# ...
upstream:
postgresql:
enabled: false # disable PostgreSQL instance creation
auth:
existingSecret: my-rhdh-database-secrets # inject credentials secret to Backstage
backstage:
appConfig:
backend:
database:
connection: # configure Backstage DB connection parameters
host: ${POSTGRES_HOST}
port: ${POSTGRES_PORT}
user: ${POSTGRES_USER}
password: ${POSTGRES_PASSWORD}
ssl:
rejectUnauthorized: true,
ca:
$file: /opt/app-root/src/postgres-ca.pem
key:
$file: /opt/app-root/src/postgres-key.key
cert:
$file: /opt/app-root/src/postgres-crt.pem
extraEnvVarsSecrets:
- my-rhdh-database-secrets # inject credentials secret to Backstage
extraEnvVars:
- name: BACKEND_SECRET
valueFrom:
secretKeyRef:
key: backend-secret
name: '{{ include "janus-idp.backend-secret-name" $ }}'
extraVolumeMounts:
- mountPath: /opt/app-root/src/dynamic-plugins-root
name: dynamic-plugins-root
- mountPath: /opt/app-root/src/postgres-crt.pem
name: postgres-crt # inject TLS certificate to Backstage cont.
subPath: postgres-crt.pem
- mountPath: /opt/app-root/src/postgres-ca.pem
name: postgres-ca # inject CA certificate to Backstage cont.
subPath: postgres-ca.pem
- mountPath: /opt/app-root/src/postgres-key.key
name: postgres-key # inject TLS private key to Backstage cont.
subPath: postgres-key.key
extraVolumes:
- ephemeral:
volumeClaimTemplate:
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
name: dynamic-plugins-root
- configMap:
defaultMode: 420
name: dynamic-plugins
optional: true
name: dynamic-plugins
- name: dynamic-plugins-npmrc
secret:
defaultMode: 420
optional: true
secretName: '{{ printf "%s-dynamic-plugins-npmrc" .Release.Name }}'
- name: postgres-crt
secret:
secretName: my-rhdh-database-certificates-secrets
# ...
upstream:
postgresql:
enabled: false
1
auth:
existingSecret: my-rhdh-database-secrets
2
backstage:
appConfig:
backend:
database:
connection:
host: ${POSTGRES_HOST}
port: ${POSTGRES_PORT}
user: ${POSTGRES_USER}
password: ${POSTGRES_PASSWORD}
ssl:
rejectUnauthorized: true,
ca:
$file: /opt/app-root/src/postgres-ca.pem
key:
$file: /opt/app-root/src/postgres-key.key
cert:
$file: /opt/app-root/src/postgres-crt.pem
extraEnvVarsSecrets:
- my-rhdh-database-secrets
3
extraEnvVars:
- name: BACKEND_SECRET
valueFrom:
secretKeyRef:
key: backend-secret
name: '{{ include "janus-idp.backend-secret-name" $ }}'
extraVolumeMounts:
- mountPath: /opt/app-root/src/dynamic-plugins-root
name: dynamic-plugins-root
- mountPath: /opt/app-root/src/postgres-crt.pem
name: postgres-crt
4
subPath: postgres-crt.pem
- mountPath: /opt/app-root/src/postgres-ca.pem
name: postgres-ca
5
subPath: postgres-ca.pem
- mountPath: /opt/app-root/src/postgres-key.key
name: postgres-key
6
subPath: postgres-key.key
extraVolumes:
- ephemeral:
volumeClaimTemplate:
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
name: dynamic-plugins-root
- configMap:
defaultMode: 420
name: dynamic-plugins
optional: true
name: dynamic-plugins
- name: dynamic-plugins-npmrc
secret:
defaultMode: 420
optional: true
secretName: '{{ printf "%s-dynamic-plugins-npmrc" .Release.Name }}'
- name: postgres-crt
secret:
secretName: my-rhdh-database-certificates-secrets
7
Copy to Clipboard
Copied!
Toggle word wrap
Toggle overflow