Skip to content

Commit fc32301

Browse files
[1.3.x] RHIDP 3484-01-Global-Fix-of-Source-Tags (#477)
Co-authored-by: jmagak <[email protected]>
1 parent 1f0daf5 commit fc32301

File tree

4 files changed

+28
-28
lines changed

4 files changed

+28
-28
lines changed

modules/installation/proc-deploy-rhdh-instance-eks.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Ensure that you use a unique value of `BACKEND_SECRET` for each {product-short}
6262

6363
You can use the following command to generate a key:
6464

65-
[source]
65+
[source,terminal]
6666
----
6767
node-p'require("crypto").randomBytes(24).toString("base64")'
6868
----
@@ -71,7 +71,7 @@ node-p'require("crypto").randomBytes(24).toString("base64")'
7171
. To enable pulling the PostgreSQL image from the {company-name} Ecosystem Catalog, add the image pull secret in the default service account within the namespace where the {product-short} instance is being deployed:
7272
+
7373
--
74-
[source]
74+
[source,terminal]
7575
----
7676
kubectl patch serviceaccount default \
7777
-p '{"imagePullSecrets": [{"name": "rhdh-pull-secret"}]}' \

modules/installation/proc-rhdh-deploy-aks-helm.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ You can deploy your {product-short} application on {aks-name} ({aks-short}) to a
2020

2121
* *Ingress configuration*: In AKS, configuring ingress is essential for accessing the installed {product-short} instance. Accessing the {product-short} instance requires enabling the Routing add-on, an NGINX-based Ingress Controller, using the following command:
2222
+
23-
[source]
23+
[source,terminal]
2424
----
2525
az aks approuting enable --resource-group <your_ResourceGroup> --name <your_ClusterName>
2626
----
@@ -29,7 +29,7 @@ az aks approuting enable --resource-group <your_ResourceGroup> --name <your_Clus
2929
====
3030
You might need to install the {azure-short} CLI extension `aks-preview`. If the extension is not installed automatically, you might need to install it manually using the following command:
3131
32-
[source]
32+
[source,terminal]
3333
----
3434
az extension add --upgrade -n aks-preview --allow-preview true
3535
----
@@ -94,7 +94,7 @@ You can refer to `--help` for additional options.
9494

9595
. Connect to your cluster by running the following command:
9696
+
97-
[source]
97+
[source,terminal]
9898
----
9999
az aks get-credentials --resource-group <resource_group_name> --name <cluster_name>
100100
----

modules/installation/proc-rhdh-deploy-eks-helm.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ When you install the {product-short} Helm chart in {eks-name} ({eks-short}), it
2121
. Go to your terminal and run the following command to add the Helm chart repository containing the {product-short} chart to your local Helm registry:
2222
+
2323
--
24-
[source]
24+
[source,terminal]
2525
----
2626
helm repo add openshift-helm-charts https://charts.openshift.io/
2727
----
@@ -30,7 +30,7 @@ helm repo add openshift-helm-charts https://charts.openshift.io/
3030
. Create a pull secret using the following command:
3131
+
3232
--
33-
[source]
33+
[source,terminal]
3434
----
3535
kubectl create secret docker-registry rhdh-pull-secret \
3636
--docker-server=registry.redhat.io \
@@ -108,7 +108,7 @@ upstream:
108108
----
109109
. Run the following command in your terminal to deploy {product-short} using the latest version of Helm Chart and using the values.yaml file created in the previous step:
110110
+
111-
[source,subs="attributes+"]
111+
[source,terminal,subs="attributes+"]
112112
----
113113
helm install rhdh \
114114
openshift-helm-charts/redhat-developer-hub \

modules/installation/proc-rhdh-deploy-eks-operator.adoc

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You can install the {product-short} Operator on {eks-short} using the https://ol
2525
. Run the following command in your terminal to create the `rhdh-operator` namespace where the Operator is installed:
2626
+
2727
--
28-
[source]
28+
[source,terminal]
2929
----
3030
kubectl create namespace rhdh-operator
3131
----
@@ -34,7 +34,7 @@ kubectl create namespace rhdh-operator
3434
. Create a pull secret using the following command:
3535
+
3636
--
37-
[source]
37+
[source,terminal]
3838
----
3939
kubectl -n rhdh-operator create secret docker-registry rhdh-pull-secret \
4040
--docker-server=registry.redhat.io \
@@ -53,7 +53,7 @@ The created pull secret is used to pull the {product-short} images from the {com
5353
. Create a `CatalogSource` resource that contains the Operators from the {company-name} Ecosystem:
5454
+
5555
--
56-
[source,subs="attributes+"]
56+
[source,terminal,subs="attributes+"]
5757
----
5858
cat <<EOF | kubectl -n rhdh-operator apply -f -
5959
apiVersion: operators.coreos.com/v1alpha1
@@ -73,7 +73,7 @@ EOF
7373
. Create an `OperatorGroup` resource as follows:
7474
+
7575
--
76-
[source]
76+
[source,terminal]
7777
----
7878
cat <<EOF | kubectl apply -n rhdh-operator -f -
7979
apiVersion: operators.coreos.com/v1
@@ -87,7 +87,7 @@ EOF
8787
. Create a `Subscription` resource using the following code:
8888
+
8989
--
90-
[source,subs="attributes+"]
90+
[source,terminal,subs="attributes+"]
9191
----
9292
cat <<EOF | kubectl apply -n rhdh-operator -f -
9393
apiVersion: operators.coreos.com/v1alpha1
@@ -109,7 +109,7 @@ EOF
109109
. Run the following command to verify that the created Operator is running:
110110
+
111111
--
112-
[source]
112+
[source,terminal]
113113
----
114114
kubectl -n rhdh-operator get pods -w
115115
----
@@ -120,7 +120,7 @@ If the operator pod shows `ImagePullBackOff` status, then you might need permiss
120120
====
121121
You can include the required secret name in the `deployment.spec.template.spec.imagePullSecrets` list and verify the deployment name using `kubectl get deployment -n rhdh-operator` command:
122122
123-
[source]
123+
[source,terminal]
124124
----
125125
kubectl -n rhdh-operator patch deployment \
126126
rhdh.fast --patch '{"spec":{"template":{"spec":{"imagePullSecrets":[{"name":"rhdh-pull-secret"}]}}}}' \
@@ -133,7 +133,7 @@ kubectl -n rhdh-operator patch deployment \
133133
.. Edit the `backstage-default-config` ConfigMap in the `rhdh-operator` namespace using the following command:
134134
+
135135
--
136-
[source]
136+
[source,terminal]
137137
----
138138
kubectl -n rhdh-operator edit configmap backstage-default-config
139139
----
@@ -142,7 +142,7 @@ kubectl -n rhdh-operator edit configmap backstage-default-config
142142
.. Locate the `db-statefulset.yaml` string and add the `fsGroup` to its `spec.template.spec.securityContext`, as shown in the following example:
143143
+
144144
--
145-
[source]
145+
[source,yaml]
146146
----
147147
db-statefulset.yaml: |
148148
apiVersion: apps/v1
@@ -163,7 +163,7 @@ kubectl -n rhdh-operator edit configmap backstage-default-config
163163
.. Locate the `deployment.yaml` string and add the `fsGroup` to its specification, as shown in the following example:
164164
+
165165
--
166-
[source]
166+
[source,yaml]
167167
----
168168
deployment.yaml: |
169169
apiVersion: apps/v1
@@ -181,7 +181,7 @@ kubectl -n rhdh-operator edit configmap backstage-default-config
181181
.. Locate the `service.yaml` string and change the `type` to `NodePort` as follows:
182182
+
183183
--
184-
[source]
184+
[source,yaml]
185185
----
186186
service.yaml: |
187187
apiVersion: v1
@@ -210,7 +210,7 @@ Wait for a few minutes until the changes are automatically applied to the operat
210210
. Clone the Operator repository to your local machine using the following command:
211211
+
212212
--
213-
[source]
213+
[source,terminal]
214214
----
215215
git clone --depth=1 https://github.com/redhat-developer/rhdh-operator.git rhdh-operator && cd rhdh-operator
216216
----
@@ -219,7 +219,7 @@ git clone --depth=1 https://github.com/redhat-developer/rhdh-operator.git rhdh-o
219219
. Run the following command and generate the deployment manifest:
220220
+
221221
--
222-
[source]
222+
[source,terminal]
223223
----
224224
make deployment-manifest
225225
----
@@ -230,7 +230,7 @@ The previous command generates a file named `rhdh-operator-<VERSION>.yaml`, whic
230230
. Run the following command to apply replacements in the generated deployment manifest:
231231
+
232232
--
233-
[source]
233+
[source,terminal]
234234
----
235235
sed -i "s/backstage-operator/rhdh-operator/g" rhdh-operator-*.yaml
236236
sed -i "s/backstage-system/rhdh-operator/g" rhdh-operator-*.yaml
@@ -242,7 +242,7 @@ sed -i "s/backstage-controller-manager/rhdh-controller-manager/g" rhdh-operator-
242242
.. Locate the `db-statefulset.yaml` string and add the `fsGroup` to its `spec.template.spec.securityContext`, as shown in the following example:
243243
+
244244
--
245-
[source]
245+
[source,yaml]
246246
----
247247
db-statefulset.yaml: |
248248
apiVersion: apps/v1
@@ -263,7 +263,7 @@ sed -i "s/backstage-controller-manager/rhdh-controller-manager/g" rhdh-operator-
263263
.. Locate the `deployment.yaml` string and add the `fsGroup` to its specification, as shown in the following example:
264264
+
265265
--
266-
[source]
266+
[source,yaml]
267267
----
268268
deployment.yaml: |
269269
apiVersion: apps/v1
@@ -281,7 +281,7 @@ sed -i "s/backstage-controller-manager/rhdh-controller-manager/g" rhdh-operator-
281281
.. Locate the `service.yaml` string and change the `type` to `NodePort` as follows:
282282
+
283283
--
284-
[source]
284+
[source,yaml]
285285
----
286286
service.yaml: |
287287
apiVersion: v1
@@ -296,7 +296,7 @@ sed -i "s/backstage-controller-manager/rhdh-controller-manager/g" rhdh-operator-
296296
.. Replace the default images with the images that are pulled from the {company-name} Ecosystem:
297297
+
298298
--
299-
[source,subs="attributes+"]
299+
[source,terminal,subs="attributes+"]
300300
----
301301
sed -i "s#gcr.io/kubebuilder/kube-rbac-proxy:.*#registry.redhat.io/openshift4/ose-kube-rbac-proxy:v{ocp-version}#g" rhdh-operator-*.yaml
302302
@@ -349,7 +349,7 @@ spec:
349349
. Apply the manifest to deploy the operator using the following command:
350350
+
351351
--
352-
[source]
352+
[source,terminal]
353353
----
354354
kubectl apply -f rhdh-operator-VERSION.yaml
355355
----
@@ -358,7 +358,7 @@ kubectl apply -f rhdh-operator-VERSION.yaml
358358
. Run the following command to verify that the Operator is running:
359359
+
360360
--
361-
[source]
361+
[source,terminal]
362362
----
363363
kubectl -n rhdh-operator get pods -w
364364
----

0 commit comments

Comments
 (0)