Skip to content

Commit ce8b56b

Browse files
committed
ibm-entitlement-key is the default as imagePullSecret
1 parent 6780e0c commit ce8b56b

File tree

3 files changed

+3
-5
lines changed

3 files changed

+3
-5
lines changed

.secrets.baseline

+2-2
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2024-11-13T08:35:31Z",
6+
"generated_at": "2024-12-04T08:57:46Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -1338,7 +1338,7 @@
13381338
"hashed_secret": "e6a8430b6dc3747f44d258a127b11f4705d9ee01",
13391339
"is_secret": false,
13401340
"is_verified": false,
1341-
"line_number": 20,
1341+
"line_number": 18,
13421342
"type": "Secret Keyword",
13431343
"verified_result": null
13441344
}

platform/gcloud/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ To get access to the ODM material, you need an IBM entitlement key to pull the i
179179
#### b. Create a pull secret by running a kubectl create secret command
180180

181181
```shell
182-
kubectl create secret docker-registry registrysecret \
182+
kubectl create secret docker-registry ibm-entitlement-key \
183183
--docker-server=cp.icr.io \
184184
--docker-username=cp \
185185
--docker-password='<API_KEY_GENERATED>' \

platform/gcloud/gcp-values.yaml

-2
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,6 @@ usersPassword: "odmAdmin"
33

44
image:
55
repository: cp.icr.io/cp/cp4a/odm
6-
pullSecrets:
7-
- registrysecret
86

97
service:
108
enableTLS: false

0 commit comments

Comments
 (0)