generated from redhat-developer/new-project-template
-
Notifications
You must be signed in to change notification settings - Fork 57
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE #715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
73 commits
Select commit
Hold shift + click to select a range
9f64b6d
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde 65c910b
chore(release notes): re-add jira2asciidoc.yml file in a new location…
nickboldt f5f4208
RHIDP-4860 Remove Azure authentication provider from admin guide (#690)
themr0c 8edd08c
RHIDP-4860 Remove unsupported authentication provider: Amazon Cognito…
themr0c 9e8abfb
RHIDP-4684 Update Keycloak configuration instructions (#681)
themr0c c10a907
RHIDP-4814: Move observe related content to new titles (#689)
hmanwani-rh fa66b63
Rhidp 3835 home page document how users can customize the home page (…
jmagak a710d1e
RHIDP-3975 Managing authorization using the REST API (#685)
themr0c 2730cb0
Update pull_request_template.md (#710)
themr0c c91727c
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde e3f5f6e
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde 6e00343
RHIDP-4323: OCM permissions require additional permissionsto fully re…
pabel-rh 982d41e
RHIDP-3334: apiversion and kind update (#695)
pabel-rh f3f1614
[main] Adds benefits of rhdh #684- Updates the module titles (#719)
openshift-cherrypick-robot cec97de
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde 25178c0
Merge branch 'main' into RHIDP-1923
Gerry-Forde 103d1f5
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde def508e
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde 2cdfc02
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde aebe450
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde 84dca79
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 5cd3413
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde 4ce4378
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde cf95fc9
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde 8892098
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde e11d35b
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde dea7e59
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 64012dd
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 189e41a
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 77113f1
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde c27043b
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde a877643
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde f3c96e5
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde 9c637e0
Merge branch 'main' into RHIDP-1923
Gerry-Forde ca882e8
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 090be5b
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 8dba232
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde ace43e1
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde c95d35a
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 80ed8a8
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde bc55f53
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde 984744b
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde c688faa
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde 65ed70a
Merge branch 'main' into RHIDP-1923
Gerry-Forde d4ae0bf
RHIDP-4860 Remove Azure authentication provider from admin guide (#690)
themr0c 35fb30b
RHIDP-4814: Move observe related content to new titles (#689)
hmanwani-rh d13ccb9
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde d5db3a0
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde 7eba909
RHIDP-1923 Fix merge conflict in audit log file
Gerry-Forde 7d5d2e1
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde 88e5850
[RHDHBUGS-106][RHIDP-4646] Clarify the behavior of the `NO_PROXY` rul…
rm3l 8892874
RHIDP-4814: Move observe related content to new titles (#689)
hmanwani-rh 61585d8
RHIDP-1923 Fix merge conflict in audit log file
Gerry-Forde 1464556
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde 1d2ffc6
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde 675d0d0
Merge branch 'main' into RHIDP-1923
Gerry-Forde 9fe5962
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde e1e610e
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde 18b802a
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde fedcf61
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde f4b9e9c
Update modules/installation/proc-deploy-rhdh-instance-gke.adoc
Gerry-Forde 92a6eb6
Update modules/installation/proc-rhdh-deploy-gke-helm.adoc
Gerry-Forde eba5030
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde a1b58ff
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde fe2624c
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde 3e29391
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde 5783be4
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde d8276de
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde 85b0009
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde 71cfeab
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde e390e74
Update modules/installation/proc-rhdh-deploy-gke-operator.adoc
Gerry-Forde c6e365f
Merge branch 'main' into RHIDP-1923
Gerry-Forde b8f0ba8
RHIDP-1923 - GKE: Document how RHDH can be installed in GKE
Gerry-Forde File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
195 changes: 195 additions & 0 deletions
195
modules/installation/proc-deploy-rhdh-instance-gke.adoc
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,195 @@ | ||
| [id="proc-deploy-rhdh-instance-gke.adoc_{context}"] | ||
| = Deploying the {product-short} instance on {gke-short} with the Operator | ||
| You can deploy your {product-short} instance in {gke-short} using the Operator. | ||
|
|
||
| .Prerequisites | ||
| * A cluster administrator has installed the {product} Operator. | ||
| * You have subscribed to `registry.redhat.io`. For more information, see https://access.redhat.com/RegistryAuthentication[{company-name} Container Registry Authentication]. | ||
| * You have installed `kubectl`. For more information, see https://kubernetes.io/docs/tasks/tools/#kubectl[Install kubetl]. | ||
|
|
||
| * You have configured a domain name for your {product-short} instance. | ||
| * You have reserved a static external Premium IPv4 Global IP address that is not attached to any virtual machine (VM). For more information see https://cloud.google.com/vpc/docs/reserve-static-external-ip-address#reserve_new_static[Reserve a new static external IP address] | ||
| * You have configured the DNS records for your domain name to point to the IP address that has been reserved. | ||
| + | ||
| [NOTE] | ||
Gerry-Forde marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| ==== | ||
| You need to create an `A` record with the value equal to the IP address. This process can take up to one hour to propagate. | ||
| ==== | ||
|
|
||
| .Procedure | ||
| . Create a ConfigMap named `app-config-rhdh` containing the {product-short} configuration using the following template: | ||
| + | ||
| -- | ||
| .`app-config-rhdh.yaml` fragment | ||
| [source,yaml,subs="attributes+"] | ||
| ---- | ||
| apiVersion: v1 | ||
| kind: ConfigMap | ||
| metadata: | ||
| name: app-config-rhdh | ||
| data: | ||
| "app-config-rhdh.yaml": | | ||
| app: | ||
| title: Red Hat Developer Hub | ||
| baseUrl: https://<rhdh_domain_name> | ||
| backend: | ||
| auth: | ||
| externalAccess: | ||
| - type: legacy | ||
| options: | ||
| subject: legacy-default-config | ||
| secret: "${BACKEND_SECRET}" | ||
| baseUrl: https://<rhdh_domain_name> | ||
| cors: | ||
| origin: https://<rhdh_domain_name> | ||
| ---- | ||
| -- | ||
|
|
||
| . Create a Secret named `secrets-rhdh` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value: | ||
| + | ||
| -- | ||
| .`secrets-rhdh` fragment | ||
| [source,yaml] | ||
| ---- | ||
| apiVersion: v1 | ||
| kind: Secret | ||
| metadata: | ||
| name: secrets-rhdh | ||
| stringData: | ||
| # TODO: See https://backstage.io/docs/auth/service-to-service-auth/#setup | ||
| BACKEND_SECRET: "xxx" | ||
| ---- | ||
|
|
||
| [IMPORTANT] | ||
| ==== | ||
| Ensure that you use a unique value of `BACKEND_SECRET` for each {product-short} instance. | ||
| ==== | ||
|
|
||
| You can use the following command to generate a key: | ||
|
|
||
| [source,terminal] | ||
| ---- | ||
| node-p'require("crypto").randomBytes(24).toString("base64")' | ||
| ---- | ||
| -- | ||
|
|
||
| . To enable pulling the PostgreSQL image from the {company-name} Ecosystem Catalog, add the image pull secret in the default service account within the namespace where the {product-short} instance is being deployed: | ||
| + | ||
| -- | ||
| [source,terminal] | ||
| ---- | ||
| kubectl patch serviceaccount default \ | ||
| -p '{"imagePullSecrets": [{"name": "rhdh-pull-secret"}]}' \ | ||
| -n <your_namespace> | ||
| ---- | ||
| -- | ||
|
|
||
| . Create a Custom Resource file using the following template: | ||
| + | ||
| -- | ||
| .Custom Resource fragment | ||
| [source,yaml,subs="attributes+"] | ||
| ---- | ||
| apiVersion: rhdh.redhat.com/v1alpha1 | ||
| kind: Backstage | ||
| metadata: | ||
| # This is the name of your {product-short} instance | ||
| name: my-rhdh | ||
| spec: | ||
| application: | ||
| imagePullSecrets: | ||
| - "rhdh-pull-secret" | ||
| route: | ||
| enabled: false | ||
| appConfig: | ||
| configMaps: | ||
| - name: "app-config-rhdh" | ||
| extraEnvs: | ||
| secrets: | ||
| - name: "secrets-rhdh" | ||
| ---- | ||
| -- | ||
|
|
||
| . Set up a Google-managed certificate by creating a `ManagedCertificate` object which you must attach to the Ingress. | ||
| + | ||
| -- | ||
| .Example of a `ManagedCertificate` object | ||
| [source,yaml,subs="attributes+"] | ||
| ---- | ||
| apiVersion: networking.gke.io/v1 | ||
| kind: ManagedCertificate | ||
| metadata: | ||
| name: <rhdh_certificate_name> | ||
| spec: | ||
| domains: | ||
| - <rhdh_domain_name> | ||
| ---- | ||
| -- | ||
| For more information about setting up a Google-managed certificate, see https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs?hl=en#setting_up_a_google-managed_certificate[Setting up a Google-managed certificate]. | ||
|
|
||
| . Create a `FrontendConfig` object to set a policy for redirecting to HTTPS. You must attach this policy to the Ingress. | ||
| + | ||
| -- | ||
| .Example of a `FrontendConfig` object | ||
| [source,yaml,subs="attributes+"] | ||
| ---- | ||
| apiVersion: networking.gke.io/v1beta1 | ||
| kind: FrontendConfig | ||
| metadata: | ||
| name: <ingress_security_config> | ||
| spec: | ||
| sslPolicy: gke-ingress-ssl-policy-https | ||
| redirectToHttps: | ||
| enabled: true | ||
| ---- | ||
| -- | ||
| For more information about setting a policy to redirect to HTTPS, see https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-configuration?hl=en#https_redirect[HTTP to HTTPS redirects]. | ||
|
|
||
| . Create an ingress resource using the following template, customizing the names as needed: | ||
| + | ||
| -- | ||
| .Example of an ingress resource configuration | ||
| [source,yaml,subs="attributes+"] | ||
| ---- | ||
| apiVersion: networking.k8s.io/v1 | ||
| kind: Ingress | ||
| metadata: | ||
| # TODO: this the name of your Developer Hub Ingress | ||
| name: my-rhdh | ||
| annotations: | ||
| # If the class annotation is not specified it defaults to "gce". | ||
| kubernetes.io/ingress.class: "gce" | ||
| kubernetes.io/ingress.global-static-ip-name: <ADDRESS_NAME> | ||
| networking.gke.io/managed-certificates: <rhdh_certificate_name> | ||
| networking.gke.io/v1beta1.FrontendConfig: <ingress_security_config> | ||
| spec: | ||
| ingressClassName: gce | ||
| rules: | ||
| # TODO: Set your application domain name. | ||
| - host: <rhdh_domain_name> | ||
| http: | ||
| paths: | ||
| - path: / | ||
| pathType: Prefix | ||
| backend: | ||
| service: | ||
| # TODO: my-rhdh is the name of your Backstage Custom Resource. | ||
| # Adjust if you changed it! | ||
| name: backstage-my-rhdh | ||
| port: | ||
| name: http-backend | ||
| ---- | ||
| -- | ||
|
|
||
|
|
||
|
|
||
| .Verification | ||
|
|
||
| * Wait for the `ManagedCertificate` to be provisioned. This process can take a couple of hours. | ||
|
|
||
| * Access {product-very-short} with `https://<rhdh_domain_name>` | ||
|
|
||
| // Wait until the DNS name is responsive, indicating that your {product-short} instance is ready for use. | ||
|
|
||
| .Additional information | ||
| For more information on setting up {gke-short} using Ingress with TLS, see https://github.com/GoogleCloudPlatform/gke-networking-recipes/tree/main/ingress/single-cluster/ingress-https[Secure GKE Ingress]. | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,168 @@ | ||
| [id='proc-rhdh-deploy-gke-helm_{context}'] | ||
| = Installing {product-short} on {gke-short} with the Helm chart | ||
|
|
||
| When you install the {product-short} Helm chart in {gke-brand-name} ({gke-short}), it orchestrates the deployment of a {product-short} instance, which provides a robust developer platform within the {gke-short} ecosystem. | ||
|
|
||
| .Prerequisites | ||
| * You have subscribed to `registry.redhat.io`. For more information, see https://access.redhat.com/RegistryAuthentication[{company-name} Container Registry Authentication]. | ||
| * You have installed `kubectl`. For more information, see https://kubernetes.io/docs/tasks/tools/#kubectl[Install kubetl]. | ||
| * You have installed the Google Cloud CLI. For more information, see https://cloud.google.com/sdk/docs/install[Install the gcloud CLI]. | ||
| * You have logged in to your Google account and created a https://cloud.google.com/kubernetes-engine/docs/how-to/creating-an-autopilot-cluster[GKE Autopilot] or https://cloud.google.com/kubernetes-engine/docs/how-to/creating-a-zonal-cluster[GKE Standard] cluster. | ||
|
|
||
|
|
||
| * You have configured a domain name for your {product-short} instance. | ||
| * You have reserved a static external Premium IPv4 Global IP address that is not attached to any VM. For more information see https://cloud.google.com/vpc/docs/reserve-static-external-ip-address#reserve_new_static[Reserve a new static external IP address] | ||
| * You have configured the DNS records for your domain name to point to the IP address that has been reserved. | ||
| + | ||
| [NOTE] | ||
Gerry-Forde marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| ==== | ||
| You need to create an `A` record with the value equal to the IP address. This process can take up to one hour to propagate. | ||
| ==== | ||
| * You have installed Helm 3 or the latest. For more information, see https://helm.sh/docs/intro/install[Installing Helm]. | ||
|
|
||
| .Procedure | ||
| . Go to your terminal and run the following command to add the Helm chart repository containing the {product-short} chart to your local Helm registry: | ||
| + | ||
| -- | ||
| [source,terminal] | ||
| ---- | ||
| helm repo add openshift-helm-charts https://charts.openshift.io/ | ||
| ---- | ||
| -- | ||
|
|
||
| . Create a pull secret using the following command: | ||
| + | ||
| -- | ||
| [source,terminal] | ||
Gerry-Forde marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| ---- | ||
| kubectl -n <your-namespace> create secret docker-registry rhdh-pull-secret \ <1> | ||
| --docker-server=registry.redhat.io \ | ||
| --docker-username=<user_name> \ <2> | ||
| --docker-password=<password> \ <3> | ||
| --docker-email=<email> <4> | ||
| ---- | ||
| <1> Enter your {gke-short} namespace in the command. | ||
| <2> Enter your username in the command. | ||
| <3> Enter your password in the command. | ||
| <4> Enter your email address in the command. | ||
|
|
||
| The created pull secret is used to pull the {product-short} images from the {company-name} Ecosystem. | ||
| -- | ||
|
|
||
| . Set up a Google-managed certificate by creating a `ManagedCertificate` object that you must attach to the ingress. | ||
| + | ||
| -- | ||
| .Example of attaching a `ManagedCertificate` object to the ingress | ||
| [source,yaml,subs="attributes+"] | ||
| ---- | ||
| apiVersion: networking.gke.io/v1 | ||
| kind: ManagedCertificate | ||
| metadata: | ||
| name: <rhdh_certificate_name> | ||
| spec: | ||
| domains: | ||
| - <rhdh_domain_name> | ||
| ---- | ||
| -- | ||
| For more information about setting up a Google-managed certificate, see https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs?hl=en#setting_up_a_google-managed_certificate[Setting up a Google-managed certificate]. | ||
|
|
||
| . Create a `FrontendConfig` object to set a policy for redirecting to HTTPS. You must attach this policy to the ingress. | ||
| + | ||
| -- | ||
| .Example of attaching a `FrontendConfig` object to the ingress | ||
| [source,yaml,subs="attributes+"] | ||
| ---- | ||
| apiVersion: networking.gke.io/v1beta1 | ||
| kind: FrontendConfig | ||
| metadata: | ||
| name: <ingress_security_config> | ||
| spec: | ||
| sslPolicy: gke-ingress-ssl-policy-https | ||
| redirectToHttps: | ||
| enabled: true | ||
| ---- | ||
| -- | ||
| For more information about setting a policy to redirect to HTTPS, see https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-configuration?hl=en#https_redirect[HTTP to HTTPS redirects]. | ||
|
|
||
| . Create a file named `values.yaml` using the following template: | ||
| + | ||
| .Example `values.yaml` file | ||
| [source,yaml,subs="attributes+"] | ||
Gerry-Forde marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| ---- | ||
| global: | ||
| host: <rhdh_domain_name> | ||
| route: | ||
| enabled: false | ||
| upstream: | ||
| service: | ||
| type: NodePort | ||
| ingress: | ||
| enabled: true | ||
| annotations: | ||
| kubernetes.io/ingress.class: gce | ||
| kubernetes.io/ingress.global-static-ip-name: <ADDRESS_NAME> | ||
| networking.gke.io/managed-certificates: <rhdh_certificate_name> | ||
| networking.gke.io/v1beta1.FrontendConfig: <ingress_security_config> | ||
| className: gce | ||
| backstage: | ||
| image: | ||
| pullSecrets: | ||
| - rhdh-pull-secret | ||
| podSecurityContext: | ||
| fsGroup: 2000 | ||
| postgresql: | ||
| image: | ||
| pullSecrets: | ||
| - rhdh-pull-secret | ||
| primary: | ||
| podSecurityContext: | ||
| enabled: true | ||
| fsGroup: 3000 | ||
| volumePermissions: | ||
| enabled: true | ||
| ---- | ||
| . Run the following command in your terminal to deploy {product-short} using the latest version of Helm Chart and using the `values.yaml` file: | ||
| + | ||
| [source,terminal,subs="attributes+"] | ||
| ---- | ||
| helm -n <your_namespace> install -f values.yaml <your_deploy_name> \ | ||
| openshift-helm-charts/redhat-developer-hub \ | ||
| --version {product-chart-version} | ||
| ---- | ||
| + | ||
| For the latest Helm Chart version, see this https://github.com/openshift-helm-charts/charts/tree/main/charts/redhat/redhat/redhat-developer-hub[Helm Charts] repository. | ||
|
|
||
| .Verification | ||
| * Confirm that the deployment is complete. | ||
| + | ||
| [source,terminal,subs="attributes+"] | ||
| ---- | ||
| kubectl get deploy <you_deploy_name>-developer-hub -n <your_namespace> | ||
| ---- | ||
|
|
||
| * Verify that the service and ingress were created. | ||
| + | ||
| [source,terminal,subs="attributes+"] | ||
| ---- | ||
| kubectl get service -n <your_namespace> | ||
| kubectl get ingress -n <your_namespace> | ||
| ---- | ||
| + | ||
| [NOTE] | ||
| Wait for the `ManagedCertificate` to be provisioned. This process can take a couple of hours. | ||
|
|
||
| * Access {product-very-short} with `https://<rhdh_domain_name>` | ||
|
|
||
| * To upgrade your deployment, use the following command: | ||
| + | ||
| [source,terminal,subs="attributes+"] | ||
| ---- | ||
| helm -n <your_namespace> upgrade -f values.yaml <your_deploy_name> openshift-helm-charts/redhat-developer-hub --version <UPGRADE_CHART_VERSION> | ||
| ---- | ||
|
|
||
| * To delete your deployment, use the following command: | ||
| + | ||
| [source,terminal,subs="attributes+"] | ||
| ---- | ||
| helm -n <your_namespace> delete <your_deploy_name> | ||
| ---- | ||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.