After Container Backup Support is installed in
your environment, if you update your IBM Spectrum® Protect
Plus
credentials due to a password rotation, account change, or any other reason, you must update the
secret that stores credentials for the baas namespace (or project).
About this task
You must re-create the secret that is named
baas-secret if you change one or
more of the following credentials:
- IBM Spectrum Protect
Plus containers administrator username
or password
- Data mover username or password
- minIO username or password
You can re-create the secret by using the command line in the Kubernetes or OpenShift® environment, or by using the OpenShift web console.
Procedure
- To re-create the baas-secret secret by using the Kubernetes or OpenShift command line, complete the following steps:
- Update one or more of the following variables in the
baas-options.sh file:
export SPP_ADMIN_USERNAME='your_protectplus_containers_admin_username'
export SPP_ADMIN_PASSWORD='your_protectplus_containers_admin_password'
export DATAMOVER_USERNAME='create_a_datamover_username'
export DATAMOVER_PASSWORD='create_a_datamover_password'
export MINIO_USERNAME='create_a_minio_username'
export MINIO_PASSWORD='create_a_minio_password'
For a description of the variables, see Table 1.
- At the installation directory
(~/installer/ibm-spectrum-protect-plus-prod/ibm_cloud_pak/pak_extensions/install),
run the following script to re-create the secret:
./baas-prereqs-create-baas-secret.sh
- Delete all of the transaction-manager pods and the
spp-agent pods by issuing the following commands:
kubectl delete pods -l app.kubernetes.io/component=transaction-manager -n baas
kubectl delete pods -l app.kubernetes.io/component=spp-agent -n baas
After the pods are deleted, the pods will restart and capture the changes in the
baas-secret secret.
- To re-create the baas-secret secret by using the OpenShift web console, complete the following steps:
- Log in to the OpenShift web console as the cluster administrator.
- Select the Developer perspective and click
Secrets.
- Click
.
- Update one or more of the following key-values pairs for the
baas-secret secret.
Table 1. Key-value pairs for
the baas-secret secret
Key |
Value |
baasadmin |
Specify the username for the IBM Spectrum Protect
Plus
containers administrator. Enter the value that is used for the SPP_ADMIN_USERNAME variable in the
baas-options.sh file. |
baaspassword |
Specify the password for the IBM Spectrum Protect
Plus
containers administrator. Enter the value that is used for the SPP_ADMIN_PASSWORD variable in the
baas-options.sh file. |
datamoveruser |
Specify the data mover username. Use the value that you specified for the DATAMOVER_USERNAME
variable in the baas-options.sh file. |
datamoverpassword |
Specify the password for the data mover. Use the value that you specified for the
DATAMOVER_PASSWORD variable in the baas-options.sh file. |
miniouser |
Specify the username for the minIO server. Use the value that you specified for the
MINIO_USERNAME variable in the baas-options.sh file. |
miniopassword |
Specify the password for the minIO user. Use the value that you specified for the
MINIO_PASSWORD variable in the baas-options.sh file. |
- From the Pods view of the baas project,
manually delete all of the baas-transaction-manager pods and the
baas-spp-agent pods.
After the pods are deleted from the web
console, the pods will restart and capture the changes in the baas-secret
secret.