You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
. In the custom resource, enter the name of the custom application configuration config map as the value for the `spec.application.appConfig.configMaps` field, and enter the name of your secret as the value for the `spec.application.extraEnvs.secrets` field. For example:
Copy file name to clipboardExpand all lines: modules/configuring/proc-provisioning-your-custom-configuration.adoc
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,7 @@ Your changes on this configuration might get reverted on {product-short} restart
11
11
12
12
.Prerequisites
13
13
* By using the link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/cli_tools/index#cli-about-cli_cli-developer-commands[{openshift-cli}], you have access, with developer permissions, to the {ocp-short} cluster aimed at containing your {product-short} instance.
14
+
14
15
* You know your desired {product-short} external URL: pass:c,a,q[{my-product-url}].
15
16
+
16
17
[TIP]
@@ -24,18 +25,18 @@ To identify your {product-short} external URL:
24
25
25
26
26
27
.Procedure
27
-
. Author your custom `secrets.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
28
+
. Author your custom `{my-product-secrets}.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
28
29
It contains one secret per line in `KEY=value` form.
29
30
30
31
.. To define the {product-short} backend secret, add the `BACKEND_SECRET` environment variable with a base64 encoded string.
31
32
Use a unique value for each {product-short} instance.
Alternatively, link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/building_applications/index#creating-a-project-using-the-web-console_projects[create the project by using the web console].
156
157
157
-
.. Provision your `app-config.yaml` file to the `app-config` config map.
158
+
.. Provision your `{my-{my-app-config-config-map}-file}` file to the `{my-app-config-config-map}` config map in the _<{my-product-namespace}>_ project.
Alternatively, link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/nodes/index#nnodes-pods-configmap-create-from-console_configmaps[create the config map by using the web console].
165
166
166
-
.. Provision your `secrets.txt` to the `my-rhdh-secrets` secret.
167
+
.. Provision your `{my-product-secrets}.txt` file to the `{my-product-secrets}` secret in the _<{my-product-namespace}>_ project.
link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/nodes/index#nodes-pods-secrets-creating-web-console-secrets_nodes-pods-secrets[create the secret by using the web console].
175
176
176
177
.Next steps
177
-
178
178
Consider provisioning additional config maps and secrets:
179
179
180
180
* To use an external PostgreSQL database, xref:configuring-external-postgresql-databases[provision your PostgreSQL database secrets].
On a development environment, consider skipping this step and using the internal PostgreSQL database.
185
185
====
186
186
187
-
* To enable dynamic plugins, link:{installing-and-viewing-dynamic-plugins-url}[provision the dynamic plugins config map].
187
+
* To enable dynamic plugins, link:{installing-and-viewing-dynamic-plugins-url}[provision your dynamic plugins config map].
188
188
189
-
* To configure authorization by using external files, link:{authorization-book-url}#managing-authorizations-by-using-external-files[provision the RBAC policies config map].
189
+
* To configure authorization by using external files, link:{authorization-book-url}#managing-authorizations-by-using-external-files[provision your RBAC policies config map].
= Using the{product}Helm chart to run {product-short} with your custom configuration
3
3
4
4
You can use the {product} Helm chart to add a custom application configuration file to your {ocp-short} instance.
5
5
6
6
.Prerequisites
7
7
8
-
* By using the {ocp-short} web console, you have access with developer permissions, to link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/building_applications/index#working-with-projects[an {ocp-short} project] named _<{product-very-short}>_, aimed at containing your {product-short} instance.
9
-
* xref:provisioning-your-custom-configuration[You have uploaded your custom configuration files and secrets in your `_<{product-very-short}>_` project].
8
+
* By using the {ocp-short} web console, you have access with developer permissions, to link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/building_applications/index#working-with-projects[an {ocp-short} project] named _<{my-product-namespace}>_, aimed at containing your {product-short} instance.
9
+
* xref:provisioning-your-custom-configuration[You have uploaded your custom configuration files and secrets in your `_<{my-product-namespace}>_` project].
10
10
11
11
.Procedure
12
12
@@ -17,13 +17,13 @@ You can use the {product} Helm chart to add a custom application configuration f
17
17
.. Set the value of the `upstream.backstage.extraAppConfig.configMapRef` and `upstream.backstage.extraAppConfig.filename` parameters as follows:
0 commit comments