The template .yaml files shown in the following procedure are examples and might not match the files downloaded as part of the actual bundle. The files in the actual bundle are the most up-to-date.
-
Using any standard text editor, open platform-override.yaml that was downloaded as part of the AppCenter bundle and make sure the required entries exist:
elasticsearch: master: resources: limits: cpu: 500m memory: 2Gi requests: cpu: 250m memory: 2Gi heapMemory: 1024m data: resources: limits: cpu: 500m memory: 2Gi requests: cpu: 250m memory: 2Gi heapMemory: 1024m client: resources: limits: cpu: 500m memory: 2Gi requests: cpu: 250m memory: 2Gi heapMemory: 1024m filebeat: hostPath: /var/lib/docker/teradata/elasticsearch/filebeat resources: limits: cpu: 1000m memory: 1500Mi requests: cpu: 300m memory: 200Mi global: nodeSelector: nodetype: appcenter enableNodeSelector: false rook: rookEnabled: false backup: encKey: # Refer Table 2.0 - This is a mandatory value kibana: basicAuthUsername: admin basicAuthPassword: # Refer Table 2.0 - This is a mandatory value grafana: basicAuthUsername: admin basicAuthPassword: # Refer Table 2.0 - This is a mandatory value storageClass: manual persistence: location: /var/lib/docker/teradata/data/grafana alert-manager: basicAuthUsername: admin basicAuthPassword: # Refer Table 2.0 - This is a mandatory value storageClass: manual persistence: pv: location: /var/lib/docker/teradata/data/alertmanager postgres: resources: requests: cpu: 300m memory: 200Mi storageClass: manual persistence: location: /var/lib/docker/teradata/data/postgres prometheus: resources: requests: cpu: 300m memory: 512Mi basicAuthUsername: admin basicAuthPassword: # Refer Table 2.0 - This is a mandatory value storageClass: manual persistence: pv: location: /var/lib/docker/teradata/data/prometheus nodeExporter: resources: limits: cpu: 300m memory: 512Mi requests: cpu: 100m memory: 100Mi teradataExternalService: enabled: false
-
Add the following key values:
Table 2.0 Key Description global.backup.encKey Key for backup encryption. Same value is needed in appcenter-override.yaml. Alphanumeric string. Minimum size is 3. grafana.basicAuthPassword Grafana password for authentication. Username is admin. Alphanumeric string. Minimum length is 3. kibana.basicAuthPassword Kibana password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3. prometheus.basicAuthPassword Prometheus password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3. alert-manager.basicAuthPassword Alert Manager password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3. -
[Optional] Use this command to generate random char strings for any of the passwords/keys:
$head /dev/urandom | LC_CTYPE=C tr -dc A-Za-z0-9 | head -c <NUMBER-OF-CHARACTERS> ; echo ''
-
[Optional] Encrypt the override file, which contains passwords:
$ appctl encrypt platform-override.yaml Enter password: Confirm password: encrypting platform-override.yaml...
If you encrypt the override file, the password cannot be retrieved after installation. Make sure you save the password in a secure location so you can view the contents of override file after installation. To decrpyt the override file, use:appctl decrypt <path/to/file>
-
Using any standard text editor, open application-services-override.yaml that was downloaded as part of the AppCenter bundle and make sure the required entries exist:
grafana-init: dockerMount: /dev/sda1 rootMount: /dev/sda1 global: accessKey: # Refer Table 3.0 - This is a mandatory value, use same value from init override file secretKey: # Refer Table 3.0 - This is a mandatory value, use same value from init override file nodeSelector: nodetype: appcenter enableNodeSelector: false rook: rookEnabled: false backup: encKey: # Refer Table 3.0 - This is a mandatory value, use same value from platform override file appService: pgUsername: appservice pgPassword: # Refer Table 3.0 - This is a mandatory value applicationKey: appservice clientSecret: # Refer Table 3.0 - This is a mandatory value auditService: pgUsername: auditservice pgPassword: # Refer Table 3.0 - This is a mandatory value applicationKey: auditservice clientSecret: # Refer Table 3.0 - This is a mandatory value dictionaryService: pgUsername: dictionaryservice pgPassword: # Refer Table 3.0 - This is a mandatory value applicationKey: dictionaryservice clientSecret: # Refer Table 3.0 - This is a mandatory value systemService: pgUsername: systemservice pgPassword: # Refer Table 3.0 - This is a mandatory value applicationKey: systemservice clientSecret: # Refer Table 3.0 - This is a mandatory value userService: pgUsername: userservice pgPassword: # Refer Table 3.0 - This is a mandatory value applicationKey: userservice clientSecret: # Refer Table 3.0 - This is a mandatory value notificationService: pgUsername: notificationservice pgPassword: # Refer Table 3.0 - This is a mandatory value applicationKey: notificationservice clientSecret: # Refer Table 3.0 - This is a mandatory value jobService: pgUsername: jobservice pgPassword: # Refer Table 3.0 - This is a mandatory value applicationKey: jobservice clientSecret: # Refer Table 3.0 - This is a mandatory value keycloak: pgUsername: keycloak pgPassword: # Refer Table 3.0 - This is a mandatory value root_password: # Refer Table 3.0 - This is a mandatory value app-service: appcenterByocDisabled: false migration: enable: true keycloak: keycloak: password: # Refer Table 3.0 - This is a mandatory value
-
Add the following key values:
Table 3.0 Key Description global.backup.encKey Key for backup encryption. Copy global.backup.encKey from platform-override.yaml. The key for backup encryption needs to be the same as the key from platform-override.yaml. global.appService.pgPassword Postgres password for app-service. Alphanumeric string. Minimum size is 3. global.appService.clientSecret Postgres client secret for app-service. Alphanumeric string. Minimum size is 3. global.auditService.pgPassword Postgres password for audit-service. Alphanumeric string. Minimum size is 3. global.auditService.clientSecret Postgres client secret for audit-service. Alphanumeric string. Minimum size is 3. global.dictionaryService.pgPassword Postgres password for dictionary-service. Alphanumeric string. Minimum size is 3. global.dictionaryService.clientSecret Postgres client secret for dictionary-service. Alphanumeric string. Minimum size is 3. global.systemService.pgPassword Postgres password for system-service. Alphanumeric string. Minimum size is 3. global.systemService.clientSecret Postgres client secret for system-service. Alphanumeric string. Minimum size is 3. global.userService.pgPassword Postgres password for user-service. Alphanumeric string. Minimum size is 3. global.userService.clientSecret Postgres client secret for user-service. Alphanumeric string. Minimum size is 3. global.notificationService.pgPassword Postgres password for notification-service. Alphanumeric string. Minimum size is 3. global.notificationService.clientSecret Postgres client secret for notification-service. Alphanumeric string. Minimum size is 3. global.root_password AppCenter root login password. Alphanumeric string. Minimum size is 3. global.keycloak.pgPassword Postgres password for keycloak. Alphanumeric string. Minimum size is 3. keycloak.keycloak.password Keycloak admin login password. Alphanumeric string. Minimum size is 5. global.accessKey Copy value from init override file. global.secretKey Copy value from init override file. -
[Optional] Use this command to generate random char strings for any of the passwords/keys:
head /dev/urandom | LC_CTYPE=C tr -dc A-Za-z0-9 | head -c <NUMBER-OF-CHARACTERS> ; echo ''
-
[Optional] Encrypt the override file, which contains passwords:
$ appctl encrypt application-services-override.yaml Enter password: Confirm password: encrypting application-services-override.yaml...
If you encrypt the override file, the password cannot be retrieved after installation. Make sure you save the password in a secure location so you can view the contents of override file after installation. To decrpyt the override file, use:appctl decrypt <path/to/file>