From a359e094b56faec63a22eb7376ce2b5222885453 Mon Sep 17 00:00:00 2001 From: "Suren A. Chilingaryan" Date: Wed, 22 Dec 2021 00:14:47 +0100 Subject: Archive rocketchat configuration --- docs/samples/external_services/info.txt | 12 ++++++++++++ .../external_services/rocketchat-external-ep.yml | 15 +++++++++++++++ .../rocketchat-external-service-externalname.yml | 8 ++++++++ .../external_services/rocketchat-external-service.yml | 17 +++++++++++++++++ docs/services/rocketchat.txt | 9 +++++++++ 5 files changed, 61 insertions(+) create mode 100644 docs/samples/external_services/info.txt create mode 100644 docs/samples/external_services/rocketchat-external-ep.yml create mode 100644 docs/samples/external_services/rocketchat-external-service-externalname.yml create mode 100644 docs/samples/external_services/rocketchat-external-service.yml create mode 100644 docs/services/rocketchat.txt diff --git a/docs/samples/external_services/info.txt b/docs/samples/external_services/info.txt new file mode 100644 index 0000000..3ee716d --- /dev/null +++ b/docs/samples/external_services/info.txt @@ -0,0 +1,12 @@ +Integrating External Services +============================= + - Sample EP and services are included here. + * There is 2 ways to generate server using 'ip/port' or using DNS name. The second is easier to maintain + if the resource only used internally. However, it is not supported by OpenShift HARouter and can't be used + to expose external services trough OpenShift domain (*.kaas.kit.edu). + + - Exposing external service trough OpenShift domain (*.kaas.kit.edu) + * It is better to use reencrypt termination if remote service running HTTPS. Passthrough will work, but result in the mistmatch between certificate + and address. The dest-ca-cert is mandatory parameter for reencrypt. + oc -n services create route reencrypt rocketchat --hostname rocketchat.kaas.kit.edu --service rocketchat-external --dest-ca-cert telesec.crt --port 443 + \ No newline at end of file diff --git a/docs/samples/external_services/rocketchat-external-ep.yml b/docs/samples/external_services/rocketchat-external-ep.yml new file mode 100644 index 0000000..7080e9d --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-ep.yml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Endpoints +metadata: + name: rocketchat-external +subsets: + - addresses: + - ip: 141.52.13.74 + ports: + - port: 80 + name: "http" + - port: 443 + name: "https" + + + \ No newline at end of file diff --git a/docs/samples/external_services/rocketchat-external-service-externalname.yml b/docs/samples/external_services/rocketchat-external-service-externalname.yml new file mode 100644 index 0000000..bbcf7ff --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-service-externalname.yml @@ -0,0 +1,8 @@ +kind: "Service" +apiVersion: "v1" +metadata: + name: "rocketchat-external" +spec: + type: ExternalName + externalName: iap-katrin-chat.iap.kit.edu +selector: {} diff --git a/docs/samples/external_services/rocketchat-external-service.yml b/docs/samples/external_services/rocketchat-external-service.yml new file mode 100644 index 0000000..a26fe1a --- /dev/null +++ b/docs/samples/external_services/rocketchat-external-service.yml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: Service +metadata: + name: rocketchat-external +spec: + selector: {} + ports: + - protocol: TCP + port: 80 + targetPort: 80 + name: "http" + - protocol: TCP + port: 443 + targetPort: 443 + name: "https" + + \ No newline at end of file diff --git a/docs/services/rocketchat.txt b/docs/services/rocketchat.txt new file mode 100644 index 0000000..99ec03a --- /dev/null +++ b/docs/services/rocketchat.txt @@ -0,0 +1,9 @@ +- Recovering rocketchat from failed update + mongo -u userRBS -p <...> --authenticationDatabase "rocketchatdb" + use rocketchatdb + show collections + db.migrations.find({}) + # This is version corresponding to 0.71.1 (a68a2527b6c1) running on KaaS. + db.migrations.update({ _id: 'control' }, { $set: { locked: false, version: 135 } }); + db.migrations.renameCollection("migrations_disable") + -- cgit v1.2.3