openshift-docs | OpenShift 3 and 4 product and community documentation
kandi X-RAY | openshift-docs Summary
kandi X-RAY | openshift-docs Summary
If you are interested in contributing to OpenShift technical documentation, you can view all our resources that will help you get set up and provide more information. The following table provides quick links to help you get started.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of openshift-docs
openshift-docs Key Features
openshift-docs Examples and Code Snippets
Community Discussions
Trending Discussions on openshift-docs
QUESTION
Using OpenShift Origin (v3.9.0). How do I set the quality of service (QoS) tier of a pod. Specifically, what yaml key path do I use to specify this value in a DeploymentConfig yaml template?
There is endless docs describing and viewing QoS settings but literally nothing to actually specify it in a config file:
...ANSWER
Answered 2019-Feb-06 at 13:10Quotas and Limitranges are what you're looking for. The "QoS-Settings" are nothing you put into the DeploymentConfig-Part of a template - it is part of the configuration of the project you're running your deployments in. I'd refer to the OpenShift Documentation for this. This is also really helpful
Regarding all available keys for the DeploymentConfig object, I'd also refer to the OpenShift Documentation regarding the Object Schema.
QUESTION
I'm trying to combine suggestions on how to use SSL with openshift : https://blog.openshift.com/openshift-demo-part-13-using-ssl/
with those on how to use ssl with mq:
Spring Configuration for JMS (Websphere MQ - SSL, Tomcat, JNDI, Non IBM JRE)
So I managed to modify my Spring Boot Camel app to move from connection via svrconn mq channel without SSL to one that uses SSL, by adding SSLCipherSuite property to com.ibm.mq.jms.MQConnectionFactory bean, and by adding these VM arguments to Run Configuration (as described in the second linked document):
...ANSWER
Answered 2018-Jun-25 at 10:50IMHO you are misinterpreting some of the settings you specify here.
1.The VM arguments after "-Dkubernetes.master=" you specify here I assume are meant to be given to the fabric8 maven plugin which you use for deployment. Right?
The parameters that are about authentication/certificates here are ONLY for the communication to kubernetes and NOT intended for giving keystore data to your application to use. So I think they are unrelated.
Instead you need to ensure that inside your container your app gets started with the same parameters that you use for local execution. Of course you then would have to change the parameter values to where the respective data is available inside your container.
2.Secrets are a tool to add sensitive data to your deployment that you don't want to be baked into your application image. So for example your keystores and the keystore passwords would qualify to be injected via secret.
An alternative to providing secret data as environment variable, like you tried, is to just mount them into the filesystem which makes the secret data available as files. As your application needs the JKS as a file you could do the following.
In the web console on your deployment, use the link "Add config files" under section "Volumes"
Select the secret "my-key-jks" created before as "source".
Specify some path where the secret should be mounted inside your container, for example "/secret". Then click "Add".
You jks will then be available inside your container under path "/secret/key.jks" so your applications parameter can point to this path.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install openshift-docs
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page