diff options
| author | Suren A. Chilingaryan <csa@suren.me> | 2021-12-22 00:14:47 +0100 | 
|---|---|---|
| committer | Suren A. Chilingaryan <csa@suren.me> | 2021-12-22 00:14:47 +0100 | 
| commit | a359e094b56faec63a22eb7376ce2b5222885453 (patch) | |
| tree | 971c389355666af8a2534638e00b84ff765323e7 | |
| parent | ef5216a66f5887ba0e4d7db40f275d7e74dc42ab (diff) | |
| download | ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.gz ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.bz2 ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.xz ands-a359e094b56faec63a22eb7376ce2b5222885453.zip | |
Archive rocketchat configuration
5 files changed, 61 insertions, 0 deletions
| diff --git a/docs/samples/external_services/info.txt b/docs/samples/external_services/info.txt new file mode 100644 index 0000000..3ee716d --- /dev/null +++ b/docs/samples/external_services/info.txt @@ -0,0 +1,12 @@ +Integrating External Services +============================= + - Sample EP and services are included here. +    * There is 2 ways to generate server using 'ip/port' or using DNS name. The second is easier to maintain +    if the resource only used internally. However, it is not supported by OpenShift HARouter and can't be used +    to expose external services trough OpenShift domain (*.kaas.kit.edu). +  + - Exposing external service trough OpenShift domain (*.kaas.kit.edu) +    * It is better to use reencrypt termination if remote service running HTTPS. Passthrough will work, but result in the mistmatch between certificate +    and address. The dest-ca-cert is mandatory parameter for reencrypt. +        oc -n services create route reencrypt rocketchat --hostname rocketchat.kaas.kit.edu --service rocketchat-external --dest-ca-cert telesec.crt  --port 443 +    
\ No newline at end of file diff --git a/docs/samples/external_services/rocketchat-external-ep.yml b/docs/samples/external_services/rocketchat-external-ep.yml new file mode 100644 index 0000000..7080e9d --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-ep.yml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Endpoints +metadata: +  name: rocketchat-external +subsets: +  - addresses: +      - ip: 141.52.13.74 +    ports: +      - port: 80 +        name: "http" +      - port: 443 +        name: "https" + + +      
\ No newline at end of file diff --git a/docs/samples/external_services/rocketchat-external-service-externalname.yml b/docs/samples/external_services/rocketchat-external-service-externalname.yml new file mode 100644 index 0000000..bbcf7ff --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-service-externalname.yml @@ -0,0 +1,8 @@ +kind: "Service" +apiVersion: "v1" +metadata: +  name: "rocketchat-external" +spec: +  type: ExternalName +  externalName:  iap-katrin-chat.iap.kit.edu +selector: {}  diff --git a/docs/samples/external_services/rocketchat-external-service.yml b/docs/samples/external_services/rocketchat-external-service.yml new file mode 100644 index 0000000..a26fe1a --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-service.yml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Service +metadata: +  name: rocketchat-external +spec: +  selector: {} +  ports: +    - protocol: TCP +      port: 80 +      targetPort: 80 +      name: "http" +    - protocol: TCP +      port: 443 +      targetPort: 443 +      name: "https" +       +      
\ No newline at end of file diff --git a/docs/services/rocketchat.txt b/docs/services/rocketchat.txt new file mode 100644 index 0000000..99ec03a --- /dev/null +++ b/docs/services/rocketchat.txt @@ -0,0 +1,9 @@ +- Recovering rocketchat from failed update +    mongo -u userRBS -p <...>  --authenticationDatabase "rocketchatdb" +    use rocketchatdb +    show collections +    db.migrations.find({}) +    # This is version corresponding to 0.71.1 (a68a2527b6c1) running on KaaS. +    db.migrations.update({ _id: 'control' }, { $set: { locked: false, version: 135 } }); +    db.migrations.renameCollection("migrations_disable") + | 
