Set global database secret
The REAADB contains the field '.spec.globalConfigurations' to set the global database secret.
Set global database secret
One of the fields available for globalConfigurations
is databaseSecretName
which can point to a secret containing the database password. To set the database secret name and sync the data to all participating clusters, follow the steps below.
To edit other global configruations, see global configuration
- On an existing participating cluster, generate a YAML file containing the database secret with the database password.
This example shoes a secret named my-db-secret
with the password my-password
encoded in base 64.
apiVersion: v1
data:
password: bXktcGFzcw
kind: Secret
metadata:
name: my-db-secret
type: Opaque
-
Apply the secret file from the previous step, substituting your own value for
<db-secret-file>
.kubectl apply -f <db-secret-file>
-
Patch the REAADB custom resource to specify the database secret, substituting your own values for
<reaadb-name>
and<secret-name>
.kubectl patch reaadb <reaadb-name> --type merge --patch \ '{"spec": {"globalConfigurations": {"databaseSecretName": "secret-name"}}}'
-
Check the REAADB status for an
active
status andValid
spec status.kubectl get reaadb <reaadb-name> NAME STATUS SPEC STATUS GLOBAL CONFIGURATIONS REDB LINKED REDBS example-aadb-1 active Valid
-
On each other participating cluster, check the secret status.
``sh kubectl get reaadb
-o=jsonpath='{.status.secretsStatus}' The output should show the status as `Invalid`. ```sh [{"name":"my-db-secret","status":"Invalid"}]
-
Sync the secret on each participating cluster.
kubectl apply -f <db-secret-file>
-
Repeat the previous two steps on every participating cluster.