gcloud anthos auth login - authenticate clusters using the Anthos client
gcloud anthos auth login [--cluster=CLUSTER] [--dry-run] [--kubeconfig=KUBECONFIG] [--login-config=LOGIN_CONFIG] [--login-config-cert=LOGIN_CONFIG_CERT] [--set-preferred-auth] [--user=USER] [GCLOUD_WIDE_FLAG ...]
Authenticate clusters using the Anthos client.
To add credentials to default kubeconfig file:
$ gcloud anthos auth login --cluster=testcluster \ --login-config=kubectl-anthos-config.yaml
To add credentials to custom kubeconfig file:
$ gcloud anthos auth login --cluster=testcluster \ --login-config=kubectl-anthos-config.yaml \ --kubeconfig=my.kubeconfig
To generate the commands without executing them:
$ gcloud anthos auth login --cluster=testcluster \ --login-config=kubectl-anthos-config.yaml --dry-run
- --cluster=CLUSTER
Cluster to authenticate against. If no cluster is specified, the command will print a list of available options.
- --dry-run
Print out the generated kubectl commands but do not execute them.
- --kubeconfig=KUBECONFIG
Specifies the destination kubeconfig file where credentials will be stored.
- --login-config=LOGIN_CONFIG
Specifies the configuration yaml file for login. Can be a file path or a URL.
- --login-config-cert=LOGIN_CONFIG_CERT
Specifies the CA certificate file to be added to trusted pool for making HTTPS connections to a --login-config URL.
- --set-preferred-auth
If set, forces update of preferred authentication for given cluster
- --user=USER
If configuring multiple user accounts in the same kubecconfig file, you can specify a user to differentiate between them.
These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.
Run $ gcloud help for details.
These variants are also available:
$ gcloud alpha anthos auth login
$ gcloud beta anthos auth login