Creating Kubernetes Secret

For SSL enabled database, you must create a Kubernetes secret that have the SSL certificate content. Specify the Secret name as input to the platform-base chart.

    Procedure
  1. Create Secret YAML file:

    Example:

    apiVersion: v1
    data:
     db_ssl_root.cert: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1
      I3TUEwR0NTcUdTSWIzRFFFQkN3VUFNSUdWTVFzd0NRWUQKVlFRR0V3SlZ
      JFR0ExVUVDQXdLVjJGemFHbHVaM1J2YmpFaQpNQ0FHQTFVRUNnd1pRVzF
      xqRVRNQkVHQTFVRUN3d0tRVzFoCmVtOXVJRkpFVXpFbU1DUUdBMVVFQXd
      kind: Secret
    metadata:
      annotations:
        helm.sh/hook: pre-install, pre-upgrade
        helm.sh/hook-weight: "0"
      name: db-ssl-root-cert
      namespace: cp1-tibco-cp
    type: Opaque
    

    In the data section, specify the certificate file name which you use in the platform-base chart value. Namespace must be already created and it must be the same as namespace where platform-base chart will be deployed.

  2. Run the following command to create secret.

    kubectl create -f <File path of Secret yaml file>
What to do nextAfter the Secret is created successfully, you must specify the Secret name in the platform-base chart db_ssl_root_cert_secretname parameter. For more information, see Configuring TIBCO Control Plane Helm Chart Values.