Enabling Developer Portal feature flags on OpenShift and Cloud Pak for Integration
Use a template override to update the installation CR with settings that control the default behavior of the Developer Portal subsystem.
About this task
You can add a template override to the Developer Portal subsystem CR to change the default behavior of the Portal subsystem, or to turn specific features on and off. Table 1 describes the available feature flags.
Feature flag name | Default Value | Pod | Container | Description |
---|---|---|---|---|
PORTAL_SKIP_WEB_ENDPOINT_VALIDATION |
true |
www |
admin |
Controls whether the Portal subsystem checks whether the Portal web endpoint is accessible. Sometimes, the endpoint cannot be reached, for example due to the complexity of the networks. In
which case the following type of error can be seen in the
portal-www pod, and
admin container
logs: You can
disable the check by setting this flag to false . |
ENABLE_TRUSTED_REVERSE_PROXY |
false |
www |
admin |
Controls whether the Drupal If you have multiple load balancers and reverse proxies in your upstream network, and the
perimeter module is triggered, the incorrect IP address might be banned rather than the intended
client IP address. However, you can manage which IP addresses are banned by using the Drupal
The Drupal module inspects the To use this module, you must ensure that all of the proxies in your upstream network, including
the ingress controller, are configured correctly so that the
x-forwarded-for header
is passed through to the portal-www pod. For example, the default behavior of the
nginx-ingress-controller is to ignore the inbound x-forwarded-for
header, and create a new one. To change this behavior, update the
nginx-ingress-controller
configmap with the following information:
Warning: Enable this feature flag only if you
trust your upstream reverse proxies, as it is possible to trick the
x-forwarded-for
header. |