Creating Kubernetes Secret
For SSL enabled database, you must create a Kubernetes secret that have the SSL certificate content. Specify the Secret name as input to the platform-base
chart.
- Procedure
-
Create Secret YAML file:
Example:
apiVersion: v1 data: db_ssl_root.cert: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1 I3TUEwR0NTcUdTSWIzRFFFQkN3VUFNSUdWTVFzd0NRWUQKVlFRR0V3SlZ JFR0ExVUVDQXdLVjJGemFHbHVaM1J2YmpFaQpNQ0FHQTFVRUNnd1pRVzF xqRVRNQkVHQTFVRUN3d0tRVzFoCmVtOXVJRkpFVXpFbU1DUUdBMVVFQXd kind: Secret metadata: annotations: helm.sh/hook: pre-install, pre-upgrade helm.sh/hook-weight: "0" name: db-ssl-root-cert namespace: cp1-tibco-cp type: Opaque
In the data section, specify the certificate file name which you use in the
platform-base
chart value. Namespace must be already created and it must be the same as namespace whereplatform-base
chart will be deployed. -
Run the following command to create secret.
kubectl create -f <File path of Secret yaml file>
What to do nextAfter the Secret is created successfully, you must specify the Secret name in the
platform-base
chart db_ssl_root_cert_secretname
parameter. For more information, see Configuring TIBCO Control Plane Helm Chart Values.