You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
. To enable pulling the PostgreSQL image from the {company-name} Ecosystem Catalog, add the image pull secret in the default service account within the namespace where the {product-short} instance is being deployed:
Copy file name to clipboardExpand all lines: modules/installation/proc-rhdh-deploy-aks-helm.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ You can deploy your {product-short} application on {aks-name} ({aks-short}) to a
20
20
21
21
* *Ingress configuration*: In AKS, configuring ingress is essential for accessing the installed {product-short} instance. Accessing the {product-short} instance requires enabling the Routing add-on, an NGINX-based Ingress Controller, using the following command:
22
22
+
23
-
[source]
23
+
[source,terminal]
24
24
----
25
25
az aks approuting enable --resource-group <your_ResourceGroup> --name <your_ClusterName>
26
26
----
@@ -29,7 +29,7 @@ az aks approuting enable --resource-group <your_ResourceGroup> --name <your_Clus
29
29
====
30
30
You might need to install the {azure-short} CLI extension `aks-preview`. If the extension is not installed automatically, you might need to install it manually using the following command:
31
31
32
-
[source]
32
+
[source,terminal]
33
33
----
34
34
az extension add --upgrade -n aks-preview --allow-preview true
35
35
----
@@ -94,7 +94,7 @@ You can refer to `--help` for additional options.
94
94
95
95
. Connect to your cluster by running the following command:
96
96
+
97
-
[source]
97
+
[source,terminal]
98
98
----
99
99
az aks get-credentials --resource-group <resource_group_name> --name <cluster_name>
. Run the following command in your terminal to deploy {product-short} using the latest version of Helm Chart and using the values.yaml file created in the previous step:
@@ -53,7 +53,7 @@ The created pull secret is used to pull the {product-short} images from the {com
53
53
. Create a `CatalogSource` resource that contains the Operators from the {company-name} Ecosystem:
54
54
+
55
55
--
56
-
[source,subs="attributes+"]
56
+
[source,terminal,subs="attributes+"]
57
57
----
58
58
cat <<EOF | kubectl -n rhdh-operator apply -f -
59
59
apiVersion: operators.coreos.com/v1alpha1
@@ -73,7 +73,7 @@ EOF
73
73
. Create an `OperatorGroup` resource as follows:
74
74
+
75
75
--
76
-
[source]
76
+
[source,terminal]
77
77
----
78
78
cat <<EOF | kubectl apply -n rhdh-operator -f -
79
79
apiVersion: operators.coreos.com/v1
@@ -87,7 +87,7 @@ EOF
87
87
. Create a `Subscription` resource using the following code:
88
88
+
89
89
--
90
-
[source,subs="attributes+"]
90
+
[source,terminal,subs="attributes+"]
91
91
----
92
92
cat <<EOF | kubectl apply -n rhdh-operator -f -
93
93
apiVersion: operators.coreos.com/v1alpha1
@@ -109,7 +109,7 @@ EOF
109
109
. Run the following command to verify that the created Operator is running:
110
110
+
111
111
--
112
-
[source]
112
+
[source,terminal]
113
113
----
114
114
kubectl -n rhdh-operator get pods -w
115
115
----
@@ -120,7 +120,7 @@ If the operator pod shows `ImagePullBackOff` status, then you might need permiss
120
120
====
121
121
You can include the required secret name in the `deployment.spec.template.spec.imagePullSecrets` list and verify the deployment name using `kubectl get deployment -n rhdh-operator` command:
0 commit comments