From 8d3903d4476084743084e19001405a9122525b26 Mon Sep 17 00:00:00 2001 From: David Martin Date: Mon, 8 Jul 2024 15:04:05 +0100 Subject: [PATCH] Update guide to allow for different prereq cluster setup (#742) --- doc/user-guides/secure-protect-connect.md | 56 +++++++++++++++++++++-- 1 file changed, 52 insertions(+), 4 deletions(-) diff --git a/doc/user-guides/secure-protect-connect.md b/doc/user-guides/secure-protect-connect.md index 18edc5787..5f2909799 100644 --- a/doc/user-guides/secure-protect-connect.md +++ b/doc/user-guides/secure-protect-connect.md @@ -36,7 +36,8 @@ Here are the steps we will go through: You will need to set the `KUBECTL_CONTEXT` environment variable for the kubectl context of the cluster you are targeting. If you have followed the single cluster setup, it should be something like below. -Adjust the name of the cluster accordingly if you have followed the multi cluster setup. +Adjust the name of the cluster accordingly to match the kubernetes cluster you are targeting. +You can get the current context with `kubectl config current-context` ```sh # Typical single cluster context @@ -95,8 +96,6 @@ This is because currently there is not a TLS secret in place. Let's fix that by ### ❸ Define the TLSPolicy -> **Note:** For convenience, in the setup, we have created a self-signed CA as a cluster issuer in the Kubernetes cluster. - ```sh kubectl --context $KUBECTL_CONTEXT apply -f - < **Note:** You may have to create a cluster issuer in the Kubernetes cluster, depending on if one was created during your initial cluster setup or not. Here is an example of how to create a self-signed CA as a cluster issuer. + +```sh +kubectl --context $KUBECTL_CONTEXT apply -f - < **Note:** You may need to create a ManagedZone resource depending on if one was created during your initial cluster setup or not. You should have a `aws-credentials` Secret already created in the `kuadrant-system` namespace as well. However, if either of these don't exist, you can follow these commands to create them: + +```sh +export AWS_ACCESS_KEY_ID=xxxxxxx # Key ID from AWS with Route 53 access +export AWS_SECRET_ACCESS_KEY=xxxxxxx # Access key from AWS with Route 53 access + +kubectl -n kuadrant-system create secret generic aws-credentials \ + --type=kuadrant.io/aws \ + --from-literal=AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \ + --from-literal=AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY +``` + +```sh +export AWS_DNS_PUBLIC_ZONE_ID=xxxxxx # DNS Zone ID in AWS Route 53 + +kubectl apply -f - <