Skip to content

Commit 0797181

Browse files
External-ccm:Add example config for instance principals based auth (#374)
1 parent d77f487 commit 0797181

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
# Use this config as a template in order to use Instance Principals based aithentication
2+
# (https://docs.us-phoenix-1.oraclecloud.com/Content/Identity/Tasks/callingservicesfrominstances.htm).
3+
# Ensure you have setup the following OCI policies and your kubernetes nodes are running within them
4+
# allow dynamic-group [your dynamic group name] to read instance-family in compartment [your compartment name]
5+
# allow dynamic-group [your dynamic group name] to use virtual-network-family in compartment [your compartment name]
6+
# allow dynamic-group [your dynamic group name] to manage load-balancers in compartment [your compartment name]
7+
useInstancePrincipals: true
8+
9+
# compartment configures Compartment within which the cluster resides.
10+
compartment: ocid1.compartment.oc1..aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
11+
12+
# vcn configures the Virtual Cloud Network (VCN) within which the cluster resides.
13+
vcn: ocid1.vcn.oc1..aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
14+
15+
loadBalancer:
16+
# subnet1 configures one of two subnets to which load balancers will be added.
17+
# OCI load balancers require two subnets to ensure high availability.
18+
subnet1: ocid1.subnet.oc1.phx.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
19+
20+
# subnet2 configures the second of two subnets to which load balancers will be
21+
# added. OCI load balancers require two subnets to ensure high availability.
22+
subnet2: ocid1.subnet.oc1.phx.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
23+
24+
# SecurityListManagementMode configures how security lists are managed by the CCM.
25+
# If you choose to have security lists managed by the CCM, ensure you have setup the following additional OCI policy:
26+
# Allow dynamic-group [your dynamic group name] to manage security-lists in compartment [your compartment name]
27+
#
28+
# "All" (default): Manage all required security list rules for load balancer services.
29+
# "Frontend": Manage only security list rules for ingress to the load
30+
# balancer. Requires that the user has setup a rule that
31+
# allows inbound traffic to the appropriate ports for kube
32+
# proxy health port, node port ranges, and health check port ranges.
33+
# E.g. 10.82.0.0/16 30000-32000.
34+
# "None": Disables all security list management. Requires that the
35+
# user has setup a rule that allows inbound traffic to the
36+
# appropriate ports for kube proxy health port, node port
37+
# ranges, and health check port ranges. E.g. 10.82.0.0/16 30000-32000.
38+
# Additionally requires the user to mange rules to allow
39+
# inbound traffic to load balancers.
40+
securityListManagementMode: All
41+
42+
# Optional specification of which security lists to modify per subnet. This does not apply if security list management is off.
43+
securityLists:
44+
ocid1.subnet.oc1.phx.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa: ocid1.securitylist.oc1.iad.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
45+
ocid1.subnet.oc1.phx.bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb: ocid1.securitylist.oc1.iad.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
46+
47+
# Optional rate limit controls for accessing OCI API
48+
rateLimiter:
49+
rateLimitQPSRead: 20.0
50+
rateLimitBucketRead: 5
51+
rateLimitQPSWrite: 20.0
52+
rateLimitBucketWrite: 5
53+

0 commit comments

Comments
 (0)