Skip to content

Commit 70f0ee4

Browse files
Gerry-Fordenickboldtthemr0chmanwani-rhjmagak
authored
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE (redhat-developer#715)
* RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * chore(release notes): re-add jira2asciidoc.yml file in a new location (redhat-developer#694) * RHIDP-4860 Remove Azure authentication provider from admin guide (redhat-developer#690) * RHIDP-4860 Remove unsupported authentication provider: Amazon Cognito (redhat-developer#691) Signed-off-by: Fabrice Flore-Thébault <[email protected]> * RHIDP-4684 Update Keycloak configuration instructions (redhat-developer#681) * RHIDP-4684 Update Keycloak configuration instructions to improve performance and security Signed-off-by: Fabrice Flore-Thébault <[email protected]> * RHIDP-4684 Update Keycloak configuration instructions to improve performance and security Signed-off-by: Fabrice Flore-Thébault <[email protected]> * Update modules/authentication/proc-enabling-authentication-with-rhsso.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/authentication/proc-enabling-authentication-with-rhsso.adoc Co-authored-by: Heena Manwani <[email protected]> * Apply suggestions from code review Co-authored-by: Heena Manwani <[email protected]> --------- Signed-off-by: Fabrice Flore-Thébault <[email protected]> Co-authored-by: Heena Manwani <[email protected]> * RHIDP-4814: Move observe related content to new titles (redhat-developer#689) * RHIDP-4814: Move observe related content in new titles * fixing issues * Fixing issues * Fix issues * Removing offset * test * testing titles * test * fixing structure * Changed order and updated version attribute * Fixing issue * Moved files and chapter numbering reset * Rhidp 3835 home page document how users can customize the home page (redhat-developer#529) * Modifies the customizing home page * Modifies the customizing home page * Modifies the customizing home page * Modify the customization home page * Modifies the Customizing Home Page * Modifies the Customizing Home Page * Modifies the customizing Home page * Modifies the customizing Home page * Modifies the customizing Home page * Modifies the customizing Home page * Updates the customizing rhdh homepage * Updates the customizing rhdh homepage * RHIDP-3975 Managing authorization using the REST API (redhat-developer#685) * RHIDP-3975 Managing authorization using the REST API Signed-off-by: Fabrice Flore-Thébault <[email protected]> * RHIDP-3975 Managing authorization using the REST API Signed-off-by: Fabrice Flore-Thébault <[email protected]> * RHIDP-3975 Managing authorization using the REST API Signed-off-by: Fabrice Flore-Thébault <[email protected]> * RHIDP-3975 Managing authorization using the REST API Signed-off-by: Fabrice Flore-Thébault <[email protected]> * RHIDP-3975 Managing authorization using the REST API Signed-off-by: Fabrice Flore-Thébault <[email protected]> * Update modules/authorization/proc-sending-request-to-the-rbac-rest-api-by-using-curl.adoc Co-authored-by: Oleksandr Andriienko <[email protected]> * Apply suggestions from code review * Update modules/authorization/proc-sending-request-to-the-rbac-rest-api-by-using-curl.adoc * Update modules/authorization/proc-sending-request-to-the-rbac-rest-api-by-using-curl.adoc * Update modules/authorization/proc-sending-request-to-the-rbac-rest-api-by-using-curl.adoc * Update modules/authorization/proc-sending-request-to-the-rbac-rest-api-by-using-curl.adoc * Apply suggestions from code review * Update modules/authorization/proc-sending-request-to-the-rbac-rest-api-by-using-curl.adoc * Update modules/authorization/proc-sending-request-to-the-rbac-rest-api-by-using-curl.adoc * Delete modules/authorization/con-permission-policy-and-role-source.adoc Will provide the file in another PR * Update assemblies/assembly-configuring-authorization-in-rhdh.adoc --------- Signed-off-by: Fabrice Flore-Thébault <[email protected]> Co-authored-by: Oleksandr Andriienko <[email protected]> * Update pull_request_template.md (redhat-developer#710) * Update pull_request_template.md * Update .github/pull_request_template.md * Update .github/pull_request_template.md Co-authored-by: Heena Manwani <[email protected]> --------- Co-authored-by: Gerry-Forde <[email protected]> Co-authored-by: Heena Manwani <[email protected]> * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * RHIDP-4323: OCM permissions require additional permissionsto fully restrict resources (redhat-developer#692) * draft 1: * Update modules/authorization/ref-rbac-permission-policies.adoc Co-authored-by: jmagak <[email protected]> --------- Co-authored-by: jmagak <[email protected]> Co-authored-by: Joseph Kim <[email protected]> * RHIDP-3334: apiversion and kind update (redhat-developer#695) * updated apiversion and kind * Incorporated Armel's comment --------- Co-authored-by: Joseph Kim <[email protected]> Co-authored-by: Gerry-Forde <[email protected]> * [main] Adds benefits of rhdh redhat-developer#684- Updates the module titles (redhat-developer#719) * Updates the module titles * Updates changes * Modifies the chapter --------- Co-authored-by: jmagak <[email protected]> * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Zbyněk Drápela <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Zbyněk Drápela <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Zbyněk Drápela <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Zbyněk Drápela <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Zbyněk Drápela <[email protected]> * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Zbyněk Drápela <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Zbyněk Drápela <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * RHIDP-4860 Remove Azure authentication provider from admin guide (redhat-developer#690) * RHIDP-4814: Move observe related content to new titles (redhat-developer#689) * RHIDP-4814: Move observe related content in new titles * fixing issues * Fixing issues * Fix issues * Removing offset * test * testing titles * test * fixing structure * Changed order and updated version attribute * Fixing issue * Moved files and chapter numbering reset * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * RHIDP-1923 Fix merge conflict in audit log file * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * [RHDHBUGS-106][RHIDP-4646] Clarify the behavior of the `NO_PROXY` rules (redhat-developer#709) * Clarify the behavior of the `NO_PROXY` rules ref: redhat-developer/rhdh#1903 * Fix the lint issues reported by Vale * Apply suggestions from code review Co-authored-by: jmagak <[email protected]> * Apply suggestions from code review * Update modules/admin/procedure-understanding-no-proxy.adoc * Apply suggestions from code review * Apply suggestions from code review Co-authored-by: jmagak <[email protected]> * Apply suggestions from code review * Update modules/admin/procedure-understanding-no-proxy.adoc * Apply suggestions from code review Co-authored-by: jmagak <[email protected]> --------- Co-authored-by: jmagak <[email protected]> * RHIDP-4814: Move observe related content to new titles (redhat-developer#689) * RHIDP-4814: Move observe related content in new titles * fixing issues * Fixing issues * Fix issues * Removing offset * test * testing titles * test * fixing structure * Changed order and updated version attribute * Fixing issue * Moved files and chapter numbering reset * RHIDP-1923 Fix merge conflict in audit log file * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-deploy-rhdh-instance-gke.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-helm.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * Update modules/installation/proc-rhdh-deploy-gke-operator.adoc Co-authored-by: Heena Manwani <[email protected]> * RHIDP-1923 - GKE: Document how RHDH can be installed in GKE --------- Signed-off-by: Fabrice Flore-Thébault <[email protected]> Co-authored-by: Nick Boldt <[email protected]> Co-authored-by: Fabrice Flore-Thébault <[email protected]> Co-authored-by: Heena Manwani <[email protected]> Co-authored-by: jmagak <[email protected]> Co-authored-by: Oleksandr Andriienko <[email protected]> Co-authored-by: Priyanka Abel <[email protected]> Co-authored-by: Joseph Kim <[email protected]> Co-authored-by: OpenShift Cherrypick Robot <[email protected]> Co-authored-by: jmagak <[email protected]> Co-authored-by: Zbyněk Drápela <[email protected]> Co-authored-by: Armel Soro <[email protected]>
1 parent 00dc6f7 commit 70f0ee4

12 files changed

+614
-4
lines changed

assemblies/assembly-audit-log.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -45,4 +45,4 @@ include::modules/observe/ref-audit-log-scaffolder-events.adoc[leveloffset=+2]
4545

4646
include::modules/observe/ref-audit-log-catalog-events.adoc[leveloffset=+2]
4747

48-
include::modules/observe/ref-audit-log-file-rotation-overview.adoc[]
48+
include::modules/observe/ref-audit-log-file-rotation-overview.adoc[]

assemblies/assembly-rhdh-integration-aks.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@ This integration requires the deployment of {product-short} on {aks-short} using
1313
* The Helm chart
1414
* The {product} Operator
1515
16-
//include::modules/admin/proc-rhdh-monitoring-logging-aks.adoc[leveloffset=+1] // moving observe category related content to new titles: RHIDP-4814
16+
//include::modules/admin/proc-rhdh-monitoring-logging-aks.adoc[leveloffset=+1] // moving observe category related content to new titles: RHIDP-4814
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,195 @@
1+
[id="proc-deploy-rhdh-instance-gke.adoc_{context}"]
2+
= Deploying the {product-short} instance on {gke-short} with the Operator
3+
You can deploy your {product-short} instance in {gke-short} using the Operator.
4+
5+
.Prerequisites
6+
* A cluster administrator has installed the {product} Operator.
7+
* You have subscribed to `registry.redhat.io`. For more information, see https://access.redhat.com/RegistryAuthentication[{company-name} Container Registry Authentication].
8+
* You have installed `kubectl`. For more information, see https://kubernetes.io/docs/tasks/tools/#kubectl[Install kubetl].
9+
10+
* You have configured a domain name for your {product-short} instance.
11+
* You have reserved a static external Premium IPv4 Global IP address that is not attached to any virtual machine (VM). For more information see https://cloud.google.com/vpc/docs/reserve-static-external-ip-address#reserve_new_static[Reserve a new static external IP address]
12+
* You have configured the DNS records for your domain name to point to the IP address that has been reserved.
13+
+
14+
[NOTE]
15+
====
16+
You need to create an `A` record with the value equal to the IP address. This process can take up to one hour to propagate.
17+
====
18+
19+
.Procedure
20+
. Create a ConfigMap named `app-config-rhdh` containing the {product-short} configuration using the following template:
21+
+
22+
--
23+
.`app-config-rhdh.yaml` fragment
24+
[source,yaml,subs="attributes+"]
25+
----
26+
apiVersion: v1
27+
kind: ConfigMap
28+
metadata:
29+
name: app-config-rhdh
30+
data:
31+
"app-config-rhdh.yaml": |
32+
app:
33+
title: Red Hat Developer Hub
34+
baseUrl: https://<rhdh_domain_name>
35+
backend:
36+
auth:
37+
externalAccess:
38+
- type: legacy
39+
options:
40+
subject: legacy-default-config
41+
secret: "${BACKEND_SECRET}"
42+
baseUrl: https://<rhdh_domain_name>
43+
cors:
44+
origin: https://<rhdh_domain_name>
45+
----
46+
--
47+
48+
. Create a Secret named `secrets-rhdh` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
49+
+
50+
--
51+
.`secrets-rhdh` fragment
52+
[source,yaml]
53+
----
54+
apiVersion: v1
55+
kind: Secret
56+
metadata:
57+
name: secrets-rhdh
58+
stringData:
59+
# TODO: See https://backstage.io/docs/auth/service-to-service-auth/#setup
60+
BACKEND_SECRET: "xxx"
61+
----
62+
63+
[IMPORTANT]
64+
====
65+
Ensure that you use a unique value of `BACKEND_SECRET` for each {product-short} instance.
66+
====
67+
68+
You can use the following command to generate a key:
69+
70+
[source,terminal]
71+
----
72+
node-p'require("crypto").randomBytes(24).toString("base64")'
73+
----
74+
--
75+
76+
. To enable pulling the PostgreSQL image from the {company-name} Ecosystem Catalog, add the image pull secret in the default service account within the namespace where the {product-short} instance is being deployed:
77+
+
78+
--
79+
[source,terminal]
80+
----
81+
kubectl patch serviceaccount default \
82+
-p '{"imagePullSecrets": [{"name": "rhdh-pull-secret"}]}' \
83+
-n <your_namespace>
84+
----
85+
--
86+
87+
. Create a Custom Resource file using the following template:
88+
+
89+
--
90+
.Custom Resource fragment
91+
[source,yaml,subs="attributes+"]
92+
----
93+
apiVersion: rhdh.redhat.com/v1alpha1
94+
kind: Backstage
95+
metadata:
96+
# This is the name of your {product-short} instance
97+
name: my-rhdh
98+
spec:
99+
application:
100+
imagePullSecrets:
101+
- "rhdh-pull-secret"
102+
route:
103+
enabled: false
104+
appConfig:
105+
configMaps:
106+
- name: "app-config-rhdh"
107+
extraEnvs:
108+
secrets:
109+
- name: "secrets-rhdh"
110+
----
111+
--
112+
113+
. Set up a Google-managed certificate by creating a `ManagedCertificate` object which you must attach to the Ingress.
114+
+
115+
--
116+
.Example of a `ManagedCertificate` object
117+
[source,yaml,subs="attributes+"]
118+
----
119+
apiVersion: networking.gke.io/v1
120+
kind: ManagedCertificate
121+
metadata:
122+
name: <rhdh_certificate_name>
123+
spec:
124+
domains:
125+
- <rhdh_domain_name>
126+
----
127+
--
128+
For more information about setting up a Google-managed certificate, see https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs?hl=en#setting_up_a_google-managed_certificate[Setting up a Google-managed certificate].
129+
130+
. Create a `FrontendConfig` object to set a policy for redirecting to HTTPS. You must attach this policy to the Ingress.
131+
+
132+
--
133+
.Example of a `FrontendConfig` object
134+
[source,yaml,subs="attributes+"]
135+
----
136+
apiVersion: networking.gke.io/v1beta1
137+
kind: FrontendConfig
138+
metadata:
139+
name: <ingress_security_config>
140+
spec:
141+
sslPolicy: gke-ingress-ssl-policy-https
142+
redirectToHttps:
143+
enabled: true
144+
----
145+
--
146+
For more information about setting a policy to redirect to HTTPS, see https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-configuration?hl=en#https_redirect[HTTP to HTTPS redirects].
147+
148+
. Create an ingress resource using the following template, customizing the names as needed:
149+
+
150+
--
151+
.Example of an ingress resource configuration
152+
[source,yaml,subs="attributes+"]
153+
----
154+
apiVersion: networking.k8s.io/v1
155+
kind: Ingress
156+
metadata:
157+
# TODO: this the name of your Developer Hub Ingress
158+
name: my-rhdh
159+
annotations:
160+
# If the class annotation is not specified it defaults to "gce".
161+
kubernetes.io/ingress.class: "gce"
162+
kubernetes.io/ingress.global-static-ip-name: <ADDRESS_NAME>
163+
networking.gke.io/managed-certificates: <rhdh_certificate_name>
164+
networking.gke.io/v1beta1.FrontendConfig: <ingress_security_config>
165+
spec:
166+
ingressClassName: gce
167+
rules:
168+
# TODO: Set your application domain name.
169+
- host: <rhdh_domain_name>
170+
http:
171+
paths:
172+
- path: /
173+
pathType: Prefix
174+
backend:
175+
service:
176+
# TODO: my-rhdh is the name of your Backstage Custom Resource.
177+
# Adjust if you changed it!
178+
name: backstage-my-rhdh
179+
port:
180+
name: http-backend
181+
----
182+
--
183+
184+
185+
186+
.Verification
187+
188+
* Wait for the `ManagedCertificate` to be provisioned. This process can take a couple of hours.
189+
190+
* Access {product-very-short} with `https://<rhdh_domain_name>`
191+
192+
// Wait until the DNS name is responsive, indicating that your {product-short} instance is ready for use.
193+
194+
.Additional information
195+
For more information on setting up {gke-short} using Ingress with TLS, see https://github.com/GoogleCloudPlatform/gke-networking-recipes/tree/main/ingress/single-cluster/ingress-https[Secure GKE Ingress].
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,168 @@
1+
[id='proc-rhdh-deploy-gke-helm_{context}']
2+
= Installing {product-short} on {gke-short} with the Helm chart
3+
4+
When you install the {product-short} Helm chart in {gke-brand-name} ({gke-short}), it orchestrates the deployment of a {product-short} instance, which provides a robust developer platform within the {gke-short} ecosystem.
5+
6+
.Prerequisites
7+
* You have subscribed to `registry.redhat.io`. For more information, see https://access.redhat.com/RegistryAuthentication[{company-name} Container Registry Authentication].
8+
* You have installed `kubectl`. For more information, see https://kubernetes.io/docs/tasks/tools/#kubectl[Install kubetl].
9+
* You have installed the Google Cloud CLI. For more information, see https://cloud.google.com/sdk/docs/install[Install the gcloud CLI].
10+
* You have logged in to your Google account and created a https://cloud.google.com/kubernetes-engine/docs/how-to/creating-an-autopilot-cluster[GKE Autopilot] or https://cloud.google.com/kubernetes-engine/docs/how-to/creating-a-zonal-cluster[GKE Standard] cluster.
11+
12+
13+
* You have configured a domain name for your {product-short} instance.
14+
* You have reserved a static external Premium IPv4 Global IP address that is not attached to any VM. For more information see https://cloud.google.com/vpc/docs/reserve-static-external-ip-address#reserve_new_static[Reserve a new static external IP address]
15+
* You have configured the DNS records for your domain name to point to the IP address that has been reserved.
16+
+
17+
[NOTE]
18+
====
19+
You need to create an `A` record with the value equal to the IP address. This process can take up to one hour to propagate.
20+
====
21+
* You have installed Helm 3 or the latest. For more information, see https://helm.sh/docs/intro/install[Installing Helm].
22+
23+
.Procedure
24+
. Go to your terminal and run the following command to add the Helm chart repository containing the {product-short} chart to your local Helm registry:
25+
+
26+
--
27+
[source,terminal]
28+
----
29+
helm repo add openshift-helm-charts https://charts.openshift.io/
30+
----
31+
--
32+
33+
. Create a pull secret using the following command:
34+
+
35+
--
36+
[source,terminal]
37+
----
38+
kubectl -n <your-namespace> create secret docker-registry rhdh-pull-secret \ <1>
39+
--docker-server=registry.redhat.io \
40+
--docker-username=<user_name> \ <2>
41+
--docker-password=<password> \ <3>
42+
--docker-email=<email> <4>
43+
----
44+
<1> Enter your {gke-short} namespace in the command.
45+
<2> Enter your username in the command.
46+
<3> Enter your password in the command.
47+
<4> Enter your email address in the command.
48+
49+
The created pull secret is used to pull the {product-short} images from the {company-name} Ecosystem.
50+
--
51+
52+
. Set up a Google-managed certificate by creating a `ManagedCertificate` object that you must attach to the ingress.
53+
+
54+
--
55+
.Example of attaching a `ManagedCertificate` object to the ingress
56+
[source,yaml,subs="attributes+"]
57+
----
58+
apiVersion: networking.gke.io/v1
59+
kind: ManagedCertificate
60+
metadata:
61+
name: <rhdh_certificate_name>
62+
spec:
63+
domains:
64+
- <rhdh_domain_name>
65+
----
66+
--
67+
For more information about setting up a Google-managed certificate, see https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs?hl=en#setting_up_a_google-managed_certificate[Setting up a Google-managed certificate].
68+
69+
. Create a `FrontendConfig` object to set a policy for redirecting to HTTPS. You must attach this policy to the ingress.
70+
+
71+
--
72+
.Example of attaching a `FrontendConfig` object to the ingress
73+
[source,yaml,subs="attributes+"]
74+
----
75+
apiVersion: networking.gke.io/v1beta1
76+
kind: FrontendConfig
77+
metadata:
78+
name: <ingress_security_config>
79+
spec:
80+
sslPolicy: gke-ingress-ssl-policy-https
81+
redirectToHttps:
82+
enabled: true
83+
----
84+
--
85+
For more information about setting a policy to redirect to HTTPS, see https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-configuration?hl=en#https_redirect[HTTP to HTTPS redirects].
86+
87+
. Create a file named `values.yaml` using the following template:
88+
+
89+
.Example `values.yaml` file
90+
[source,yaml,subs="attributes+"]
91+
----
92+
global:
93+
host: <rhdh_domain_name>
94+
route:
95+
enabled: false
96+
upstream:
97+
service:
98+
type: NodePort
99+
ingress:
100+
enabled: true
101+
annotations:
102+
kubernetes.io/ingress.class: gce
103+
kubernetes.io/ingress.global-static-ip-name: <ADDRESS_NAME>
104+
networking.gke.io/managed-certificates: <rhdh_certificate_name>
105+
networking.gke.io/v1beta1.FrontendConfig: <ingress_security_config>
106+
className: gce
107+
backstage:
108+
image:
109+
pullSecrets:
110+
- rhdh-pull-secret
111+
podSecurityContext:
112+
fsGroup: 2000
113+
postgresql:
114+
image:
115+
pullSecrets:
116+
- rhdh-pull-secret
117+
primary:
118+
podSecurityContext:
119+
enabled: true
120+
fsGroup: 3000
121+
volumePermissions:
122+
enabled: true
123+
----
124+
. Run the following command in your terminal to deploy {product-short} using the latest version of Helm Chart and using the `values.yaml` file:
125+
+
126+
[source,terminal,subs="attributes+"]
127+
----
128+
helm -n <your_namespace> install -f values.yaml <your_deploy_name> \
129+
openshift-helm-charts/redhat-developer-hub \
130+
--version {product-chart-version}
131+
----
132+
+
133+
For the latest Helm Chart version, see this https://github.com/openshift-helm-charts/charts/tree/main/charts/redhat/redhat/redhat-developer-hub[Helm Charts] repository.
134+
135+
.Verification
136+
* Confirm that the deployment is complete.
137+
+
138+
[source,terminal,subs="attributes+"]
139+
----
140+
kubectl get deploy <you_deploy_name>-developer-hub -n <your_namespace>
141+
----
142+
143+
* Verify that the service and ingress were created.
144+
+
145+
[source,terminal,subs="attributes+"]
146+
----
147+
kubectl get service -n <your_namespace>
148+
kubectl get ingress -n <your_namespace>
149+
----
150+
+
151+
[NOTE]
152+
Wait for the `ManagedCertificate` to be provisioned. This process can take a couple of hours.
153+
154+
* Access {product-very-short} with `https://<rhdh_domain_name>`
155+
156+
* To upgrade your deployment, use the following command:
157+
+
158+
[source,terminal,subs="attributes+"]
159+
----
160+
helm -n <your_namespace> upgrade -f values.yaml <your_deploy_name> openshift-helm-charts/redhat-developer-hub --version <UPGRADE_CHART_VERSION>
161+
----
162+
163+
* To delete your deployment, use the following command:
164+
+
165+
[source,terminal,subs="attributes+"]
166+
----
167+
helm -n <your_namespace> delete <your_deploy_name>
168+
----

0 commit comments

Comments
 (0)