You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: modules/configuring/proc-mounting-additional-files-in-your-custom-configuration-using-rhdh-operator.adoc
+8-3
Original file line number
Diff line number
Diff line change
@@ -40,14 +40,14 @@ data:
40
40
----
41
41
====
42
42
+
43
-
.Minimal `{my-product-secrets}` Secret example
43
+
.Minimal {product} Secret example
44
44
====
45
45
[source,yaml,subs="+attributes,+quotes"]
46
46
----
47
47
apiVersion: v1
48
48
kind: Secret
49
49
metadata:
50
-
name: {my-product-secrets}
50
+
name: `_<my_product_secrets>_`
51
51
StringData:
52
52
secret11.txt: |
53
53
secret-content
@@ -69,9 +69,14 @@ spec:
69
69
key: file12.txt
70
70
mountPath: /my/my-rhdh-config-map/path
71
71
secrets:
72
-
- name: {my-product-secrets}
72
+
- name: `_<my_product_secrets>_`
73
73
key: secret11.txt
74
74
mountPath: /my/my-rhdh-secret/path
75
75
76
76
----
77
77
====
78
+
79
+
[NOTE]
80
+
====
81
+
`_<my_product_secrets>_` is your preferred {product-short} secret name, specifying the identifier for your secret configuration within {product-short}.
Copy file name to clipboardexpand all lines: modules/configuring/proc-provisioning-your-custom-configuration.adoc
+8-3
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Your changes on this configuration might get reverted on {product-short} restart
13
13
* By using the link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/cli_tools/index#cli-about-cli_cli-developer-commands[{openshift-cli}], you have access, with developer permissions, to the {ocp-short} cluster aimed at containing your {product-short} instance.
14
14
15
15
.Procedure
16
-
. Author your custom `{my-product-secrets}.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
16
+
. Author your custom `_<my_product_secrets>_.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
17
17
It contains one secret per line in `KEY=value` form.
18
18
+
19
19
* link:{authentication-book-url}[Enter your authentication secrets].
Alternatively, link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/nodes/index#nnodes-pods-configmap-create-from-console_configmaps[create the config map by using the web console].
73
73
74
-
.. Provision your `{my-product-secrets}.txt` file to the `{my-product-secrets}` secret in the _<{my-product-namespace}>_ project.
74
+
.. Provision your `_<my_product_secrets>_.txt` file to the `_<my_product_secrets>_` secret in the _<{my-product-namespace}>_ project.
link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/nodes/index#nodes-pods-secrets-creating-web-console-secrets_nodes-pods-secrets[create the secret by using the web console].
83
83
84
+
[NOTE]
85
+
====
86
+
`_<my_product_secrets>_` is your preferred {product-short} secret name, specifying the identifier for your secret configuration within {product-short}.
87
+
====
88
+
84
89
.Next steps
85
90
Consider provisioning additional config maps and secrets:
Copy file name to clipboardexpand all lines: modules/configuring/proc-using-the-operator-to-run-rhdh-with-your-custom-configuration.adoc
+11-6
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ spec:
31
31
- name: {my-app-config-config-map}
32
32
extraEnvs:
33
33
secrets:
34
-
- name: {my-product-secrets}
34
+
- name: `_<my_product_secrets>_`
35
35
extraFiles:
36
36
mountPath: /opt/app-root/src
37
37
replicas: 1
@@ -60,7 +60,7 @@ spec:
60
60
dynamicPluginsConfigMapName: dynamic-plugins-rhdh
61
61
extraEnvs:
62
62
secrets:
63
-
- name: {my-product-secrets}
63
+
- name: `_<my_product_secrets>_`
64
64
- name: {my-product-database-secrets}
65
65
extraFiles:
66
66
mountPath: /opt/app-root/src
@@ -136,31 +136,36 @@ spec:
136
136
`spec.application.extraEnvs.secrets`:::
137
137
Enter your environment variables secret name list.
138
138
+
139
-
.Inject the environment variables in your `{my-product-secrets}` secret
139
+
.Inject the environment variables in your {product} secret
140
140
====
141
141
[source,yaml,subs="+attributes,+quotes"]
142
142
----
143
143
spec:
144
144
application:
145
145
extraEnvs:
146
146
secrets:
147
-
- name: {my-product-secrets}
147
+
- name: `_<my_product_secrets>_`
148
148
----
149
149
====
150
150
+
151
-
.Inject the environment variables in the `{my-product-secrets}` and `{my-product-database-secrets}` secrets
151
+
.Inject the environment variables in the {product} and `{my-product-database-secrets}` secrets
152
152
====
153
153
[source,yaml,subs="+attributes,+quotes"]
154
154
----
155
155
spec:
156
156
application:
157
157
extraEnvs:
158
158
secrets:
159
-
- name: {my-product-secrets}
159
+
- name: `_<my_product_secrets>_`
160
160
- name: {my-product-database-secrets}
161
161
----
162
162
====
163
163
164
+
[NOTE]
165
+
====
166
+
`_<my_product_secrets>_` is your preferred {product-short} secret name, specifying the identifier for your secret configuration within {product-short}.
167
+
====
168
+
164
169
`spec.application.extraFiles.secrets`:::
165
170
Enter your certificates files secret name and files list.
Copy file name to clipboardexpand all lines: modules/customizing/proc-customizing-the-backend-secret.adoc
+4-5
Original file line number
Diff line number
Diff line change
@@ -10,16 +10,15 @@ You can define your custom {product-short} backend secret.
10
10
11
11
.Procedure
12
12
13
-
. To define the {product-short} backend secret,
14
-
add to your custom `{my-product-secrets}.txt` file the `BACKEND_SECRET` environment variable with a base64 encoded string.
13
+
. To define the {product-short} backend secret, add to your custom `_<my_product_secrets>_.txt` file the `BACKEND_SECRET` environment variable with a base64 encoded string.
15
14
Use a unique value for each {product-short} instance.
Copy file name to clipboardexpand all lines: modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc
+2-2
Original file line number
Diff line number
Diff line change
@@ -119,8 +119,8 @@ data:
119
119
<1> The base URL to the Kubernetes control plane. You can run the `kubectl cluster-info` command to get the base URL.
120
120
<2> Set the value of this parameter to `false` to enable the verification of the TLS certificate.
121
121
<3> Optional: The link to the Kubernetes dashboard managing the ARO cluster.
122
-
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you can define in your {my-product-secrets} secret.
123
-
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you can define in your {my-product-secrets} secret.
122
+
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you define in your `_<my_product_secrets>_` secret.
123
+
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you define in your `_<my_product_secrets>_` secret.
Copy file name to clipboardexpand all lines: modules/installation/proc-deploy-rhdh-instance-eks.adoc
+5-3
Original file line number
Diff line number
Diff line change
@@ -44,19 +44,20 @@ data:
44
44
----
45
45
--
46
46
47
-
. Create a Secret named `{my-product-secrets}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
47
+
. Create a {product} secret and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
48
48
+
49
49
--
50
50
[source,yaml,subs="+attributes,+quotes"]
51
51
----
52
52
apiVersion: v1
53
53
kind: Secret
54
54
metadata:
55
-
name: {my-product-secrets}
55
+
name: `_<my_product_secrets>_` <1>
56
56
stringData:
57
57
# TODO: See https://backstage.io/docs/auth/service-to-service-auth/#setup
58
58
BACKEND_SECRET: "xxx"
59
59
----
60
+
<1> `_<my_product_secrets>_` is your preferred {product-short} secret name, where `_<my_product_secrets>_` specifies the unique identifier for your secret configuration within {product-short}.
60
61
61
62
[IMPORTANT]
62
63
====
@@ -103,8 +104,9 @@ spec:
103
104
- name: "app-config-rhdh"
104
105
extraEnvs:
105
106
secrets:
106
-
- name: {my-product-secrets}
107
+
- name: `_<my_product_secrets>_` <1>
107
108
----
109
+
<1> `_<my_product_secrets>_` is your preferred {product-short} secret name, where `_<my_product_secrets>_` specifies the identifier for your secret configuration within {product-short}.
108
110
--
109
111
110
112
. Create an Ingress resource using the following template, ensuring to customize the names as needed:
Copy file name to clipboardexpand all lines: modules/installation/proc-deploy-rhdh-instance-gke.adoc
+8-8
Original file line number
Diff line number
Diff line change
@@ -45,20 +45,20 @@ data:
45
45
----
46
46
--
47
47
48
-
. Create a Secret named {my-product-secret} and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
48
+
. Create a `_<my_product_secrets>_` secret and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
49
49
+
50
50
--
51
-
.{my-product-secrets} fragment
52
-
[source,yaml]
51
+
[source,yaml,subs="+quotes,+attributes"]
53
52
----
54
53
apiVersion: v1
55
54
kind: Secret
56
55
metadata:
57
-
name: {my-product-secret}
56
+
name: `_<my_product_secrets>_` <1>
58
57
stringData:
59
58
# TODO: See https://backstage.io/docs/auth/service-to-service-auth/#setup
60
59
BACKEND_SECRET: "xxx"
61
60
----
61
+
<1> `_<my_product_secrets>_` is your preferred {product-short} secret name, where `_<my_product_secrets>_` specifies the identifier for your secret configuration within {product-short}.
<1> `_<my_product_secrets>_` is your preferred {product-short} secret name, where `_<my_product_secrets>_` specifies the identifier for your secret configuration within {product-short}.
111
112
--
112
113
113
-
. Set up a Google-managed certificate by creating a `ManagedCertificate` object which you must attach to the Ingress.
114
+
. Set up a Google-managed certificate by creating a `ManagedCertificate` object which you must attach to the Ingress as shown in the following example:
Copy file name to clipboardexpand all lines: modules/installation/proc-rhdh-deploy-aks-operator.adoc
+7-5
Original file line number
Diff line number
Diff line change
@@ -114,24 +114,25 @@ data:
114
114
----
115
115
--
116
116
117
-
. Create a Secret named {my-product-secrets} and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
117
+
. Create a `_<my_product_secrets>_` secret and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
118
118
+
119
119
--
120
-
[source,yaml]
120
+
[source,yaml,subs="+attributes,+quotes"]
121
121
----
122
122
apiVersion: v1
123
123
kind: Secret
124
124
metadata:
125
-
name: {my-product-secret}
125
+
name: `_<my_product_secrets>_` <1>
126
126
stringData:
127
127
BACKEND_SECRET: "xxx"
128
128
----
129
+
<1> `_<my_product_secrets>_` is your preferred {product-short} secret name, where `_<my_product_secrets>_` specifies the identifier for your secret configuration within {product-short}.
129
130
--
130
131
131
132
. Create your `{product-custom-resource-type}` custom resource (CR) manifest file named `rhdh.yaml` and include the previously created `rhdh-pull-secret` as follows:
132
133
+
133
134
--
134
-
[source,yaml]
135
+
[source,yaml,subs="+attributes,+quotes"]
135
136
----
136
137
apiVersion: rhdh.redhat.com/v1alpha3
137
138
kind: Backstage
@@ -146,8 +147,9 @@ spec:
146
147
- name: "app-config-rhdh"
147
148
extraEnvs:
148
149
secrets:
149
-
- name: {my-product-secret}
150
+
- name: `_<my_product_secrets>_` <1>
150
151
----
152
+
<1> `_<my_product_secrets>_` is your preferred {product-short} secret name, where `_<my_product_secrets>_` specifies the identifier for your secret configuration within {product-short}.
0 commit comments