Skip to content

Commit bdf4bcc

Browse files
authored
kubectl get secret fix for zsh issue (#868)
1 parent 70bb4a3 commit bdf4bcc

File tree

6 files changed

+16
-15
lines changed

6 files changed

+16
-15
lines changed

docs-source/spring/content/infrastructure/databaseaccess/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ You have to enter a password for the Wallet.
102102
1. Get the ADMIN user password from k8s secret. in the exa,ple below `calfdb` needs to be replaced with the name of database in the installation.
103103

104104
```shell
105-
kubectl -n application get secret calfdb-db-secrets -o jsonpath='{.data.db\.password}' | base64 -d
105+
kubectl -n application get secret calfdb-db-secrets -o jsonpath='{.data.db\.password}' | base64 -d; echo
106106
```
107107

108108
1. Open a terminal Window and start SQLcl with the `/nolog` option.
@@ -207,7 +207,7 @@ If you chose the **PRIVATE_ENDPOINT_ACCESS** option for database access during i
207207
1. Get the ADMIN user password from k8s secret. in the exa,ple below `bluegilldb` needs to be replaced with the name of database in the installation.
208208

209209
```shell
210-
kubectl -n application get secret bluegilldb-db-secrets -o jsonpath='{.data.db\.password}' | base64 -d
210+
kubectl -n application get secret bluegilldb-db-secrets -o jsonpath='{.data.db\.password}' | base64 -d; echo
211211
```
212212

213213
1. Open a terminal Window and start SQLcl with the `/nolog` option.

docs-source/spring/content/observability/metrics/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ Prometheus is an open source monitoring and alerting system. Prometheus collects
311311
- To get the password, run this command:
312312

313313
```shell
314-
kubectl -n grafana get secret grafana-dashboard-authn -o jsonpath='{.data.password}' | base64 -d
314+
kubectl -n grafana get secret grafana-dashboard-authn -o jsonpath='{.data.password}' | base64 -d; echo
315315
```
316316

317317
> **NOTE:** If you do not have `base64`, leave off the last part (`| base64 -d`) in the command, then copy the output, and use this website to decode it: <https://www.base64decode.org/>.

docs-source/spring/content/platform/apigw/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Oracle Backend for Spring Boot and Microservices deploys Apache APISIX Gateway a
4848
* Password is retrieved using the following command:
4949

5050
```shell
51-
kubectl get secret -n apisix apisix-dashboard -o jsonpath='{.data.conf\.yaml}' | base64 -d | grep 'password:`
51+
kubectl get secret -n apisix apisix-dashboard -o jsonpath='{.data.conf\.yaml}' | base64 -d | grep 'password:'; echo
5252
```
5353

5454
**NOTE:** Oracle recommends that you change the default password when you log in the first time. Even though the dashboard is not accessible externally, Oracle still recommends using strong passwords to maximize security.

docs-source/spring/content/platform/soc/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ production certificate, refer to [Transport Layer Security](../../security#trans
6767
Login using the `obaas-admin` user (or another user if you have created one) and the password that you set during installation. If you did not set a password, one was auto-generated for you and can be obtained with this command:
6868

6969
```bash
70-
$ kubectl get secret -n azn-server oractl-passwords -o jsonpath='{.data.admin}' | base64 -d
70+
$ kubectl get secret -n azn-server oractl-passwords -o jsonpath='{.data.admin}' | base64 -d; echo
7171
```
7272

7373
After logging in, you will see the SOC Dashboard.

docs-source/spring/content/platform/vault/_index.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The following Vault services are enabled during deployment. Other services can b
8181
`root` tokens have the `root` policy attached to them. `root` tokens can do anything in Vault and are useful in **Development** mode but should be restricted in **Production** mode. In fact, the Vault team recommends that `root` tokens only be used for the initial setup. Be sure to save the initial `root` token in a secure way. For example:
8282

8383
```shell
84-
kubectl get secret vault-root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"
84+
kubectl get secret vault-root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"; echo
8585
```
8686

8787
{{< hint type=[warning] icon=gdoc_check title=Warning >}}
@@ -103,23 +103,23 @@ It is **very important** that recovery keys are saved in multiple places. Losing
103103
To extract the five recovery keys, use the following commands:
104104

105105
``` shell
106-
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.1\" }}"
106+
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.1\" }}"; echo
107107
```
108108

109109
```shell
110-
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.2\" }}"
110+
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.2\" }}"; echo
111111
```
112112

113113
```shell
114-
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.3\" }}"
114+
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.3\" }}"; echo
115115
```
116116

117117
```shell
118-
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.4\" }}"
118+
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.4\" }}"; echo
119119
```
120120

121121
```shell
122-
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.5\" }}"
122+
% kubectl get secret vault-recovery-keys -n vault --template="{{index .data \"recovery.key.5\" }}"; echo
123123
```
124124

125125
## Accessing Vault Using kubectl
@@ -162,7 +162,7 @@ To extract the five recovery keys, use the following commands:
162162
Get the token with this command:
163163

164164
```shell
165-
kubectl get secret vault-root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"
165+
kubectl get secret vault-root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"; echo
166166
```
167167

168168
Log in to the Vault and provide the token with this command:
@@ -288,7 +288,7 @@ To access the Vault, process these steps:
288288
To interact with the Vault in **Production** mode, you need to log in using a token that is stored in a K8s Secret. Get the token by running the following command. The output is the `root` token. It is **very important** that the token is saved in multiple places. Losing the token can result in loss of access to the Vault. In **Development** mode, the `root` token is `root`. For example:
289289

290290
```shell
291-
kubectl get secret vault-root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"
291+
kubectl get secret vault-root-token -n vault --template="{{index .data \"root.token\" | base64decode}}"; echo
292292
```
293293

294294
1. Open the Vault web user interface URL: <https://localhost:8200>

docs-source/spring/content/security/azn-server/_index.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,13 +53,13 @@ The passwords can also be obtained from k8s secrets using the `kubectl` command.
5353
For `obaas-admin`:
5454

5555
```shell
56-
kubectl get secret -n azn-server oractl-passwords -o jsonpath='{.data.admin}' | base64 -d
56+
kubectl get secret -n azn-server oractl-passwords -o jsonpath='{.data.admin}' | base64 -d; echo
5757
```
5858

5959
For `obaas-user`:
6060

6161
```shell
62-
kubectl get secret -n azn-server oractl-passwords -o jsonpath='{.data.user}' | base64 -d
62+
kubectl get secret -n azn-server oractl-passwords -o jsonpath='{.data.user}' | base64 -d; echo
6363
```
6464

6565
## User Management REST endpoints overview
@@ -68,6 +68,7 @@ The following REST Endpoints are available to manage users. The table lists whic
6868

6969
| End point | Method | Description | Minimum required Role |
7070
|---------------------------------------------------|--------|-------------------------------------------------|-----------------------|
71+
| /user/api/v1/connect | GET | Authorize | All Roles |
7172
| /user/api/v1/findUser | GET | Find all users | ROLE_ADMIN |
7273
| /user/api/v1/findUser?username=\<username\> | GET | Find a user with the username \<username\> | ROLE_ADMIN |
7374
| /user/api/v1/createUser | POST | Create a user | ROLE_ADMIN |

0 commit comments

Comments
 (0)