You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: SETUP.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,14 @@ Deployments are triggered from GitHub Actions workflows.
5
5
6
6
## Setting up your own project
7
7
8
+
### GCP
9
+
* Login to GCP account.
10
+
* Create a service account like `k8s-environment-terraform-cicd` to use for CICD.
11
+
* Create a service account JSON file.
12
+
* Add as a repository secret by going to Settings > Secrets and variables > Actions. Name it GCP_CREDENTIALS and paste in the credentials JSON.
13
+
* Create the buckets for Terraform state like `prod-tf-state-bucket`. The bucket names are specified in the `backend/{env}.tfvars` file.
14
+
* Go to the bucket > Permissions > Add Member > Service Account > k8s-environment-terraform-cicd@florenciacomuzzi.iam.gserviceaccount.com > Role > Storage Object Admin.
15
+
8
16
### Linode
9
17
* Login to Linode account.
10
18
* Create a personal access token. This secret is the value of "token" input variable of the Terraform module.
0 commit comments