diff --git a/examples/full-cluster-tf-upgrade/1.31/README.md b/examples/full-cluster-tf-upgrade/1.31/README.md index 9130c13..91a2a59 100644 --- a/examples/full-cluster-tf-upgrade/1.31/README.md +++ b/examples/full-cluster-tf-upgrade/1.31/README.md @@ -291,26 +291,8 @@ tf-apply ## Common Services ### Certificate Authority -Set the download to `false` - -```shell -# ca-cert.tf - ca_cert_download = false -``` - -Do the first apply, which generates the key and csr. You'll need to then submit the CSR. (directions generated) - -```shell -tf-apply $(grep ^[rd] ca-cert.tf |awk '{print "-target=" $2 "." $3}' |sed -e 's/"//g') -``` - - -```shell -# terraform taint null_resource.ca_cert[0] -# # (wait for submitted cert to be ready) -tf-apply $(grep ^[rd] ca-cert.tf |awk '{print "-target=" $2 "." $3}' |sed -e 's/"//g') -tf-apply $(grep ^[rd] ca-cert.tf |awk '{print "-target=" $2 "." $3}' |sed -e 's/"//g') -``` +This is now handled by the `acmpca-eks-cert-manager` submodule of `aws-certificate`, which uses the ACM PCA to obtain +a signed certificate. No actions are needed to get a CSR signed by TCO through Remedy. ### Rest of Setup @@ -476,3 +458,8 @@ clusterrolebinding.rbac.authorization.k8s.io/eks-console-dashboard-full-access-b - 1.0.0 -- 2023-10-27 - setup for 1.28, ready for edits + +- 1.1.0 -- 2025-01-03 + - remove old certificate stuff + - updated to 1.31 + - still needs some updates