicitly referenced in the `AWSLoadBalancerController` CR, see [credentials.name field description](./tutorial.md#credentialsname).
The credentials secret needs to reference a role with all the policies needed by the controller.
There are two options for creating the credentials secret. Use Option 1 with `ccoctl`, or Option 2 with the AWS CLI.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Applied with some edits.

docs/install.md Outdated Show resolved Hide resolved
docs/install.md Outdated Show resolved Hide resolved
docs/install.md Outdated Show resolved Hide resolved

CR_FILE="${1:-operator-credentials-request.yaml}"
POLICY_FILE="${2:-operator-permission-policy.json}"
YQ_BIN="go run github.com/mikefarah/yq/v4"
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does the user already have access to the go binary?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This script is run as a part of make generate rule which is used during the building of the operator binary. So, it's assumed that the user has go toolchain.

@alebedev87 alebedev87 force-pushed the aws-cli-commands-for-sts branch 3 times, most recently from c8e8d19 to 6142b3c Compare August 30, 2023 14:13
@alebedev87
Copy link
Contributor Author

Remove unnecessary diff introduced by a wrong indent in docs/prerequisites.md.

@ShudiLi
Copy link
Member

ShudiLi commented Sep 1, 2023

After created a rosa sts cluster and followed the steps, both the aws lb operator pods and aws lb controller pod are created successfully.

`
1.
sh-3.2# rosa list cluster
ID NAME STATE TOPOLOGY
25vfjt0bu7pb59famhcql5q5a3ibai36 sdli0901 ready Classic (STS)
sh-3.2#
2.
sh-3.2# oc get clusterversion
NAME VERSION AVAILABLE PROGRESSING SINCE STATUS
version 4.13.9 True False 7h52m Cluster version is 4.13.9
sh-3.2#
3.
sh-3.2# oc -n aws-load-balancer-operator get all
NAME READY STATUS RESTARTS AGE
pod/aws-load-balancer-controller-cluster-64df4bfdb5-drkxv 1/1 Running 0 13m
pod/aws-load-balancer-operator-controller-manager-85795d888f-gslh5 2/2 Running 0 48m

NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/aws-load-balancer-controller-cluster ClusterIP 172.30.184.165 9443/TCP,8080/TCP 13m
service/aws-load-balancer-operator-controller-manager-metrics-service ClusterIP 172.30.233.192 8443/TCP 48m
service/aws-load-balancer-operator-controller-manager-service ClusterIP 172.30.140.145 443/TCP 48m
service/aws-load-balancer-operator-webhook-service ClusterIP 172.30.86.202 443/TCP 48m

NAME READY UP-TO-DATE AVAILABLE AGE
deployment.apps/aws-load-balancer-controller-cluster 1/1 1 1 13m
deployment.apps/aws-load-balancer-operator-controller-manager 1/1 1 1 48m

NAME DESIRED CURRENT READY AGE
replicaset.apps/aws-load-balancer-controller-cluster-64df4bfdb5 1 1 1 13m
replicaset.apps/aws-load-balancer-operator-controller-manager-85795d888f 1 1 1 48m
sh-3.2#
`
/lgtm
thanks

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Sep 1, 2023
docs/install.md Outdated Show resolved Hide resolved
docs/install.md Outdated Show resolved Hide resolved
docs/install.md Outdated

#### [Extract and prepare the `ccoctl` binary](https://docs.openshift.com/container-platform/4.11/authentication/managing_cloud_provider_credentials/cco-mode-sts.html#cco-ccoctl-configuring_cco-mode-sts)
The generated credentials secret can either be awaited by the controller pod already or can be configured in the credentials field of the AWSLoadBalancerController prior to creating the controller.
Copy link

@candita candita Sep 6, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's not clear what "awaited by the controller pod already" means here.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rephrased to

The controller pod will wait for the generated credentials secret if AWSLoadBalancerController already exists or it can be configured in the credentials field of AWSLoadBalancerController before its creation.

docs/install.md Outdated
Comment on lines 27 to 28
- Using a pre-defined `CredentialsRequest` from this repository for an `AWSLoadBalancerController` that has not yet been created.
- Employing AWS CLI commands for an `AWSLoadBalancerController` that has not yet been created.
Copy link

@candita candita Sep 6, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure what happened here, but this doesn't match the titles of the three ways you listed below, which are something like:

  1. Use CredentialsRequest created by the operator
  2. Use a Predefined Secret and ccoctl
  3. Use a Predefined Secret and the AWS CLI

Copy link
Contributor Author

@alebedev87 alebedev87 Sep 11, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rephrased to better to match the titles.
My idea was to keep it focused on the functional aspect - creation of the IAM resources. The choice of the concrete client (ccoctl or aws) was supposed to be a technical detail to be described down the document.

docs/prerequisites.md Outdated Show resolved Hide resolved
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Sep 11, 2023
@alebedev87 alebedev87 force-pushed the aws-cli-commands-for-sts branch 2 times, most recently from 61b55fe to 791e160 Compare September 12, 2023 08:13
@alebedev87 alebedev87 force-pushed the aws-cli-commands-for-sts branch from 791e160 to 943c6a6 Compare September 12, 2023 08:17
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 12, 2023

@alebedev87: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@candita
Copy link

candita commented Sep 12, 2023

/lgtm
/approve

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Sep 12, 2023
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Sep 12, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: candita

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Sep 12, 2023
@ahardin-rh
Copy link

/docs-approved

@openshift-merge-robot openshift-merge-robot merged commit bf25e3d into openshift:main Sep 12, 2023
@openshift-ci-robot
Copy link

@alebedev87: Jira Issue OCPBUGS-15609: All pull requests linked via external trackers have merged:

Jira Issue OCPBUGS-15609 has been moved to the MODIFIED state.

In response to this:

This PR updates the documentation about the manual configuration for STS clusters. The main goal is to provide AWS CLI commands as alternative to ccoctl commands because the latter

  • is not available on some OSes (Mac, Windows)
  • cannot be installed in a convenient way
  • not transparent about the AWS permissions it takes from the user's AWS credentials

Makefile's generate target is updated to generate the missing permission policy for the operator. This permission policy is required by AWS to create a IAM role.

Manual test on ROSA STS cluster:

$ oc get awsloadbalancercontroller cluster -o yaml | yq .spec
credentials:
 name: aws-load-balancer-controller-cluster
ingressClass: alb
subnetTagging: Auto

$ oc -n aws-load-balancer-operator get pods
NAME                                                            READY   STATUS    RESTARTS   AGE
aws-load-balancer-controller-cluster-64697c78bf-chdkn           1/1     Running   0          16m
aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs   2/2     Running   0          166m

$ oc -n aws-load-balancer-operator get pods aws-load-balancer-controller-cluster-64697c78bf-chdkn -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   secretName: aws-load-balancer-controller-cluster
   
$ oc -n aws-load-balancer-operator get pods aws-load-balancer-operator-controller-manager-c67f6b5cf-gvxgs -o yaml | yq .spec.volumes
- name: aws-credentials
 secret:
   defaultMode: 420
   items:
     - key: credentials
       path: credentials
   secretName: aws-load-balancer-operator
 
$ oc -n aws-load-balancer-operator get secret aws-load-balancer-operator -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-operator
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

$ oc -n aws-load-balancer-operator get secret aws-load-balancer-controller-cluster -o yaml | yq .data.credentials | base64 -d 
[default]
sts_regional_endpoints = regional
role_arn = arn:aws:iam::269733383066:role/albo-controller
web_identity_token_file = /var/run/secrets/openshift/serviceaccount/token

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

alebedev87 added a commit to alebedev87/aws-load-balancer-operator that referenced this pull request Sep 13, 2023
alebedev87 added a commit to alebedev87/aws-load-balancer-operator that referenced this pull request Sep 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants