Install AppCenter Services | Teradata AppCenter - 1.10 - Installing Services - Teradata AppCenter

Teradata® AppCenter Customer Installation and Upgrade Guide for vSphere

Product
Teradata AppCenter
Release Number
1.10
Published
June 2020
Language
English (United States)
Last Update
2020-07-02
dita:mapPath
ixs1586886570933.ditamap
dita:ditavalPath
ft:empty
The template .yaml files shown in the following procedure are examples and might not match the files downloaded as part of the actual bundle. The files in the actual bundle are the most up-to-date.
  1. Using any standard text editor, open platform-override.yaml that was downloaded as part of the AppCenter bundle and make sure the required entries exist:
    elasticsearch:
      master:
        resources:
          limits:
            cpu: 500m
            memory: 2Gi
          requests:
            cpu: 250m
            memory: 2Gi
        heapMemory: 1024m
      data:
        resources:
          limits:
            cpu: 500m
            memory: 2Gi
          requests:
            cpu: 250m
            memory: 2Gi
          heapMemory: 1024m
      client:
        resources:
          limits:
            cpu: 500m
            memory: 2Gi
          requests:
            cpu: 250m
            memory: 2Gi
        heapMemory: 1024m
    
    filebeat:
      hostPath: /var/lib/docker/teradata/elasticsearch/filebeat
      resources:
        limits:
          cpu: 1000m
          memory: 1500Mi
        requests:
          cpu: 300m
          memory: 200Mi
    
    global:
      nodeSelector:
        nodetype: appcenter
      enableNodeSelector: false
      rook:
        rookEnabled: false
      backup:
        encKey: # Refer Table 2.0 - This is a mandatory value
    
    kibana:
      basicAuthUsername: admin
      basicAuthPassword: # Refer Table 2.0 - This is a mandatory value
    
    grafana:
      basicAuthUsername: admin
      basicAuthPassword: # Refer Table 2.0 - This is a mandatory value
      storageClass: manual
      persistence:
        location: /var/lib/docker/teradata/data/grafana
    
    
    alert-manager:
      basicAuthUsername: admin
      basicAuthPassword: # Refer Table 2.0 - This is a mandatory value
      storageClass: manual
      persistence:
        pv:
          location: /var/lib/docker/teradata/data/alertmanager
    
    postgres:
      resources:
        requests:
          cpu: 300m
          memory: 200Mi
      storageClass: manual
      persistence:
        location: /var/lib/docker/teradata/data/postgres
    
    prometheus:
      resources:
        requests:
          cpu: 300m
          memory: 512Mi
      basicAuthUsername: admin
      basicAuthPassword: # Refer Table 2.0 - This is a mandatory value
      storageClass: manual
      persistence:
        pv:
          location: /var/lib/docker/teradata/data/prometheus
      nodeExporter:
        resources:
          limits:
            cpu: 300m
            memory: 512Mi
          requests:
            cpu: 100m
            memory: 100Mi
    
    teradataExternalService:
      enabled: false
  2. Add the following key values:
    Table 2.0
    Key Description
    global.backup.encKey Key for backup encryption. Same value is needed in appcenter-override.yaml. Alphanumeric string. Minimum size is 3.
    grafana.basicAuthPassword Grafana password for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
    kibana.basicAuthPassword Kibana password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
    prometheus.basicAuthPassword Prometheus password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
    alert-manager.basicAuthPassword Alert Manager password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
  3. [Optional] Use this command to generate random char strings for any of the passwords/keys:
    $head /dev/urandom | LC_CTYPE=C tr -dc A-Za-z0-9 | head -c <NUMBER-OF-CHARACTERS> ; echo ''
  4. [Optional] Encrypt the override file, which contains passwords:
    $ appctl encrypt platform-override.yaml
    Enter password: 
    Confirm password: encrypting platform-override.yaml...
    If you encrypt the override file, the password cannot be retrieved after installation. Make sure you save the password in a secure location so you can view the contents of override file after installation. To decrpyt the override file, use:
    appctl decrypt <path/to/file>
  5. Using any standard text editor, open application-services-override.yaml that was downloaded as part of the AppCenter bundle and make sure the required entries exist:
    grafana-init:
      dockerMount: /dev/sda1
      rootMount: /dev/sda1
    
    global:
      accessKey: # Refer Table 3.0 - This is a mandatory value, use same value from init override file
      secretKey: # Refer Table 3.0 - This is a mandatory value, use same value from init override file
      nodeSelector:
        nodetype: appcenter
      enableNodeSelector: false
      rook:
        rookEnabled: false
    
      backup:
      encKey: # Refer Table 3.0 - This is a mandatory value, use same value from platform override file
    
      appService:
        pgUsername: appservice
        pgPassword: # Refer Table 3.0 - This is a mandatory value
        applicationKey: appservice
        clientSecret: # Refer Table 3.0 - This is a mandatory value
    
      auditService:
        pgUsername: auditservice
        pgPassword: # Refer Table 3.0 - This is a mandatory value
        applicationKey: auditservice
        clientSecret: # Refer Table 3.0 - This is a mandatory value
    
      dictionaryService:
        pgUsername: dictionaryservice
        pgPassword: # Refer Table 3.0 - This is a mandatory value
        applicationKey: dictionaryservice
        clientSecret: # Refer Table 3.0 - This is a mandatory value
    
      systemService:
        pgUsername: systemservice
        pgPassword: # Refer Table 3.0 - This is a mandatory value
        applicationKey: systemservice
        clientSecret: # Refer Table 3.0 - This is a mandatory value
    
      userService:
        pgUsername: userservice
        pgPassword: # Refer Table 3.0 - This is a mandatory value
        applicationKey: userservice
        clientSecret: # Refer Table 3.0 - This is a mandatory value
    
      notificationService:
        pgUsername: notificationservice
        pgPassword: # Refer Table 3.0 - This is a mandatory value
        applicationKey: notificationservice
        clientSecret: # Refer Table 3.0 - This is a mandatory value
    
      jobService:
        pgUsername: jobservice
        pgPassword: # Refer Table 3.0 - This is a mandatory value
        applicationKey: jobservice
        clientSecret: # Refer Table 3.0 - This is a mandatory value
    
      keycloak:
        pgUsername: keycloak
        pgPassword: # Refer Table 3.0 - This is a mandatory value
    
      root_password: # Refer Table 3.0 - This is a mandatory value
    
    app-service:
      appcenterByocDisabled: false
      migration:
        enable: true
    
    keycloak:
      keycloak:
        password: # Refer Table 3.0 - This is a mandatory value
  6. Add the following key values:
    Table 3.0
    Key Description
    global.backup.encKey Key for backup encryption. Copy global.backup.encKey from platform-override.yaml. The key for backup encryption needs to be the same as the key from platform-override.yaml.
    global.appService.pgPassword Postgres password for app-service. Alphanumeric string. Minimum size is 3.
    global.appService.clientSecret Postgres client secret for app-service. Alphanumeric string. Minimum size is 3.
    global.auditService.pgPassword Postgres password for audit-service. Alphanumeric string. Minimum size is 3.
    global.auditService.clientSecret Postgres client secret for audit-service. Alphanumeric string. Minimum size is 3.
    global.dictionaryService.pgPassword Postgres password for dictionary-service. Alphanumeric string. Minimum size is 3.
    global.dictionaryService.clientSecret Postgres client secret for dictionary-service. Alphanumeric string. Minimum size is 3.
    global.systemService.pgPassword Postgres password for system-service. Alphanumeric string. Minimum size is 3.
    global.systemService.clientSecret Postgres client secret for system-service. Alphanumeric string. Minimum size is 3.
    global.userService.pgPassword Postgres password for user-service. Alphanumeric string. Minimum size is 3.
    global.userService.clientSecret Postgres client secret for user-service. Alphanumeric string. Minimum size is 3.
    global.notificationService.pgPassword Postgres password for notification-service. Alphanumeric string. Minimum size is 3.
    global.notificationService.clientSecret Postgres client secret for notification-service. Alphanumeric string. Minimum size is 3.
    global.root_password AppCenter root login password. Alphanumeric string. Minimum size is 3.
    global.keycloak.pgPassword Postgres password for keycloak. Alphanumeric string. Minimum size is 3.
    keycloak.keycloak.password Keycloak admin login password. Alphanumeric string. Minimum size is 5.
    global.accessKey Copy value from init override file.
    global.secretKey Copy value from init override file.
  7. [Optional] Use this command to generate random char strings for any of the passwords/keys:
    head /dev/urandom | LC_CTYPE=C tr -dc A-Za-z0-9 | head -c <NUMBER-OF-CHARACTERS> ; echo ''
  8. [Optional] Encrypt the override file, which contains passwords:
    $ appctl encrypt application-services-override.yaml
    Enter password:
    Confirm password: encrypting application-services-override.yaml...
    If you encrypt the override file, the password cannot be retrieved after installation. Make sure you save the password in a secure location so you can view the contents of override file after installation. To decrpyt the override file, use:
    appctl decrypt <path/to/file>