Skip to content

Commit 0e66187

Browse files
Add more context to containerized uninstall (#2679)
* Add more context to containerized uninstall Adds information about preserving secret keys before performing a containerised uninstall with preserved database. automation gateway migration exits with code 1 failing install on re-run of installer (documentation missing for indicating secret keys to reuse) https://issues.redhat.com/browse/AAP-35751 * updates based on peer review feedback
1 parent e222d27 commit 0e66187

7 files changed

+35
-13
lines changed

downstream/assemblies/platform/assembly-aap-containerized-installation.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ include::platform/proc-add-eda-safe-plugin-var.adoc[leveloffset=+1]
7171
include::platform/proc-update-aap-container.adoc[leveloffset=+1]
7272
include::platform/proc-backup-aap-container.adoc[leveloffset=+1]
7373
include::platform/proc-uninstalling-containerized-aap.adoc[leveloffset=+1]
74+
include::platform/proc-reinstalling-containerized-aap.adoc[leveloffset=+1]
7475

7576

7677
ifdef::parent-context-of-aap-containerized-installation[:context: {parent-context-of-aap-containerized-installation}]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
:_mod-docs-content-type: PROCEDURE
2+
3+
[id="reinstalling-containerized-aap_{context}"]
4+
= Reinstalling containerized {PlatformNameShort}
5+
6+
[role="_abstract"]
7+
8+
To reinstall a containerized deployment after uninstalling and preserving the database, run the `install.yml` playbook and include the existing secret key value:
9+
----
10+
$ ansible-playbook -i inventory ansible.containerized_installer.install -e controller_secret_key=<secret_key_value>
11+
----
12+
13+
For more information about the `*_secret_key` variables, see link:{URLContainerizedInstall}/appendix-inventory-files-vars[Inventory file variables].

downstream/modules/platform/proc-uninstalling-containerized-aap.adoc

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,18 @@
55

66
[role="_abstract"]
77

8+
When performing a reinstall following an uninstall that preserves the databases, you must use the previously generated {PlatformNameShort} secret key values to access the preserved databases.
9+
10+
Before running the uninstall, collect the existing secret keys by running the following command:
11+
----
12+
$ podman secret inspect --showsecret <secret_key_variable> | jq -r .[].SecretData
13+
----
14+
For example:
15+
----
16+
$ podman secret inspect --showsecret controller_secret_key | jq -r .[].SecretData
17+
----
18+
19+
For more information about the `*_secret_key` variables, see link:{URLContainerizedInstall}/appendix-inventory-files-vars[Inventory file variables].
820

921
To uninstall a containerized deployment, run the `uninstall.yml` playbook:
1022
----
@@ -13,22 +25,19 @@ $ ansible-playbook -i inventory ansible.containerized_installer.uninstall
1325

1426
This stops all systemd units and containers and then deletes all resources used by the containerized installer such as:
1527

16-
* config and data directories and files
28+
* configuration and data directories and files
1729
* systemd unit files
1830
* Podman containers and images
1931
* RPM packages
2032

21-
To keep container images, you can set the `container_keep_images` variable to `true`.
33+
To keep container images, set the `container_keep_images` variable to `true`.
2234
----
2335
$ ansible-playbook -i inventory ansible.containerized_installer.uninstall -e container_keep_images=true
2436
----
2537

26-
To keep PostgreSQL databases, you can set the `postgresql_keep_databases` variable to `true`.
38+
To keep PostgreSQL databases, set the `postgresql_keep_databases` variable to `true`.
2739
----
2840
$ ansible-playbook -i inventory ansible.containerized_installer.uninstall -e postgresql_keep_databases=true
2941
----
3042

31-
[NOTE]
32-
====
33-
Use the {PlatformNameShort} secret key values rather than the autogenerated ones.
34-
====
43+

downstream/modules/platform/ref-controller-variables.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -152,8 +152,7 @@ Default = `5m`
152152
Default = `[TLSv1.2, TLSv1.3]`
153153

154154
| | `controller_pg_socket` | PostgreSQL Controller UNIX socket.
155-
| | `controller_secret_key` | {ControllerNameStart} secret key.
156-
155+
| | `controller_secret_key` | The secret key value used by {ControllerName} to sign and encrypt data, ensuring secure communication and data integrity between services.
157156

158157
| | `controller_uwsgi_listen_queue_size` | {ControllerNameStart} uWSGI listen queue size.
159158

downstream/modules/platform/ref-eda-controller-variables.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Location of the {EDAcontroller} Redis TLS key.
183183

184184
| | `eda_safe_plugins` | {EDAcontroller} safe plugins.
185185

186-
| | `eda_secret_key` | {EDAcontroller} secret key.
186+
| | `eda_secret_key` | The secret key value used by {EDAcontroller} to sign and encrypt data, ensuring secure communication and data integrity between services.
187187

188188
| | `eda_workers` | {EDAcontroller} workers count.
189189

downstream/modules/platform/ref-gateway-variables.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Location of the {Gateway} Redis TLS key.
149149

150150
Default = `gateway`
151151

152-
| | `gateway_secret_key` | {GatewayStart} secret key.
152+
| | `gateway_secret_key` | The secret key value used by {Gateway} to sign and encrypt data, ensuring secure communication and data integrity between services.
153153

154154
| | `gateway_tls_remote` | {GatewayStart} TLS remote files.
155155

downstream/modules/platform/ref-hub-variables.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -218,9 +218,9 @@ Default = `8444`
218218

219219
Default = `[TLSv1.2, TLSv1.3]`
220220

221-
| | `hub_pg_socket` | PostgreSQL {HubNameStart} UNIX socket.
221+
| | `hub_pg_socket` | PostgreSQL {HubName} UNIX socket.
222222

223-
| | `hub_secret_key` | {HubNameStart} secret key.
223+
| | `hub_secret_key` | The secret key value used by {HubName} to sign and encrypt data, ensuring secure communication and data integrity between services.
224224

225225
| | `hub_storage_backend` | {HubNameStart} storage backend.
226226

0 commit comments

Comments
 (0)