You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: artifacts/rhdh-plugins-reference/keycloak/keycloak-plugin-readme.adoc
+4-32
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,7 @@ The Keycloak backend plugin, which integrates Keycloak into {product-short}, has
6
6
* Synchronization of Keycloak users in a realm.
7
7
* Synchronization of Keycloak groups and their users in a realm.
8
8
9
-
== For administrators
10
-
11
-
=== Installation
9
+
== Installation
12
10
13
11
The Keycloak plugin is pre-loaded in {product-short} with basic configuration properties. To enable it, set the `disabled` property to `false` as follows:
14
12
@@ -23,7 +21,7 @@ global:
23
21
disabled: false
24
22
----
25
23
26
-
=== Basic configuration
24
+
== Basic configuration
27
25
To enable the Keycloak plugin, you must set the following environment variables:
28
26
29
27
* `KEYCLOAK_BASE_URL`
@@ -36,7 +34,7 @@ To enable the Keycloak plugin, you must set the following environment variables:
36
34
37
35
* `KEYCLOAK_CLIENT_SECRET`
38
36
39
-
=== Advanced configuration
37
+
== Advanced configuration
40
38
41
39
.Schedule configuration
42
40
You can configure a schedule in the `app-config.yaml` file, as follows:
@@ -140,7 +138,7 @@ When using client credentials, the access type must be set to `confidential` and
140
138
* `query-users`
141
139
* `view-users`
142
140
143
-
=== Limitations
141
+
== Limitations
144
142
145
143
If you have self-signed or corporate certificate issues, you can set the following environment variable before starting {product-short}:
146
144
@@ -152,29 +150,3 @@ If you have self-signed or corporate certificate issues, you can set the followi
152
150
The solution of setting the environment variable is not recommended.
153
151
====
154
152
155
-
== For users
156
-
157
-
=== Import of users and groups in {product-short} using the Keycloak plugin
158
-
159
-
After configuring the plugin successfully, the plugin imports the users and groups each time when started.
160
-
161
-
[NOTE]
162
-
====
163
-
If you set up a schedule, users and groups will also be imported.
164
-
====
165
-
166
-
After the first import is complete, you can select *User* to list the users from the catalog page:
Copy file name to clipboardExpand all lines: assemblies/assembly-authenticating-with-rhbk.adoc
-5
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,6 @@
1
1
[id="assembly-authenticating-with-rhbk"]
2
2
= Authenticating with {rhbk-brand-name} ({rhbk})
3
3
4
-
[NOTE]
5
-
====
6
-
{rhsso} 7.6 is deprecated as an authentication provider. You can continue using {rhsso} until the end of its maintenance support. For more information, see link:https://access.redhat.com/support/policy/updates/jboss_notes#p_sso[{rhsso} lifecycle dates]. As an alternative, consider migrating to {rhbk-brand-name} ({rhbk}).
7
-
====
8
-
9
4
To authenticate users with {rhbk-brand-name} ({rhbk}):
10
5
11
6
. xref:enabling-authentication-with-rhbk[Enable the OpenID Connect (OIDC) authentication provider in RHDH].
You can configure Persistent Volume Claims (PVCs) and Secrets mount in your {product} deployment. Use annotations to define the custom mount paths and specify the containers to mount them to.
Copy file name to clipboardExpand all lines: assemblies/assembly-configuring-high-availability.adoc
+11-3
Original file line number
Diff line number
Diff line change
@@ -3,11 +3,19 @@
3
3
[id="{context}"]
4
4
= Configuring high availability in {product}
5
5
6
-
Previously, {product} supports a single-instance application. With this configuration, if the instance fails due to software crashes, hardware issues, or other unexpected disruptions, the entire {product} service becomes unavailable, preventing the development workflows or access to the resources. With high availability, you receive a failover mechanism that ensures the service is available even if one or more components fail. By increasing the number of replicas, you introduce redundancy to help increase higher productivity and minimize disruption.
7
6
8
-
As an administrator, you can configure high availability in {product}. Once you set the high availability option in {product-short}, the {ocp-brand-name} built-in Load Balancer manages the ingress traffic and distributes the load to each pod. The {product-very-short} backend also manages concurrent requests or conflicts on the same resource.
7
+
High availability (HA) is a system design approach that ensures a service remains continuously accessible, even during failures of individual components, by eliminating single points of failure. It introduces redundancy and failover mechanisms to minimize downtime and maintain operational continuity.
9
8
10
-
You can configure high availability in {product-short} by scaling your `replicas` to a number greater than 1 in your configuration file. The configuration file that you use depends on the method that you used to install your {product-short} instance. If you used the Operator to install your {product-short} instance, configure the replica values in your `{product-custom-resource-type}` custom resource. If you used the Helm chart to install your {product-short} instance, configure the replica values in your Helm chart.
9
+
{product} supports HA deployments on {ocp-brand-name} and {aks-name}. The HA deployments enable more resilient and reliable service availability across supported environments.
10
+
11
+
In a single instance deployment, if a failure occurs, whether due to software crashes, hardware issues, or other unexpected disruptions, it would make the entire service unavailable, interrupting development workflows and access to key resources.
12
+
13
+
With HA enabled, you can scale the number of backend replicas to introduce redundancy. This setup ensures that if one pod or component fails, others continue to serve requests without disruption. The built-in load balancer manages ingress traffic and distributes the load across the available pods. Meanwhile, the {product-very-short} backend manages concurrent requests and resolves resource-level conflicts effectively.
14
+
15
+
As an administrator, you can configure high availability by adjusting replica values in your configuration file:
16
+
17
+
* If you installed using the Operator, configure the replica values in your `{product-custom-resource-type}` custom resource.
18
+
* If you used the Helm chart, set the replica values in the Helm configuration.
Copy file name to clipboardExpand all lines: assemblies/assembly-configuring-the-global-header.adoc
+1-1
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@
6
6
As an administrator, you can configure the {product} global header to create a consistent and flexible navigation bar across your {product-short} instance.
7
7
By default, the {product-short} global header includes the following components:
8
8
9
-
* *Create* button provides quick access to a variety of templates, enabling users to efficiently set up services, backend and front-end plugins within {product-short}
9
+
* *Self-service* button provides quick access to a variety of templates, enabling users to efficiently set up services, backend and front-end plugins within {product-short}
10
10
* *Support* button that can link an internal or external support page
11
11
* *Notifications* button displays alerts and updates from plugins and external services
12
12
* *Search* input field allows users to find services, components, documentation, and other resources within {product-short}
In {product}, the Tech Radar page is provided by the `tech-radar` dynamic plugin, which is disabled by default. For information about enabling dynamic plugins in {product} see link:{configuring-dynamic-plugins-book-url}[{configuring-dynamic-plugins-book-title}].
5
+
6
+
In {product}, you can configure Learning Paths by passing the data into the `{my-app-config-file}` file as a proxy. The base Tech Radar URL must include the `/developer-hub/tech-radar` proxy.
7
+
8
+
[NOTE]
9
+
====
10
+
Due to the use of overlapping `pathRewrites` for both the `tech-radar` and `homepage` quick access proxies, you must create the `tech-radar` configuration (`^api/proxy/developer-hub/tech-radar`) before you create the `homepage` configuration (`^/api/proxy/developer-hub`).
11
+
12
+
For more information about customizing the Home page in {product}, see xref:customizing-the-home-page[Customizing the Home page in {product}].
13
+
====
14
+
15
+
You can provide data to the Tech Radar page from the following sources:
16
+
17
+
* JSON files hosted on GitHub or GitLab.
18
+
* A dedicated service that provides the Tech Radar data in JSON format using an API.
You can configure {product} to use Amazon Prometheus for comprehensive logging.
5
+
Amazon Prometheus extracts data from pods that have specific pod annotations.
6
+
7
+
== Prerequisites
8
+
9
+
* You link:https://docs.aws.amazon.com/eks/latest/userguide/prometheus.htm[configured Prometheus for your {eks-name} ({eks-short}) clusters].
10
+
* You link:https://docs.aws.amazon.com/prometheus/latest/userguide/AMP-onboard-create-workspace.html[created an Amazon managed service for the Prometheus workspace].
11
+
* You link:https://docs.aws.amazon.com/prometheus/latest/userguide/AMP-onboard-ingest-metrics.html[configured Prometheus to import the {product-short} metrics].
12
+
* You ingested Prometheus metrics into the created workspace.
After an administrator configures the TechDocs plugin, a developer can add documentation to TechDocs by importing it from a remote repository. Any authorized user or group can access the documentation that is imported into the TechDocs plugin.
The TechDocs plugin is installed and enabled on your {product} instance by default. After an administrator configures the TechDocs plugin, an authorized developer can use the TechDocs plugin to add, view, or manage documentation.
0 commit comments