Creating secrets to protect sensitive PostgreSQL SSL configuration data
If you plan to use SSL for your PostgreSQL database, create a secret manually to protect the certificate data for the database.
About this task
Procedure
What to do next
The following values specify the SSL database configuration and
provide the name of the SSL secret that you
created:
dc_ssl_enabled: true
database_ssl_secret_name: "<postgresql ssl secret name>"For example, for the relevant datasource for your FileNet® Content Manager deployment, your CR might look like the following sample snip:
datasource_configuration:
# the candidate value is "db2" or "db2HADR" or "oracle" or "sqlserver" or "postgresql"
dc_ssl_enabled: true
dc_gcd_datasource:
dc_database_type: "postgresql"
...
database_ssl_secret_name: "ibm-postresql-ssl-cert-secret"
dc_os_datasources:
- dc_database_type: "postgresql"
...
database_ssl_secret_name: "ibm-postgresql-ssl-cert-secret"Also
remember to add the database user name and password to the
ibm-fncm-secret.