It is recommended that you create a new IAM role to integrate with TrueFoundry:
Integrations
page and open the Cloud Accounts
tab.New Cloud Account
and select AWS as the provider.IAM role arn
you created into the TrueFoundry cloud account form.You can edit the integration at any time to update the secrets if required. If the new secrets do not have permission to manage existing clusters, you will be unable to manage those clusters from TrueFoundry.
Clusters
tab and click on Configure
cloud account for your cluster.Sync
button for your cloud account. This will sync cluster details and all its node pools.We recommend you create a new service account to integrate with TrueFoundry:
Open your GCP console and navigate to IAM and admin
in your project and open the service accounts page
Create a new service account:
keyfile.json
Navigate to your TrueFoundry Integrations
page and open the Cloud Accounts
tab.
Click on New Cloud Account
and select Google Cloud Platform(GCP) as the provider.
Copy and paste the contents of your keyfile.json
and Google project ID
. Submit to add the Cloud Account.
You can edit the integration at any time to update the keyfile.json
and Google project ID, if required. If you change the Google project while there are still TrueFoundry clusters on it, you will be unable to manage those clusters from TrueFoundry.
Clusters
tab and click on Configure
cloud account for your cluster.Sync
button for your cloud account. This will sync cluster details and all its node pools.It is recommended that you create a new Azure Active Directory application to integrate with TrueFoundry:
add
menu, or from the app registrations
page. Copy the directory (tenant) ID and the application (client) ID to the TrueFoundry form.certificates and secrets
page. Create a new client secret, and copy the secret value (not the secret ID) to TrueFoundry.access control (IAM)
and add a new role assignment to the subscription. Select the Reader
roleJob function roles
, and then add your Active Directory application as a member.Integrations
page and open the Cloud Accounts
tab.New Cloud Account
and select Azure as the provider.Tenant ID
, Client ID
, Client secret
and Subscription ID
into the TrueFoundry cloud account form.You can edit the integration at any time to update the secrets if required. If the new secrets do not have permission to manage existing clusters, you will be unable to manage those clusters from TrueFoundry.
Clusters
tab and click on Configure
cloud account for your cluster.Sync
button for your cloud account. This will sync cluster details and all its node pools.It is recommended that you create a new IAM role to integrate with TrueFoundry:
Integrations
page and open the Cloud Accounts
tab.New Cloud Account
and select AWS as the provider.IAM role arn
you created into the TrueFoundry cloud account form.You can edit the integration at any time to update the secrets if required. If the new secrets do not have permission to manage existing clusters, you will be unable to manage those clusters from TrueFoundry.
Clusters
tab and click on Configure
cloud account for your cluster.Sync
button for your cloud account. This will sync cluster details and all its node pools.We recommend you create a new service account to integrate with TrueFoundry:
Open your GCP console and navigate to IAM and admin
in your project and open the service accounts page
Create a new service account:
keyfile.json
Navigate to your TrueFoundry Integrations
page and open the Cloud Accounts
tab.
Click on New Cloud Account
and select Google Cloud Platform(GCP) as the provider.
Copy and paste the contents of your keyfile.json
and Google project ID
. Submit to add the Cloud Account.
You can edit the integration at any time to update the keyfile.json
and Google project ID, if required. If you change the Google project while there are still TrueFoundry clusters on it, you will be unable to manage those clusters from TrueFoundry.
Clusters
tab and click on Configure
cloud account for your cluster.Sync
button for your cloud account. This will sync cluster details and all its node pools.It is recommended that you create a new Azure Active Directory application to integrate with TrueFoundry:
add
menu, or from the app registrations
page. Copy the directory (tenant) ID and the application (client) ID to the TrueFoundry form.certificates and secrets
page. Create a new client secret, and copy the secret value (not the secret ID) to TrueFoundry.access control (IAM)
and add a new role assignment to the subscription. Select the Reader
roleJob function roles
, and then add your Active Directory application as a member.Integrations
page and open the Cloud Accounts
tab.New Cloud Account
and select Azure as the provider.Tenant ID
, Client ID
, Client secret
and Subscription ID
into the TrueFoundry cloud account form.You can edit the integration at any time to update the secrets if required. If the new secrets do not have permission to manage existing clusters, you will be unable to manage those clusters from TrueFoundry.
Clusters
tab and click on Configure
cloud account for your cluster.Sync
button for your cloud account. This will sync cluster details and all its node pools.