mirror of
https://github.com/bigchaindb/bigchaindb.git
synced 2024-10-13 13:34:05 +00:00
Merge pull request #1526 from bigchaindb/copyedit-follow-up-to-pr-1497
Copyedit follow-up to PR #1497
This commit is contained in:
commit
09e583a01c
@ -73,7 +73,7 @@ Claims, and to run MongoDB in the new cluster:
|
|||||||
|
|
||||||
1. :ref:`Add Storage Classes <Step 9: Create Kubernetes Storage Classes for MongoDB>`.
|
1. :ref:`Add Storage Classes <Step 9: Create Kubernetes Storage Classes for MongoDB>`.
|
||||||
2. :ref:`Add Persistent Volume Claims <Step 10: Create Kubernetes Persistent Volume Claims>`.
|
2. :ref:`Add Persistent Volume Claims <Step 10: Create Kubernetes Persistent Volume Claims>`.
|
||||||
3. :ref:`Create the Config Map <Step 3: Configure the Node>`.
|
3. :ref:`Create the Config Map <Step 3: Configure Your BigchainDB Node>`.
|
||||||
4. :ref:`Run MongoDB instance <Step 11: Start a Kubernetes StatefulSet for MongoDB>`.
|
4. :ref:`Run MongoDB instance <Step 11: Start a Kubernetes StatefulSet for MongoDB>`.
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@ -1,51 +1,41 @@
|
|||||||
Configure the Node
|
How to Configure a BigchainDB Node
|
||||||
==================
|
==================================
|
||||||
|
|
||||||
Use the ConfigMap template in ``configuration/config-map.yaml`` file to
|
This page outlines the steps to set a bunch of configuration settings
|
||||||
configure the node. Update all the values for the keys in the
|
in your BigchainDB node.
|
||||||
ConfigMaps ``vars``, ``bdb-public-key``, ``bdb-keyring`` and
|
They are pushed to the Kubernetes cluster in two files,
|
||||||
``mongodb-whitelist``.
|
named ``config-map.yaml`` (a set of ConfigMaps)
|
||||||
|
and ``secret.yaml`` (a set of Secrets).
|
||||||
|
They are stored in the Kubernetes cluster's key-value store (etcd).
|
||||||
|
|
||||||
|
Make sure you did all the things listed in the section titled
|
||||||
|
:ref:`Things Each Node Operator Must Do`
|
||||||
|
(including generation of all the SSL certificates needed
|
||||||
|
for MongoDB auth).
|
||||||
|
|
||||||
|
|
||||||
Use the Secret template in ``configuration/secret.yaml`` file to configure
|
Edit config-map.yaml
|
||||||
the secrets for this node. Update all the values for the keys in the Secrets
|
--------------------
|
||||||
``mdb-agent-api-key``, ``https-certs``, ``bdb-private-key``,
|
|
||||||
``threescale-credentials`` and ``mdb-certs``.
|
|
||||||
|
|
||||||
You might not need all the keys during the deployment.
|
Make a copy of the file ``k8s/configuration/config-map.yaml``
|
||||||
For example, if you plan to access the BigchainDB API over HTTP, you might
|
and edit the data values in the various ConfigMaps.
|
||||||
not need the ``https-certs`` Secret.
|
That file already contains many comments to help you
|
||||||
|
understand each data value, but we make some additional
|
||||||
|
remarks on some of the values below.
|
||||||
|
|
||||||
|
Note: None of the data values in ``config-map.yaml`` need
|
||||||
|
to be base64-encoded. (This is unlike ``secret.yaml``,
|
||||||
|
where all data values must be base64-encoded.
|
||||||
|
This is true of all Kubernetes ConfigMaps and Secrets.)
|
||||||
|
|
||||||
|
|
||||||
Ensure that all the secrets are base64 encoded values and the unused ones
|
vars
|
||||||
are set to an empty string.
|
~~~~
|
||||||
For example, assuming that the public key chain is named ``cert.pem`` and
|
|
||||||
private key is ``cert.key``, run the following commands to encode the
|
|
||||||
certificates into single continuous string that can be embedded in yaml,
|
|
||||||
and then copy the contents of ``cert.pem.b64`` in the ``cert.pem`` field,
|
|
||||||
and the contents of ``cert.key.b64`` in the ``cert.key`` field.
|
|
||||||
|
|
||||||
|
Your BigchainDB cluster organization should have a standard way
|
||||||
.. code:: bash
|
of naming instances, so the instances in your BigchainDB node
|
||||||
|
should conform to that standard (i.e. you can't just make up some names).
|
||||||
cat cert.pem | base64 -w 0 > cert.pem.b64
|
There are some things worth noting about the ``mdb-instance-name``:
|
||||||
|
|
||||||
cat cert.key | base64 -w 0 > cert.key.b64
|
|
||||||
|
|
||||||
|
|
||||||
Create the ConfigMap and Secret using the commands:
|
|
||||||
|
|
||||||
.. code:: bash
|
|
||||||
|
|
||||||
kubectl --context k8s-bdb-test-cluster-0 apply -f configuration/config-map.yaml
|
|
||||||
|
|
||||||
kubectl --context k8s-bdb-test-cluster-0 apply -f configuration/secret.yaml
|
|
||||||
|
|
||||||
|
|
||||||
Some of the Node Configuration Options
|
|
||||||
--------------------------------------
|
|
||||||
|
|
||||||
1. ConfigMap vars.mdb-instance-name
|
|
||||||
|
|
||||||
* MongoDB reads the local ``/etc/hosts`` file while bootstrapping a replica
|
* MongoDB reads the local ``/etc/hosts`` file while bootstrapping a replica
|
||||||
set to resolve the hostname provided to the ``rs.initiate()`` command.
|
set to resolve the hostname provided to the ``rs.initiate()`` command.
|
||||||
@ -57,16 +47,56 @@ Some of the Node Configuration Options
|
|||||||
* This field will also be used by other MongoDB instances when forming a
|
* This field will also be used by other MongoDB instances when forming a
|
||||||
MongoDB replica set.
|
MongoDB replica set.
|
||||||
* We use ``mdb-instance-0``, ``mdb-instance-1`` and so on in our
|
* We use ``mdb-instance-0``, ``mdb-instance-1`` and so on in our
|
||||||
documentation.
|
documentation. Your BigchainDB cluster may use a different naming convention.
|
||||||
|
|
||||||
2. ConfigMap bdb-keyring.bdb-keyring
|
bdb-keyring.bdb-keyring
|
||||||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
* This value specifies the public keys of all the nodes in a BigchainDB
|
This lists the BigchainDB public keys
|
||||||
cluster.
|
of all *other* nodes in your BigchainDB cluster
|
||||||
* It is a ':' separated list, similar to the PATH variables in Unix systems.
|
(not including the public key of your BigchainDB node). Cases:
|
||||||
|
|
||||||
|
* If you're deploying the first node in the cluster,
|
||||||
|
the value should be ``""`` (an empty string).
|
||||||
|
* If you're deploying the second node in the cluster,
|
||||||
|
the value should be one public key inside double quotes.
|
||||||
|
For example,
|
||||||
|
``"EPQk5i5yYpoUwGVM8VKZRjM8CYxB6j8Lu8i8SG7kGGce"``
|
||||||
|
* If there are two or more other nodes already in the cluster,
|
||||||
|
the value should be a colon-separated list of public keys
|
||||||
|
inside double quotes.
|
||||||
|
For example,
|
||||||
|
``"DPjpKbmbPYPKVAuf6VSkqGCf5jzrEh69Ldef6TrLwsEQ:EPQk5i5yYpoUwGVM8VKZRjM8CYxB6j8Lu8i8SG7kGGce"``
|
||||||
|
|
||||||
|
|
||||||
3. ConfigMap bdb-public-key.bdb-public-key
|
Edit secret.yaml
|
||||||
|
----------------
|
||||||
|
|
||||||
* This value specifies the public key of the current BigchainDB node.
|
Make a copy of the file ``k8s/configuration/secret.yaml``
|
||||||
|
and edit the data values in the various Secrets.
|
||||||
|
That file includes many comments to explain the required values.
|
||||||
|
**In particular, note that all values must be base64-encoded.**
|
||||||
|
There are tips at the top of the file
|
||||||
|
explaining how to convert values into base64-encoded values.
|
||||||
|
|
||||||
|
Your BigchainDB node might not need all the Secrets.
|
||||||
|
For example, if you plan to access the BigchainDB API over HTTP, you
|
||||||
|
don't need the ``https-certs`` Secret.
|
||||||
|
You can delete the Secrets you don't need,
|
||||||
|
or set their data values to ``""``.
|
||||||
|
|
||||||
|
Note that ``ca.pem`` is just another name for ``ca.crt``
|
||||||
|
(the certificate of your BigchainDB cluster's self-signed CA).
|
||||||
|
|
||||||
|
|
||||||
|
Deploy Your config-map.yaml and secret.yaml
|
||||||
|
-------------------------------------------
|
||||||
|
|
||||||
|
You can deploy your edited ``config-map.yaml`` and ``secret.yaml``
|
||||||
|
files to your Kubernetes cluster using the commands:
|
||||||
|
|
||||||
|
.. code:: bash
|
||||||
|
|
||||||
|
$ kubectl apply -f config-map.yaml
|
||||||
|
|
||||||
|
$ kubectl apply -f secret.yaml
|
||||||
|
|||||||
@ -9,8 +9,8 @@ It assumes you already have a running Kubernetes cluster.
|
|||||||
If you want to add a new BigchainDB node to an existing BigchainDB cluster,
|
If you want to add a new BigchainDB node to an existing BigchainDB cluster,
|
||||||
refer to :doc:`the page about that <add-node-on-kubernetes>`.
|
refer to :doc:`the page about that <add-node-on-kubernetes>`.
|
||||||
|
|
||||||
We refer to many files by their directory and filename in the documentation
|
Below, we refer to many files by their directory and filename,
|
||||||
below, such as ``configuration/config-map.yaml``. Those files are files in the
|
such as ``configuration/config-map.yaml``. Those files are files in the
|
||||||
`bigchaindb/bigchaindb repository on GitHub
|
`bigchaindb/bigchaindb repository on GitHub
|
||||||
<https://github.com/bigchaindb/bigchaindb/>`_ in the ``k8s/`` directory.
|
<https://github.com/bigchaindb/bigchaindb/>`_ in the ``k8s/`` directory.
|
||||||
Make sure you're getting those files from the appropriate Git branch on
|
Make sure you're getting those files from the appropriate Git branch on
|
||||||
@ -26,23 +26,9 @@ If you don't already have it installed,
|
|||||||
then see the `Kubernetes docs to install it
|
then see the `Kubernetes docs to install it
|
||||||
<https://kubernetes.io/docs/user-guide/prereqs/>`_.
|
<https://kubernetes.io/docs/user-guide/prereqs/>`_.
|
||||||
|
|
||||||
|
|
||||||
The default location of the kubectl configuration file is ``~/.kube/config``.
|
The default location of the kubectl configuration file is ``~/.kube/config``.
|
||||||
If you don't have that file, then you need to get it.
|
If you don't have that file, then you need to get it.
|
||||||
|
|
||||||
Find out the ``kubectl context`` of your Kubernetes cluster using the command:
|
|
||||||
|
|
||||||
.. code:: bash
|
|
||||||
|
|
||||||
$ kubectl config view
|
|
||||||
|
|
||||||
The context will be one of the entries in ``context.cluster`` under the
|
|
||||||
``contexts`` list in the output.
|
|
||||||
|
|
||||||
Assuming that the current context for your cluster is
|
|
||||||
``k8s-bdb-test-cluster-0``, you will always specify the context in the
|
|
||||||
following commands as ``kubectl --context k8s-bdb-test-cluster-0``.
|
|
||||||
|
|
||||||
**Azure.** If you deployed your Kubernetes cluster on Azure
|
**Azure.** If you deployed your Kubernetes cluster on Azure
|
||||||
using the Azure CLI 2.0 (as per :doc:`our template <template-kubernetes-azure>`),
|
using the Azure CLI 2.0 (as per :doc:`our template <template-kubernetes-azure>`),
|
||||||
then you can get the ``~/.kube/config`` file using:
|
then you can get the ``~/.kube/config`` file using:
|
||||||
@ -59,29 +45,63 @@ but you get an error message,
|
|||||||
then try adding ``--ssh-key-file ~/.ssh/<name>``
|
then try adding ``--ssh-key-file ~/.ssh/<name>``
|
||||||
to the above command (i.e. the path to the private key).
|
to the above command (i.e. the path to the private key).
|
||||||
|
|
||||||
|
.. note::
|
||||||
|
|
||||||
Step 2: Connect to the Cluster UI - (optional)
|
**About kubectl contexts.** You might manage several
|
||||||
----------------------------------------------
|
Kubernetes clusters. To make it easy to switch from one to another,
|
||||||
|
kubectl has a notion of "contexts," e.g. the context for cluster 1 or
|
||||||
|
the context for cluster 2. To find out the current context, do:
|
||||||
|
|
||||||
* Get the kubectl context for this cluster using ``kubectl config view``.
|
.. code:: bash
|
||||||
|
|
||||||
* For the above commands, the context would be ``k8s-bdb-test-cluster-0``.
|
$ kubectl config view
|
||||||
|
|
||||||
|
and then look for the ``current-context`` in the output.
|
||||||
|
The output also lists all clusters, contexts and users.
|
||||||
|
(You might have only one of each.)
|
||||||
|
You can switch to a different context using:
|
||||||
|
|
||||||
|
.. code:: bash
|
||||||
|
|
||||||
|
$ kubectl config use-context <new-context-name>
|
||||||
|
|
||||||
|
You can also switch to a different context for just one command
|
||||||
|
by inserting ``--context <context-name>`` into any kubectl command.
|
||||||
|
For example:
|
||||||
|
|
||||||
|
.. code:: bash
|
||||||
|
|
||||||
|
$ kubectl --context k8s-bdb-test-cluster-0 get pods
|
||||||
|
|
||||||
|
will get a list of the pods in the Kubernetes cluster associated
|
||||||
|
with the context named ``k8s-bdb-test-cluster-0``.
|
||||||
|
|
||||||
|
Step 2: Connect to Your Cluster's Web UI (Optional)
|
||||||
|
---------------------------------------------------
|
||||||
|
|
||||||
|
You can connect to your cluster's
|
||||||
|
`Kubernetes Dashboard <https://kubernetes.io/docs/tasks/access-application-cluster/web-ui-dashboard/>`_
|
||||||
|
(also called the Web UI) using:
|
||||||
|
|
||||||
|
.. code:: bash
|
||||||
|
|
||||||
|
$ kubectl proxy -p 8001
|
||||||
|
|
||||||
|
or, if you prefer to be explicit about the context (explained above):
|
||||||
|
|
||||||
.. code:: bash
|
.. code:: bash
|
||||||
|
|
||||||
$ kubectl --context k8s-bdb-test-cluster-0 proxy -p 8001
|
$ kubectl --context k8s-bdb-test-cluster-0 proxy -p 8001
|
||||||
|
|
||||||
|
The output should be something like ``Starting to serve on 127.0.0.1:8001``.
|
||||||
|
That means you can visit the dashboard in your web browser at
|
||||||
|
`http://127.0.0.1:8001/ui <http://127.0.0.1:8001/ui>`_.
|
||||||
|
|
||||||
Step 3: Configure the Node
|
|
||||||
--------------------------
|
|
||||||
|
|
||||||
* You need to have all the information :ref:`listed here <Things Each Node Operator Must Do>`.
|
Step 3: Configure Your BigchainDB Node
|
||||||
|
--------------------------------------
|
||||||
|
|
||||||
* The information needs to be populated in ``configuration/config-map.yaml``
|
See the page titled :ref:`How to Configure a BigchainDB Node`.
|
||||||
and ``configuration/secret.yaml``.
|
|
||||||
|
|
||||||
* For more details, refer to the document on how to
|
|
||||||
:ref:`configure a node <Configure the Node>`.
|
|
||||||
|
|
||||||
|
|
||||||
Step 4: Start the NGINX Service
|
Step 4: Start the NGINX Service
|
||||||
@ -164,13 +184,11 @@ Step 5: Assign DNS Name to the NGINX Public IP
|
|||||||
|
|
||||||
|
|
||||||
**Set up DNS mapping in Azure.**
|
**Set up DNS mapping in Azure.**
|
||||||
|
|
||||||
Select the current Azure resource group and look for the ``Public IP``
|
Select the current Azure resource group and look for the ``Public IP``
|
||||||
resource. You should see at least 2 entries there - one for the Kubernetes
|
resource. You should see at least 2 entries there - one for the Kubernetes
|
||||||
master and the other for the MongoDB instance. You may have to ``Refresh`` the
|
master and the other for the MongoDB instance. You may have to ``Refresh`` the
|
||||||
Azure web page listing the resources in a resource group for the latest
|
Azure web page listing the resources in a resource group for the latest
|
||||||
changes to be reflected.
|
changes to be reflected.
|
||||||
|
|
||||||
Select the ``Public IP`` resource that is attached to your service (it should
|
Select the ``Public IP`` resource that is attached to your service (it should
|
||||||
have the Azure DNS prefix name along with a long random string, without the
|
have the Azure DNS prefix name along with a long random string, without the
|
||||||
``master-ip`` string), select ``Configuration``, add the DNS assigned above
|
``master-ip`` string), select ``Configuration``, add the DNS assigned above
|
||||||
@ -335,7 +353,6 @@ see `the Kubernetes docs about persistent volumes
|
|||||||
The first thing to do is create the Kubernetes storage classes.
|
The first thing to do is create the Kubernetes storage classes.
|
||||||
|
|
||||||
**Set up Storage Classes in Azure.**
|
**Set up Storage Classes in Azure.**
|
||||||
|
|
||||||
First, you need an Azure storage account.
|
First, you need an Azure storage account.
|
||||||
If you deployed your Kubernetes cluster on Azure
|
If you deployed your Kubernetes cluster on Azure
|
||||||
using the Azure CLI 2.0
|
using the Azure CLI 2.0
|
||||||
@ -467,7 +484,7 @@ Step 11: Start a Kubernetes StatefulSet for MongoDB
|
|||||||
|
|
||||||
.. code:: bash
|
.. code:: bash
|
||||||
|
|
||||||
$ kubectl --context k8s-bdb-test-cluster-0 get po -w
|
$ kubectl --context k8s-bdb-test-cluster-0 get pods -w
|
||||||
|
|
||||||
|
|
||||||
Step 12: Start a Kubernetes Deployment for MongoDB Monitoring Agent
|
Step 12: Start a Kubernetes Deployment for MongoDB Monitoring Agent
|
||||||
|
|||||||
@ -103,10 +103,9 @@ you must ask the managing organization for all relevant 3scale credentials.
|
|||||||
|
|
||||||
|
|
||||||
☐ If the cluster uses MongoDB Cloud Manager for monitoring and backup,
|
☐ If the cluster uses MongoDB Cloud Manager for monitoring and backup,
|
||||||
you must ask the managing organization for the ``Agent Api Key``.
|
you must ask the managing organization for the ``Agent API Key``.
|
||||||
(Each Cloud Manager backup will have its own ``Agent Api Key``.
|
(Each Cloud Manager "group" has its own ``Agent API Key``.
|
||||||
If there's one Cloud Manager backup,
|
It can be found under **Settings - Group Settings**.)
|
||||||
there will be one ``Agent Api Key`` for the whole cluster.)
|
|
||||||
|
|
||||||
|
|
||||||
☐ Generate four keys and corresponding certificate signing requests (CSRs):
|
☐ Generate four keys and corresponding certificate signing requests (CSRs):
|
||||||
|
|||||||
@ -1,18 +1,21 @@
|
|||||||
#######################################################
|
## Note: data values do NOT have to be base64-encoded in this file.
|
||||||
# This YAML file desribes a ConfigMap for the cluster #
|
|
||||||
#######################################################
|
|
||||||
|
|
||||||
## Common Env Variables For This Node
|
## vars is common environment variables for this BigchaindB node
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
name: vars
|
name: vars
|
||||||
namespace: default
|
namespace: default
|
||||||
data:
|
data:
|
||||||
|
# MongoDB
|
||||||
mdb-instance-name: "<name of the mdb instance>"
|
mdb-instance-name: "<name of the mdb instance>"
|
||||||
|
# BigchainDB
|
||||||
bdb-instance-name: "<name of the bdb instance>"
|
bdb-instance-name: "<name of the bdb instance>"
|
||||||
|
# NGINX
|
||||||
ngx-instance-name: "<name of the ngx instance>"
|
ngx-instance-name: "<name of the ngx instance>"
|
||||||
|
# MongoDB Monitoring Agent
|
||||||
mdb-mon-instance-name: "<name of the mdb monitoring agent instance>"
|
mdb-mon-instance-name: "<name of the mdb monitoring agent instance>"
|
||||||
|
# MongoDB Backup Agent
|
||||||
mdb-bak-instance-name: "<name of the mdb backup agent instance>"
|
mdb-bak-instance-name: "<name of the mdb backup agent instance>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
@ -21,7 +24,7 @@ metadata:
|
|||||||
name: mongodb-whitelist
|
name: mongodb-whitelist
|
||||||
namespace: default
|
namespace: default
|
||||||
data:
|
data:
|
||||||
# We support only 'all' currently
|
# We only support "all"" currently
|
||||||
allowed-hosts: "all"
|
allowed-hosts: "all"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
@ -30,7 +33,8 @@ metadata:
|
|||||||
name: bdb-keyring
|
name: bdb-keyring
|
||||||
namespace: default
|
namespace: default
|
||||||
data:
|
data:
|
||||||
bdb-keyring: "':' separated list of public keys>"
|
# Colon-separated list of all *other* nodes' BigchainDB public keys.
|
||||||
|
bdb-keyring: "<':' separated list of public keys>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
@ -38,4 +42,6 @@ metadata:
|
|||||||
name: bdb-public-key
|
name: bdb-public-key
|
||||||
namespace: default
|
namespace: default
|
||||||
data:
|
data:
|
||||||
|
# BigchainDB public key of *this* node.
|
||||||
|
# Example: "EPQk5i5yYpoUwGVM8VKZRjM8CYxB6j8Lu8i8SG7kGGce"
|
||||||
bdb-public-key: "<public key>"
|
bdb-public-key: "<public key>"
|
||||||
|
|||||||
@ -1,7 +1,11 @@
|
|||||||
# All secret data should be base64 encoded before embedding them here by
|
# All secret data should be base64 encoded before embedding them here.
|
||||||
# using `echo "secret string" | base64 -w 0 > secret.string.b64` and then
|
# Short strings can be encoded using, e.g.
|
||||||
# copy the resulting value here.
|
# echo "secret string" | base64 -w 0 > secret.string.b64
|
||||||
|
# Files (e.g. certificates) can be encoded using, e.g.
|
||||||
|
# cat cert.pem | base64 -w 0 > cert.pem.b64
|
||||||
|
# then copy the contents of cert.pem.b64 (for example) below.
|
||||||
# Ref: https://kubernetes.io/docs/concepts/configuration/secret/
|
# Ref: https://kubernetes.io/docs/concepts/configuration/secret/
|
||||||
|
# Unused values can be set to ""
|
||||||
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Secret
|
kind: Secret
|
||||||
@ -10,8 +14,8 @@ metadata:
|
|||||||
namespace: default
|
namespace: default
|
||||||
type: Opaque
|
type: Opaque
|
||||||
data:
|
data:
|
||||||
# This is the API Key obtained from MongoDB Cloud Manager
|
# Base64-encoded Agent API Key (obtained from MongoDB Cloud Manager)
|
||||||
api-key: "<b64 encoded api key>"
|
api-key: "<b64 encoded Agent API Key>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Secret
|
kind: Secret
|
||||||
@ -20,7 +24,8 @@ metadata:
|
|||||||
namespace: default
|
namespace: default
|
||||||
type: Opaque
|
type: Opaque
|
||||||
data:
|
data:
|
||||||
private.key: "<b64 encoded private key>"
|
# Base64-encoded BigchainDB private key of *this* node
|
||||||
|
private.key: "<b64 encoded BigchainDB private key>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Secret
|
kind: Secret
|
||||||
@ -29,8 +34,11 @@ metadata:
|
|||||||
namespace: default
|
namespace: default
|
||||||
type: Opaque
|
type: Opaque
|
||||||
data:
|
data:
|
||||||
mdb-instance.pem: "<b64 encoded, concatanated public and private keys>"
|
# Base64-encoded, concatenated certificate and private key
|
||||||
ca.pem: "<b64 encoded CA public key>"
|
mdb-instance.pem: "<b64 encoded, concatenated certificate and private key>"
|
||||||
|
# Base64-encoded CA certificate (ca.crt)
|
||||||
|
ca.pem: "<b64 encoded CA certificate>"
|
||||||
|
# Base64-encoded MongoDB CRL
|
||||||
mdb-crl.pem: "<b64 encoded CRL data>"
|
mdb-crl.pem: "<b64 encoded CRL data>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
@ -40,8 +48,10 @@ metadata:
|
|||||||
namespace: default
|
namespace: default
|
||||||
type: Opaque
|
type: Opaque
|
||||||
data:
|
data:
|
||||||
mdb-mon-instance.pem: "<b64 encoded, concatanated public and private keys>"
|
# Base64-encoded, concatenated certificate and private key
|
||||||
ca.pem: "<b64 encoded CA public key>"
|
mdb-mon-instance.pem: "<b64 encoded, concatenated certificate and private key>"
|
||||||
|
# Base64-encoded CA certificate (ca.crt)
|
||||||
|
ca.pem: "<b64 encoded CA certificate>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Secret
|
kind: Secret
|
||||||
@ -50,8 +60,10 @@ metadata:
|
|||||||
namespace: default
|
namespace: default
|
||||||
type: Opaque
|
type: Opaque
|
||||||
data:
|
data:
|
||||||
mdb-bak-instance.pem: "<b64 encoded, concatanated public and private keys>"
|
# Base64-encoded, concatenated certificate and private key
|
||||||
ca.pem: "<b64 encoded CA public key>"
|
mdb-bak-instance.pem: "<b64 encoded, concatenated certificate and private key>"
|
||||||
|
# Base64-encoded CA certificate (ca.crt)
|
||||||
|
ca.pem: "<b64 encoded CA certificate>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Secret
|
kind: Secret
|
||||||
@ -60,8 +72,10 @@ metadata:
|
|||||||
namespace: default
|
namespace: default
|
||||||
type: Opaque
|
type: Opaque
|
||||||
data:
|
data:
|
||||||
bdb-instance.pem: "<b64 encoded, concatanated public and private keys>"
|
# Base64-encoded, concatenated certificate and private key
|
||||||
ca.pem: "<b64 encoded CA public key>"
|
bdb-instance.pem: "<b64 encoded, concatenated certificate and private key>"
|
||||||
|
# Base64-encoded CA certificate (ca.crt)
|
||||||
|
ca.pem: "<b64 encoded CA certificate>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Secret
|
kind: Secret
|
||||||
@ -70,7 +84,9 @@ metadata:
|
|||||||
namespace: default
|
namespace: default
|
||||||
type: Opaque
|
type: Opaque
|
||||||
data:
|
data:
|
||||||
|
# Base64-encoded HTTPS private key
|
||||||
cert.key: "<b64 encoded HTTPS private key>"
|
cert.key: "<b64 encoded HTTPS private key>"
|
||||||
|
# Base64-encoded HTTPS Signed Certificate or Certificate Chain
|
||||||
cert.pem: "<b64 encoded HTTPS Signed Certificate or Certificate Chain>"
|
cert.pem: "<b64 encoded HTTPS Signed Certificate or Certificate Chain>"
|
||||||
---
|
---
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user