This KB provides guidance on securely generating secrets and credentials—such as service accounts, private keys, access keys, and secret keys—for accessing and managing cloud resources and clusters.
EKS Cluster – AWS Access Key and Secret Key
To add an Amazon EKS cluster in SWIFT, you need AWS validate credentials to authenticate and allow SWIFT to discover and manage your cluster. To create required credentials with the necessary permissions and retrieving the AWS Access Key and Secret Key, Please see Adding amazon AWS user for SWIFT use section.
GKE Cluster – Service Account and JSON Key
To add a GKE cluster in SWIFT, you need a service account key for authentication. The detailed steps to create the service account and generate the key are already covered in the Adding Google GCP service-account for SWIFT use section in our Pre-requisite and installation guide.
AKS Cluster – Service Principal (Client ID and Secret)
To add AKS cluster in SWIFT, you need to create a Service Principal and generate the required client ID and client secret, as documented in the Adding Azure AAD application for SWIFT use section.
OKE Cluster – OCI User and API Key
To add an OKE cluster in SWIFT, you need to create the required OCI user and generate the necessary API keys are documented in the Adding Oracle Cloud Infrastructure (OCI) user for SWIFT use section.
IKS Cluster – IBM Cloud Service Credentials and API Key
To add an IKS cluster in SWIFT, you need to create the required IBM Cloud service credentials and generate the necessary API key are documented in the Adding IBM cloud user section.
Local Kubernetes Cluster – Service Account with ClusterRole and ClusterRoleBinding
To add Local Kubernetes cluster in SWIFT, You need to create a dedicated Service Account in the cluster and assign the appropriate permissions using a ClusterRole and ClusterRoleBinding. For detailed steps, refer to the Adding local Kubernetes cluster service account for SWIFT use section.