Skip to content

Commit f3a6e8a

Browse files
committed
Updated Note
Signed-off-by: Yi Cai <yicai@redhat.com>
1 parent 48e2542 commit f3a6e8a

File tree

1 file changed

+12
-11
lines changed

1 file changed

+12
-11
lines changed

docs/Integrate GitOps with Secrets Management.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -262,13 +262,24 @@ oc adm policy add-scc-to-user privileged -z csi-secrets-store-provider-aws -n op
262262
- "secretsmanager:GetSecretValue"
263263
- "secretsmanager:DescribeSecret"
264264
effect: Allow
265-
resource: "arn:aws:secretsmanager:<secret_region>:<your_IAM_account>:secret:<your-secret-xxxxxx>" // Secret ARN
265+
resource: "arn:aws:secretsmanager:<aws_region>:<your_IAM_account>:secret:<your-secret-xxxxxx>" // Secret ARN
266266
secretRef:
267267
name: aws-creds
268268
namespace: dev
269269
serviceAccountNames:
270270
- default
271271
```
272+
**NOTE**
273+
274+
The <aws_region> of Secret ARN has to match the cluster region. If it doesn't match, you could create a replication of your secret in the region where your cluster is on. Run the below command to find your cluster region.
275+
```
276+
oc get infrastructure cluster -o jsonpath='{.status.platformStatus.aws.region}'
277+
```
278+
*Example output*
279+
```
280+
us-east-2
281+
```
282+
272283
c. Retrieve the OIDC provider by running the following command:
273284
```
274285
oc get --raw=/.well-known/openid-configuration | jq -r '.issuer'
@@ -289,16 +300,6 @@ oc adm policy add-scc-to-user privileged -z csi-secrets-store-provider-aws -n op
289300
2023/05/15 18:10:34 Saved credentials configuration to: credrequests-ccoctl-output/manifests/dev-aws-creds-credentials.yaml
290301
2023/05/15 18:10:35 Updated Role policy for Role gitops-role-dev-aws-creds
291302
```
292-
**NOTE**
293-
294-
When create the IAM role, the <aws_region> has to match the cluster region. Run the below command to find your cluster region.
295-
```
296-
oc get infrastructure cluster -o jsonpath='{.status.platformStatus.aws.region}'
297-
```
298-
*Example output*
299-
```
300-
us-east-2
301-
```
302303
303304
e. Bind the service account with the role ARN by running the following command:
304305
```

0 commit comments

Comments
 (0)