Using manual mode

    In manual mode, a user manages cloud credentials instead of the Cloud Credential Operator (CCO). To use this mode, you must examine the CRs in the release image for the version of OKD that you are running or installing, create corresponding credentials in the underlying cloud provider, and create Kubernetes Secrets in the correct namespaces to satisfy all CredentialsRequest CRs for the cluster’s cloud provider.

    Using manual mode allows each cluster component to have only the permissions it requires, without storing an administrator-level credential in the cluster. This mode also does not require connectivity to the AWS public IAM endpoint. However, you must manually reconcile permissions with new release images for every upgrade.

    For information about configuring your cloud provider to use manual mode, see the manual credentials management options for your cloud provider:

    An AWS or GCP cluster that uses manual mode might be configured to create and manage cloud credentials from outside of the cluster using the AWS Security Token Service (STS) or GCP Workload Identity. With this configuration, the CCO uses temporary credentials for different components.

    For more information, see or Using manual mode with GCP Workload Identity.

    Before upgrading a cluster with manually maintained credentials, you must create any new credentials for the release image that you are upgrading to. You must also review the required permissions for existing credentials and accommodate any new permissions requirements in the new release for those components.

    Procedure

    1. Update the manually maintained credentials on your cluster:

      • Create new secrets for any CredentialsRequest custom resources that are added by the new release image.

      • If the CredentialsRequest custom resources for any existing credentials that are stored in secrets have changed permissions requirements, update the permissions as required.

    2. If your cluster uses cluster capabilities to disable one or more optional components, delete the CredentialsRequest custom resources for any disabled components.

      Example credrequests directory contents for OKD 4.12 on AWS

      Example directory contents for OKD 4.12 on GCP

      1The Cloud Controller Manager Operator CR is required.
      2The Machine API Operator CR is required.
      3The Cloud Credential Operator CR is required.
      4The Image Registry Operator CR is required.
      5The Ingress Operator CR is required.
      6The Network Operator CR is required.
      7The Storage Operator CR is an optional component and might be disabled in your cluster.

    Next steps

    • Update the upgradeable-to annotation to indicate that the cluster is ready to upgrade.

    The Cloud Credential Operator (CCO) Upgradable status for a cluster with manually maintained credentials is False by default.

    Prerequisites

    • For the release image that you are upgrading to, you have processed any new credentials manually or by using the Cloud Credential Operator utility (ccoctl).

    • You have installed the OpenShift CLI (oc).

    Procedure

    1. Log in to oc on the cluster as a user with the role.

    2. Edit the CloudCredential resource to add an upgradeable-to annotation within the metadata field by running the following command:

      Where <version_number> is the version that you are upgrading to, in the format x.y.z. For example, use 4.12.2 for OKD 4.12.2.

      It may take several minutes after adding the annotation for the upgradeable status to change.

    Verification

    1. In the Administrator perspective of the web console, navigate to AdministrationCluster Settings.

    2. When the Upgradeable status in the Conditions section is True, begin the OKD upgrade.