You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Installing {product-short} on {platform-long} by using the Operator
5
+
6
+
To benefit from over-the-air updates and catalogs provided by Operator-based applications distributed with the Operator Lifecycle Manager (OLM) framework, consider installing {product} by using the {product} Operator distributed in the {company-name} Ecosystem.
7
+
8
+
On {platform}, the most notable differences over an OpenShift-based installation are:
9
+
10
+
* The OLM framework and the {company-name} Ecosystem are not built-in.
11
+
* The {company-name} Ecosystem pull-secret is not managed globally.
12
+
* To expose the application, Ingresses replace OpenShift Routes.
13
+
14
+
For clarity, the content is broken down in sections highlighting these platform-specific additional steps.
= Provisioning your custom {product} configuration
3
3
4
-
To configure {product}, provision your custom {product} config maps and secrets to {ocp-brand-name} before running {product}.
4
+
To configure {product}, provision your custom {product} config maps and secrets to {platform-long} before running {product}.
5
5
6
6
[TIP]
7
7
====
8
-
You can skip this step to run {product-short} with the default config map and secret.
8
+
On {ocp-brand-name}, you can skip this step to run {product-short} with the default config map and secret.
9
9
Your changes on this configuration might get reverted on {product-short} restart.
10
10
====
11
11
12
12
.Prerequisites
13
-
* By using the {ocp-docs-link}/html-single/cli_tools/index#cli-about-cli_cli-developer-commands[{openshift-cli}], you have access, with developer permissions, to the {ocp-short} cluster aimed at containing your {product-short} instance.
13
+
* By using the {platform-cli-link}, you have access, with developer permissions, to the {platform-generic} cluster aimed at containing your {product-short} instance.
14
14
15
15
.Procedure
16
-
. Author your custom `_<my_product_secrets>_.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
16
+
. Author your custom `_<my_product_secrets>_.txt` file to provision your secrets as environment variables values in {a-platform-generic} secret,
17
+
rather than in clear text in your configuration files.
17
18
It contains one secret per line in `KEY=value` form.
18
19
+
19
20
* {authentication-book-link}[Enter your authentication secrets].
@@ -23,7 +24,7 @@ This is the main {product-short} configuration file.
23
24
You need a custom `{my-app-config-file}` file to avoid the {product-short} installer to revert user edits during upgrades.
24
25
When your custom `{my-app-config-file}` file is empty, {product-short} is using default values.
25
26
26
-
** To prepare a deployment with the {product} Operator on {ocp-short}, you can start with an empty file.
27
+
** To prepare a deployment with the {product} Operator on {platform}, you can start with an empty file.
27
28
28
29
** To prepare a deployment with the {product} Helm chart, or on Kubernetes, enter the {product-short} base URL in the relevant fields in your `{my-app-config-file}` file to ensure proper functionality of {product-short}.
29
30
The base URL is what a {product-short} user sees in their browser when accessing {product-short}.
*** xref:proc-configuring-an-rhdh-instance-with-tls-in-kubernetes_running-behind-a-proxy[Configure your {ocp-short} integration].
59
59
60
-
. Provision your custom configuration files to your {ocp-short} cluster.
60
+
. Provision your custom configuration files to your {platform} cluster.
61
61
62
-
.. Create the _<{my-product-namespace}>_ project aimed at containing your {product-short} instance.
62
+
.. Create the _<{my-product-namespace}>_ {namespace} aimed at containing your {product-short} instance.
63
63
+
64
64
[source,terminal,subs="+attributes,+quotes"]
65
65
----
66
66
$ oc create namespace {my-product-namespace}
67
67
----
68
-
+
69
-
Alternatively, {ocp-docs-link}/html-single/building_applications/index#creating-a-project-using-the-web-console_projects[create the project by using the web console].
70
68
71
69
.. Provision your `{my-app-config-file}` file to the `{my-app-config-config-map}` config map in the _<{my-product-namespace}>_ project.
Alternatively, {ocp-docs-link}/html-single/nodes/index#nnodes-pods-configmap-create-from-console_configmaps[create the config map by using the web console].
79
75
80
76
.. Provision your `_<my_product_secrets>_.txt` file to the `_<my_product_secrets>_` secret in the _<{my-product-namespace}>_ project.
{ocp-docs-link}/html-single/nodes/index#nodes-pods-secrets-creating-web-console-secrets_nodes-pods-secrets[create the secret by using the web console].
89
-
90
-
[NOTE]
91
-
====
92
-
`_<my_product_secrets>_` is your preferred {product-short} secret name, specifying the identifier for your secret configuration within {product-short}.
93
-
====
94
82
95
83
.Next steps
96
-
Consider provisioning additional config maps and secrets:
97
-
98
-
* To use an external PostgreSQL database, xref:configuring-external-postgresql-databases[provision your PostgreSQL database secrets].
99
-
100
-
84
+
* To use an external PostgreSQL database, {configuring-book-link}configuring-external-postgresql-databases[provision your PostgreSQL database secrets].
101
85
* To enable dynamic plugins, {installing-and-viewing-plugins-book-link}[provision your dynamic plugins config map].
102
-
103
86
* To configure authorization by using external files, {authorization-book-link}#managing-authorizations-by-using-external-files[provision your RBAC policies config map].
= Using the {product} Operator to run {product-short} with your custom configuration
3
5
@@ -7,16 +9,16 @@ To use the {product-short} Operator to run {product} with your custom configurat
7
9
* Injects environment variables provisioned in your custom secrets.
8
10
9
11
.Prerequisites
10
-
* By using the {ocp-docs-link}/html-single/cli_tools/index#cli-about-cli_cli-developer-commands[{openshift-cli}], you have access, with developer permissions, to the {ocp-short} cluster aimed at containing your {product-short} instance.
11
-
* {installing-on-ocp-book-link}[Your {ocp-short} administrator has installed the {product} Operator in {ocp-short}].
12
-
* xref:provisioning-your-custom-configuration[You have provisioned your custom config maps and secrets in your `_<{my-product-namespace}>_` project].
12
+
* By using the {platform-cli-link}, you have access, with developer permissions, to the {platform} cluster aimed at containing your {product-short} instance.
13
+
* Your administrator has installed the {product} Operator in the cluster.
14
+
* You have provisioned your custom config maps and secrets in your `_<{my-product-namespace}>_` project.
13
15
14
16
.Procedure
15
17
16
18
. Author your {product-custom-resource-type} CR in a `{my-product-cr-name}.yaml` file to use your custom config maps and secrets.
17
19
+
18
-
.Minimal `{my-product-cr-name}.yaml` custom resource example
.`{my-product-cr-name}.yaml` custom resource example with dynamic plugins and RBAC policies config maps, and external PostgreSQL database secrets.
45
-
====
45
+
`{my-product-cr-name}.yaml` custom resource example with dynamic plugins and RBAC policies config maps, and external PostgreSQL database secrets:
46
+
+
46
47
[source,yaml,subs="+attributes,+quotes"]
47
48
----
48
49
apiVersion: rhdh.redhat.com/v1alpha3
@@ -71,21 +72,19 @@ spec:
71
72
database:
72
73
enableLocalDb: false
73
74
----
74
-
====
75
75
76
76
Mandatory fields::
77
77
78
78
No fields are mandatory.
79
-
You can create an empty {product-custom-resource-type} CR
80
-
and run {product-short} with the default configuration.
79
+
You can create an empty {product-custom-resource-type} CR and run {product-short} with the default configuration.
81
80
82
81
Optional fields::
83
82
84
83
`spec.application.appConfig.configMaps`:::
85
84
Enter your config map name list.
86
85
+
87
-
.Mount files in the `{my-app-config-config-map}` config map.
88
-
====
86
+
Mount files in the `{my-app-config-config-map}` config map:
87
+
+
89
88
[source,yaml,subs="+attributes,+quotes"]
90
89
----
91
90
spec:
@@ -95,10 +94,9 @@ spec:
95
94
configMaps:
96
95
- name: {my-app-config-config-map}
97
96
----
98
-
====
99
97
+
100
-
.Mount files in the `{my-app-config-config-map}` and `rbac-policies` config maps.
101
-
====
98
+
Mount files in the `{my-app-config-config-map}` and `rbac-policies` config maps:
99
+
+
102
100
[source,yaml,subs="+attributes,+quotes"]
103
101
----
104
102
spec:
@@ -109,13 +107,12 @@ spec:
109
107
- name: {my-app-config-config-map}
110
108
- name: rbac-policies
111
109
----
112
-
====
113
110
114
111
`spec.application.extraEnvs.envs`:::
115
-
Optionally, enter your additional environment variables that are not secrets, such as xref:proc-configuring-proxy-in-operator-deployment_running-behind-a-proxy[your proxy environment variables].
112
+
Optionally, enter your additional environment variables that are not secrets, such as {configuring-book-link}#proc-configuring-proxy-in-operator-deployment_running-behind-a-proxy[your proxy environment variables].
113
+
+
114
+
Inject your `HTTP_PROXY`, `HTTPS_PROXY` and `NO_PROXY` environment variables:
116
115
+
117
-
.Inject your `HTTP_PROXY`, `HTTPS_PROXY` and `NO_PROXY` environment variables.
118
-
====
119
116
[source,yaml,subs="+attributes,+quotes"]
120
117
----
121
118
spec:
@@ -129,13 +126,12 @@ spec:
129
126
- name: NO_PROXY
130
127
value: 'localhost,example.org'
131
128
----
132
-
====
133
129
134
130
`spec.application.extraEnvs.secrets`:::
135
131
Enter your environment variables secret name list.
136
132
+
137
-
.Inject the environment variables in your {product} secret
138
-
====
133
+
Inject the environment variables in your {product} secret:
134
+
+
139
135
[source,yaml,subs="+attributes,+quotes"]
140
136
----
141
137
spec:
@@ -144,10 +140,9 @@ spec:
144
140
secrets:
145
141
- name: _<my_product_secrets>_
146
142
----
147
-
====
148
143
+
149
-
.Inject the environment variables in the {product} and `{my-product-database-secrets}` secrets
150
-
====
144
+
Inject the environment variables in the {product} and `{my-product-database-secrets}` secrets:
145
+
+
151
146
[source,yaml,subs="+attributes,+quotes"]
152
147
----
153
148
spec:
@@ -157,7 +152,7 @@ spec:
157
152
- name: _<my_product_secrets>_
158
153
- name: {my-product-database-secrets}
159
154
----
160
-
====
155
+
+
161
156
162
157
[NOTE]
163
158
====
@@ -167,7 +162,8 @@ spec:
167
162
`spec.application.extraFiles.secrets`:::
168
163
Enter your certificates files secret name and files list.
169
164
+
170
-
.Mount the `postgres-crt.pem`, `postgres-ca.pem`, and `postgres-key.key` files contained in the `{my-product-database-certificates-secrets}` secret
165
+
Mount the `postgres-crt.pem`, `postgres-ca.pem`, and `postgres-key.key` files contained in the `{my-product-database-certificates-secrets}` secret:
166
+
+
171
167
[source,yaml,subs="+attributes,+quotes"]
172
168
----
173
169
spec:
@@ -182,15 +178,17 @@ spec:
182
178
`spec.database.enableLocalDb`:::
183
179
Enable or disable the local PostgreSQL database.
184
180
+
185
-
.Disable the local PostgreSQL database generation to use an external postgreSQL database
181
+
Disable the local PostgreSQL database generation to use an external postgreSQL database:
182
+
+
186
183
[source,yaml,subs="+attributes,+quotes"]
187
184
----
188
185
spec:
189
186
database:
190
187
enableLocalDb: false
191
188
----
192
189
+
193
-
.On a development environment, use the local PostgreSQL database
190
+
On a development environment, use the local PostgreSQL database:
191
+
+
194
192
[source,yaml,subs="+attributes,+quotes"]
195
193
----
196
194
spec:
@@ -199,9 +197,9 @@ spec:
199
197
----
200
198
201
199
`spec.deployment`:::
202
-
Optionally, xref:configuring-the-deployment[enter your deployment configuration].
200
+
Optionally, {configuring-book-link}#configuring-the-deployment[enter your deployment configuration].
203
201
204
-
. Apply your {product-custom-resource-type} CR to start or update your {product-short} instance.
202
+
. Apply your {product-custom-resource-type} CR to start or update your {product-short} instance:
0 commit comments