c2sr-testbed-admin-docs 0.0.1 Help

Control Plane Secrets

Create token for Kubernetes Cluster Connection with GitHub Actions

  1. Create a service account

kubectl create serviceaccount c2sr-sa
  1. create a service account token The easiest way to do this is to create a yaml file and apply it in the cluster,

k apply -f sa-token.yaml
  1. Create the cluster Role:

k apply -f clusterrole.yaml
  1. Create Cluster Role binding:

k apply -f clusterrolebinding.yaml
  1. ADD THE SECRET AS K8S_SECRET in github actions:

kubectl get secret c2sr-sa-token -o yaml
  1. add the encoded GH 64 encoded data to kubernetes Cluster:

k apply -f ghcr.yaml
  1. Add the s3 bucket secret yaml:

k apply -f s3-cred.yaml
  1. Add logstash creds

k apply -f logstash-cred.yaml
  1. add mongo creds

k apply -f mongo-cred.yaml
Last modified: 23 February 2025