Control Plane Secrets
Create token for Kubernetes Cluster Connection with GitHub Actions
Create a service account
kubectl create serviceaccount c2sr-sa
create a service account token The easiest way to do this is to create a yaml file and apply it in the cluster,
k apply -f sa-token.yaml
Create the cluster Role:
k apply -f clusterrole.yaml
Create Cluster Role binding:
k apply -f clusterrolebinding.yaml
ADD THE SECRET AS K8S_SECRET in github actions:
kubectl get secret c2sr-sa-token -o yaml
add the encoded GH 64 encoded data to kubernetes Cluster:
k apply -f ghcr.yaml
Add the s3 bucket secret yaml:
k apply -f s3-cred.yaml
Add logstash creds
k apply -f logstash-cred.yaml
add mongo creds
k apply -f mongo-cred.yaml
Last modified: 23 February 2025