Configure the connection to a DC/OS cluster, attach to the cluster, and authenticate to DC/OS.
dcos cluster setup <dcos_url> [OPTIONS]
||Enterprise The path to a list of trusted CAs to verify requests against.|
||Allow requests to bypass SSL certificate verification. Analogous to
||Enterprise Do not check the CA certificate downloaded from the cluster. This is insecure.|
||The name of an environment variable that contains the password for login.|
||The path to a file that contains the password for login.|
||The password for login. This is insecure.|
||The path to a file that contains the private key.|
||Enterprise The authentication provider to use for login.|
||The username for login.|
If you do not specify one of the SSL options
--ca-certs, the CA certificate is downloaded from the cluster and a sha256 fingerprint of the certificate is presented to you for verification.
||A publicly accessible proxy IP address to a master node.|
|dcos cluster||Manage DC/OS clusters.|
For examples, see the Connecting to Multiple Clusters documentation.