Skip to content

Commit 45eb751

Browse files
committed
keycloak: add relevant values.yaml for installation
1 parent 1d7ab37 commit 45eb751

File tree

4 files changed

+66
-25
lines changed

4 files changed

+66
-25
lines changed

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2025-07-17T14:28:03Z",
6+
"generated_at": "2025-07-17T15:38:45Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -342,7 +342,7 @@
342342
"hashed_secret": "fa9beb99e4029ad5a6615399e7bbae21356086b3",
343343
"is_secret": false,
344344
"is_verified": false,
345-
"line_number": 600,
345+
"line_number": 581,
346346
"type": "Secret Keyword",
347347
"verified_result": null
348348
}

authentication/Keycloak/README.md

Lines changed: 4 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -478,19 +478,10 @@ You can now install the product. We will use the PostgreSQL internal database an
478478

479479
#### a. Installation on OpenShift using Routes
480480

481-
See the [Preparing to install](https://www.ibm.com/docs/en/odm/9.5.0?topic=production-preparing-install-operational-decision-manager) documentation for more information.
481+
See the [Preparing to install](https://www.ibm.com/docs/en/odm/9.5.0?topic=production-preparing-install-operational-decision-manager) documentation for more information. Inspect [keycloak-values.yaml](keycloak-values.yaml) for the parameters that have been defined for this installation.
482482

483483
```shell
484-
helm install my-odm-release ibm-helm/ibm-odm-prod \
485-
--set image.repository=cp.icr.io/cp/cp4a/odm --set image.pullSecrets=icregistry-secret \
486-
--set oidc.enabled=true \
487-
--set license=true \
488-
--set internalDatabase.persistence.enabled=false \
489-
--set internalDatabase.populateSampleData=true \
490-
--set decisionCenter.disableAllAuthenticatedUser=true \
491-
--set customization.trustedCertificateList={"keycloak-secret"} \
492-
--set customization.authSecretRef=keycloak-auth-secret \
493-
--set internalDatabase.runAsUser='' --set customization.runAsUser='' --set service.enableRoute=true
484+
helm install my-odm-release ibm-helm/ibm-odm-prod -f keycloak-values.yaml
494485
```
495486

496487
#### b. Installation using Ingress
@@ -500,20 +491,10 @@ You can now install the product. We will use the PostgreSQL internal database an
500491
- [Amazon Elastic Kubernetes Service](../../platform/eks/README-NGINX.md)
501492
- [Google Kubernetes Engine](../../platform/gcloud/README_NGINX.md)
502493

503-
When the NGINX Ingress Controller is ready, you can install the ODM release with:
494+
When the NGINX Ingress Controller is ready, you can install the ODM release using [keycloak-nginx-values.yaml](keycloak-nginx-values.yaml). Take note of the `service.ingress.annotations` values that have been defined in this file.
504495

505496
```shell
506-
helm install my-odm-release ibm-helm/ibm-odm-prod \
507-
--set image.repository=cp.icr.io/cp/cp4a/odm --set image.pullSecrets=icregistry-secret \
508-
--set oidc.enabled=true \
509-
--set license=true \
510-
--set internalDatabase.persistence.enabled=false \
511-
--set internalDatabase.populateSampleData=true \
512-
--set customization.trustedCertificateList={"keycloak-secret"} \
513-
--set customization.authSecretRef=keycloak-auth-secret \
514-
--set service.ingress.enabled=true \
515-
--set decisionCenter.disableAllAuthenticatedUser=true \
516-
--set service.ingress.annotations={"kubernetes.io/ingress.class: nginx"\,"nginx.ingress.kubernetes.io/backend-protocol: HTTPS"\,"nginx.ingress.kubernetes.io/affinity: cookie"}
497+
helm install my-odm-release ibm-helm/ibm-odm-prod -f keycloak-nginx-values.yaml
517498
```
518499

519500
## Complete post-deployment tasks
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
license: true
2+
3+
image:
4+
repository: cp.icr.io/cp/cp4a/odm
5+
pullSecrets:
6+
- icregistry-secret
7+
8+
internalDatabase:
9+
persistence:
10+
enabled: false
11+
populateSampleData: true
12+
runAsUser: ''
13+
14+
decisionCenter:
15+
disableAllAuthenticatedUser: true
16+
17+
customization:
18+
authSecretRef: keycloak-auth-secret
19+
trustedCertificateList:
20+
- keycloak-secret
21+
runAsUser: ''
22+
23+
oidc:
24+
enabled: true
25+
26+
service:
27+
enableRoute: true
28+
ingress:
29+
annotations:
30+
kubernetes.io/ingress.class: nginx
31+
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
32+
nginx.ingress.kubernetes.io/affinity: "cookie"
33+
enabled: true
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
license: true
2+
3+
image:
4+
repository: cp.icr.io/cp/cp4a/odm
5+
pullSecrets:
6+
- icregistry-secret
7+
8+
internalDatabase:
9+
persistence:
10+
enabled: false
11+
populateSampleData: true
12+
runAsUser: ''
13+
14+
decisionCenter:
15+
disableAllAuthenticatedUser: true
16+
17+
customization:
18+
authSecretRef: keycloak-auth-secret
19+
trustedCertificateList:
20+
- keycloak-secret
21+
runAsUser: ''
22+
23+
oidc:
24+
enabled: true
25+
26+
service:
27+
enableRoute: true

0 commit comments

Comments
 (0)