From a702149fb2fbbd2124801d6c25c049f85e657c17 Mon Sep 17 00:00:00 2001 From: elirunai Date: Sun, 1 Dec 2024 14:00:41 +0200 Subject: [PATCH] Update credentials.md --- .../workloads/assets/credentials.md | 31 +++++++++---------- 1 file changed, 15 insertions(+), 16 deletions(-) diff --git a/docs/platform-admin/workloads/assets/credentials.md b/docs/platform-admin/workloads/assets/credentials.md index e3276e72ca..23d38894a7 100644 --- a/docs/platform-admin/workloads/assets/credentials.md +++ b/docs/platform-admin/workloads/assets/credentials.md @@ -184,38 +184,37 @@ Add secrets in advance to be used when creating credentials via the Run:ai UI. Follow the steps below for each required scope: === "Cluster scope" + 1. Create the secret in the Run:ai namespace (runai) 2. To authorize Run:ai to use the secret, label it: `run.ai/cluster-wide: "true"` 3. Label the secret with the correct credential type: - 1. Docker registry - `run.ai/cluster-wide: "docker-registry"` - 2. Access key - `run.ai/cluster-wide: "access-key"` - 3. Username and password - `run.ai/cluster-wide: "password"` - 4. Generic secret - `run.ai/cluster-wide: "generic"` ֿ - + 1. Docker registry - `run.ai/resource: "docker-registry"` + 2. Access key - `run.ai/resource: "access-key"` + 3. Username and password - `run.ai/resource: "password"` + 4. Generic secret - `run.ai/resource: "generic"` ֿ === "Department scope" 1. Create the secret in the Run:ai namespace (runai) - 2. To authorize Run:ai to use the secret, label it: `run.ai/department: ""` + 2. To authorize Run:ai to use the secret, label it: `run.ai/department: ""` 3. Label the secret with the correct credential type: - 1. Docker registry - `run.ai/cluster-wide: "docker-registry"` - 2. Access key - `run.ai/cluster-wide: "access-key"` - 3. Username and password - `run.ai/cluster-wide: "password"` - 4. Generic secret - `run.ai/cluster-wide: "generic"` - + 1. Docker registry - `run.ai/resource: "docker-registry"` + 2. Access key - `run.ai/resource: "access-key"` + 3. Username and password - `run.ai/resource: "password"` + 4. Generic secret - `run.ai/resource: "generic"` === "Project scope" 1. Create the secret in the project’s namespace 2. Label the secret with the correct credential type: - 1. Docker registry - `run.ai/cluster-wide: "docker-registry"` - 2. Access key - `run.ai/cluster-wide: "access-key"` - 3. Username and password - `run.ai/cluster-wide: "password"` - 4. Generic secret - `run.ai/cluster-wide: "generic"` + 1. Docker registry - `run.ai/resource: "docker-registry"` + 2. Access key - `run.ai/resource: "access-key"` + 3. Username and password - `run.ai/resource: "password"` + 4. Generic secret - `run.ai/resource: "generic"` The secret is now displayed for that scope in the list of existing secrets. ## Using API -To view the available actions, go to the [Credentials](https://app.run.ai/api/docs#tag/Credentials) API reference \ No newline at end of file +To view the available actions, go to the [Credentials](https://app.run.ai/api/docs#tag/Credentials) API reference