Skip to content

Commit d91752a

Browse files
committed
Added content
1 parent 0105347 commit d91752a

5 files changed

+53
-3
lines changed
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
:context: readonlyrootfilesystem
3+
[id="{context}"]
4+
= Configuring readOnlyRootFilesystem in {product}
5+
6+
The {product} deployment consists of two containers, an initContainer that installs the Dynamic Plugins, and a backend container which runs the application. The initContainer has the `readOnlyRootFilesystem` option enabled by default, and you can manually configure the `readOnlyRootFilesystem` option on the backend container using the following methods. To enable this option, you must have `platform administrator` permissions so that you can modify the configuration and redeploy.
7+
8+
9+
include::modules/configuring-readonlyrootfilesystem/proc-configuring-readonlyrootfilesystem-option-in-rhdh-operator-deployment.adoc[leveloffset=+1]
10+
11+
include::modules/configuring-readonlyrootfilesystem/proc-configuring-readonlyrootfilesystem-option-in-rhdh-helm-chart-deployment.adoc[leveloffset=+1]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
[id="proc-configuring-readonlyrootfilesystem-option-in-rhdh-helm-chart-deployment"]
2+
= Configuring the readOnlyRootFilesystem option in a {product} Helm chart deployment
3+
4+
.Procedure
5+
. When you are deploying {product-short} using the Helm chart, add the `readOnlyFilesystem: true` line to the `containerSecurityContext` section in your values.yaml file. For example:
6+
+
7+
====
8+
[source,yaml,subs="+attributes,+quotes"]
9+
----
10+
upstream:
11+
backstage:
12+
containerSecurityContext:
13+
readOnlyRootFilesystem: true
14+
----
15+
====
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
[id="proc-configuring-readonlyrootfilesystem-option-in-rhdh-operator-deployment"]
2+
= Configuring the readOnlyRootFilesystem option in a {product} Operator deployment
3+
4+
When you are deploying {product-short} using the Operator, specify a `patch` for the `deployment` in your `{product-custom-resource-type}` custom resource (CR) that applies the `readOnlyRootFilesystem` option to the `securityContext` section in the {product-short} backend container.
5+
6+
.Procedure
7+
8+
. Add the `securityContext` specification in your CR. For example:
9+
+
10+
====
11+
[source,yaml,subs="+attributes,+quotes"]
12+
----
13+
spec:
14+
deployment:
15+
patch:
16+
spec:
17+
template:
18+
spec:
19+
containers:
20+
- name: backstage-backend
21+
securityContext:
22+
readOnlyRootFilesystem: true
23+
----
24+
====

modules/configuring/proc-mounting-additional-files-in-your-custom-configuration-using-rhdh-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ The `mountPath` field specifies the location where a ConfigMap or Secret is moun
1111

1212
[NOTE]
1313
====
14-
* {ocp-short} does not automatically update a volume mounted with `subPath`. By default, the {product-very-short} operator monitors these ConfigMaps or Secrets and refreshes the {product-very-short} Pod when changes occur.
14+
* {ocp-short} does not automatically update a volume mounted with `subPath`. By default, the {product-very-short} Operator monitors these ConfigMaps or Secrets and refreshes the {product-very-short} Pod when changes occur.
1515
* For security purposes, {product} does not give the Operator Service Account read access to Secrets. As a result, mounting files from Secrets without specifying both mountPath and key is not supported.
1616
====
1717

modules/configuring/proc-using-the-operator-to-run-rhdh-with-your-custom-configuration.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[id="using-the-operator-to-run-rhdh-with-your-custom-configuration"]
2-
= Using the {product} operator to run {product-short} with your custom configuration
2+
= Using the {product} Operator to run {product-short} with your custom configuration
33

4-
To use the {product-short} operator to run {product} with your custom configuration, create your {product-custom-resource-type} custom resource (CR) that:
4+
To use the {product-short} Operator to run {product} with your custom configuration, create your {product-custom-resource-type} custom resource (CR) that:
55

66
* Mounts files provisioned in your custom config maps.
77
* Injects environment variables provisioned in your custom secrets.

0 commit comments

Comments
 (0)