Install AppCenter Services | Teradata AppCenter - Installing Services - Teradata AppCenter

Teradata® AppCenter Customer Installation and Upgrade Guide for vSphere

Product
Teradata AppCenter
Release Number
2.0
Published
September 2020
Language
English (United States)
Last Update
2020-09-28
dita:mapPath
bud1587493859355.ditamap
dita:ditavalPath
ft:empty
dita:id
B035-1117
Product Category
Analytical Ecosystem
The template .yaml files shown in the following procedure are examples and might not match the files downloaded as part of the actual bundle. The files in the actual bundle are the most up-to-date.
  1. Using any standard text editor, open platform-override.yaml that was downloaded as part of the AppCenter bundle and provide the following values:
    Key Description
    global.backup.encKey Key for backup encryption. Same value is needed in appcenter-override.yaml. Alphanumeric string. Minimum size is 3.
    grafana.basicAuthPassword Grafana password for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
    kibana.basicAuthPassword Kibana password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
    prometheus.basicAuthPassword Prometheus password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
    alert-manager.basicAuthPassword Alert Manager password needed for authentication. Username is admin. Alphanumeric string. Minimum length is 3.
  2. [Optional] Use this command to generate random char strings for any of the passwords/keys:
    $head /dev/urandom | LC_CTYPE=C tr -dc A-Za-z0-9 | head -c <NUMBER-OF-CHARACTERS> ; echo ''
  3. [Optional] Encrypt the override file, which contains passwords:
    $ appctl encrypt platform-override.yaml
    Enter password: 
    Confirm password: encrypting platform-override.yaml...
    If you encrypt the override file, the password cannot be retrieved after installation. Make sure you save the password in a secure location so you can view the contents of override file after installation. To decrpyt the override file, use:
    appctl decrypt <path/to/file>
  4. Using any standard text editor, open application-services-override.yaml that was downloaded as part of the AppCenter bundle and provide the following values:
    Key Description
    global.backup.encKey Key for backup encryption. Copy global.backup.encKey from platform-override.yaml. The key for backup encryption needs to be the same as the key from platform-override.yaml.
    global.appService.pgPassword Postgres password for app-service. Alphanumeric string. Minimum size is 3.
    global.appService.clientSecret Postgres client secret for app-service. Alphanumeric string. Minimum size is 3.
    global.auditService.pgPassword Postgres password for audit-service. Alphanumeric string. Minimum size is 3.
    global.auditService.clientSecret Postgres client secret for audit-service. Alphanumeric string. Minimum size is 3.
    global.dictionaryService.pgPassword Postgres password for dictionary-service. Alphanumeric string. Minimum size is 3.
    global.dictionaryService.clientSecret Postgres client secret for dictionary-service. Alphanumeric string. Minimum size is 3.
    global.systemService.pgPassword Postgres password for system-service. Alphanumeric string. Minimum size is 3.
    global.systemService.clientSecret Postgres client secret for system-service. Alphanumeric string. Minimum size is 3.
    global.userService.pgPassword Postgres password for user-service. Alphanumeric string. Minimum size is 3.
    global.userService.clientSecret Postgres client secret for user-service. Alphanumeric string. Minimum size is 3.
    global.notificationService.pgPassword Postgres password for notification-service. Alphanumeric string. Minimum size is 3.
    global.notificationService.clientSecret Postgres client secret for notification-service. Alphanumeric string. Minimum size is 3.
    global.root_password AppCenter root login password. Alphanumeric string. Minimum size is 3.
    global.keycloak.pgPassword Postgres password for keycloak. Alphanumeric string. Minimum size is 3.
    keycloak.keycloak.password Keycloak admin login password. Alphanumeric string. Minimum size is 5.
    global.accessKey Copy value from init override file.
    global.secretKey Copy value from init override file.
  5. [Optional] Use this command to generate random char strings for any of the passwords/keys:
    head /dev/urandom | LC_CTYPE=C tr -dc A-Za-z0-9 | head -c <NUMBER-OF-CHARACTERS> ; echo ''
  6. [Optional] Encrypt the override file, which contains passwords:
    $ appctl encrypt application-services-override.yaml
    Enter password:
    Confirm password: encrypting application-services-override.yaml...
    If you encrypt the override file, the password cannot be retrieved after installation. Make sure you save the password in a secure location so you can view the contents of override file after installation. To decrpyt the override file, use:
    appctl decrypt <path/to/file>