Foxglove

Configure cloud credentials

Self-managed Primary Sites need additional cloud credentials to import data from its corresponding Edge Sites.

Use the instructions below to configure your Primary Site cloud credentials, then Continue installation.

Google Cloud Platform (GCP)

Install a Secret named gcp-cloud-credential into the foxglove namespace. This secret should contain a single key credentials.json with the contents of json key file.

Use the kubectl command to set the secret from an existing credentials.json file.

kubectl create secret generic gcp-cloud-credential \
  -n foxglove \
  --from-file=./credentials.json

The Primary Site deployment will mount this secret into a volume and read the credentials.json file to initialize the GCP client.

Amazon Web Services (AWS)

Authenticate using IAM Roles associated with service accounts or access key and secret credentials.

Service accounts

Create your IAM Roles in AWS to have appropriate access to the lake and inbox buckets. Set up the EKS OIDC provider to allow the roles assumed by the services.

Edit the serviceAccount section in the Helm chart, and add the IAM Role's Amazon Resource Name (ARN) as annotation for the inboxListener, streamService and garbageCollector services:

serviceAccount:
  enabled: true
  annotations:
    eks.amazonaws.com/role-arn: arn:aws:iam::xxxxxxxxxxxx:role/foxglove-inbox-listener-sa-role

Access key

Install a Secret named cloud-credentials into the foxglove namespace. This secret should contain the credentials for your AWS key:

Check out the following example secret configuration file:

apiVersion: v1
kind: Secret
metadata:
  name: cloud-credentials
type: Opaque
stringData:
  AWS_ACCESS_KEY_ID: AKIAIOSFODNN7EXAMPLE
  AWS_SECRET_ACCESS_KEY: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
  AWS_DEFAULT_REGION: us-west-2

Azure

Install a Secret named cloud-credentials into the foxglove namespace. This secret should contain the credentials for your Azure account:

Check out the following example secret configuration file:

apiVersion: v1
kind: Secret
metadata:
  name: cloud-credentials
type: Opaque
stringData:
  AZURE_TENANT_ID: tenant-id
  AZURE_CLIENT_ID: client-id
  AZURE_CLIENT_SECRET: f02f3819-b046-4c9d-a5e8-853f16e5c687
  AZURE_INBOX_STORAGE_SERVICE_URL: ...
  AZURE_INBOX_STORAGE_ACCOUNT_NAME: ...