diff options
author | Suren A. Chilingaryan <csa@suren.me> | 2021-12-22 00:14:47 +0100 |
---|---|---|
committer | Suren A. Chilingaryan <csa@suren.me> | 2021-12-22 00:14:47 +0100 |
commit | a359e094b56faec63a22eb7376ce2b5222885453 (patch) | |
tree | 971c389355666af8a2534638e00b84ff765323e7 | |
parent | ef5216a66f5887ba0e4d7db40f275d7e74dc42ab (diff) | |
download | ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.gz ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.bz2 ands-a359e094b56faec63a22eb7376ce2b5222885453.tar.xz ands-a359e094b56faec63a22eb7376ce2b5222885453.zip |
Archive rocketchat configuration
5 files changed, 61 insertions, 0 deletions
diff --git a/docs/samples/external_services/info.txt b/docs/samples/external_services/info.txt new file mode 100644 index 0000000..3ee716d --- /dev/null +++ b/docs/samples/external_services/info.txt @@ -0,0 +1,12 @@ +Integrating External Services +============================= + - Sample EP and services are included here. + * There is 2 ways to generate server using 'ip/port' or using DNS name. The second is easier to maintain + if the resource only used internally. However, it is not supported by OpenShift HARouter and can't be used + to expose external services trough OpenShift domain (*.kaas.kit.edu). + + - Exposing external service trough OpenShift domain (*.kaas.kit.edu) + * It is better to use reencrypt termination if remote service running HTTPS. Passthrough will work, but result in the mistmatch between certificate + and address. The dest-ca-cert is mandatory parameter for reencrypt. + oc -n services create route reencrypt rocketchat --hostname rocketchat.kaas.kit.edu --service rocketchat-external --dest-ca-cert telesec.crt --port 443 +
\ No newline at end of file diff --git a/docs/samples/external_services/rocketchat-external-ep.yml b/docs/samples/external_services/rocketchat-external-ep.yml new file mode 100644 index 0000000..7080e9d --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-ep.yml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Endpoints +metadata: + name: rocketchat-external +subsets: + - addresses: + - ip: 141.52.13.74 + ports: + - port: 80 + name: "http" + - port: 443 + name: "https" + + +
\ No newline at end of file diff --git a/docs/samples/external_services/rocketchat-external-service-externalname.yml b/docs/samples/external_services/rocketchat-external-service-externalname.yml new file mode 100644 index 0000000..bbcf7ff --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-service-externalname.yml @@ -0,0 +1,8 @@ +kind: "Service" +apiVersion: "v1" +metadata: + name: "rocketchat-external" +spec: + type: ExternalName + externalName: iap-katrin-chat.iap.kit.edu +selector: {} diff --git a/docs/samples/external_services/rocketchat-external-service.yml b/docs/samples/external_services/rocketchat-external-service.yml new file mode 100644 index 0000000..a26fe1a --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-service.yml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Service +metadata: + name: rocketchat-external +spec: + selector: {} + ports: + - protocol: TCP + port: 80 + targetPort: 80 + name: "http" + - protocol: TCP + port: 443 + targetPort: 443 + name: "https" + +
\ No newline at end of file diff --git a/docs/services/rocketchat.txt b/docs/services/rocketchat.txt new file mode 100644 index 0000000..99ec03a --- /dev/null +++ b/docs/services/rocketchat.txt @@ -0,0 +1,9 @@ +- Recovering rocketchat from failed update + mongo -u userRBS -p <...> --authenticationDatabase "rocketchatdb" + use rocketchatdb + show collections + db.migrations.find({}) + # This is version corresponding to 0.71.1 (a68a2527b6c1) running on KaaS. + db.migrations.update({ _id: 'control' }, { $set: { locked: false, version: 135 } }); + db.migrations.renameCollection("migrations_disable") + |