Optional Upgrade

(Optional) Upgrade Connect control from Application-Operation-Manager to Platform-Manager

Objective

Upgrade of the Connect configuration to not rely on Application Operation Manager in the Platform Manager.

Execution

Platform Manager

In the platform-manager section, change the config.axual configuration to use Connect configuration and not Application-Operation-Manager configuration

You need to provide the Axual Connect configuration for all tenant-instance using the Axual Connect. You cannot have operation-manager and connect enabled at the same time.

values.yaml
axual-governance:

  platform-manager:

    config:
      axual:
        # Application Operation Manager Configuration
        operation-manager:
          available: false
          authorizer: tls
          base-uri: https://[existing-aom-url]:[existing-aom-port]
        # Axual Connect Configuration
        connect:
          available: true
          instance-connect-credentials:
            tenant1ShortName-instance1shortName:
              authorizer: basic
              username: [connect-username-for-tenant1-instance1]
              password: [connect-password-for-tenant1-instance1]
            tenant1ShortName-instance2shortName:
              authorizer: basic
              username: [connect-username-for-tenant1-instance2]
              password: [connect-password-for-tenant1-instance2]
            tenant2ShortName-instance2shortName:
              authorizer: basic
              username: [connect-username-for-tenant2-instance1]
              password: [connect-password-for-tenant2-instance1]

Please note that the client TrustStore and TrustStorePassword which are used to get access to connect over SSL are provided by default when tls.enabled=true

Once the platform-manager section have been updated, upgrade the Governance application.

Verification

In this step, we are going to verify that the new Platform Manager configuration can interact with any Axual Connect directly.

Open a browser and access https://[mgmt-ingress-host]/login/[your-realm]

Verify that you can perform the below actions for all Instances using Axual Connect.

  • view the status of a running connector

  • start/stop a running connector

If all checks are successful, you can proceed to the next steps.

Post verification

Once you have verified that the new Platform Manager configuration works, you can disable the Application Operation Manager running in the existing Management stack deployment.

values.yaml
global:
  mgmt:
    operationManager:
      enabled: false

Upgrade the existing Management stack deployment to disable the Application-Operation-Manager.

(Optional) Upgrade Connect’s Vault from one per Platform-Manager to one per Axual-Connect

Objective

Make the Connect’s Vault configuration to be separated for each Tenant-Instances Axual-Connect

Execution

Platform Manager

In the platform-manager section, change the config configuration to use Connect’s Vault configuration for each Tenant-Instance.

You need to provide the Connect’s Vault configuration for all tenant-instance using the Axual Connect.

values.yaml
axual-governance:

  platform-manager:

    config:
      # Connectors Vault Configuration
      connectorVault:
        # -- Enable Connect Support
        enabled: true
        # -- Vault Instance for each Tenant-Instance
        instances:
          tenant1ShortName-instance1shortName:
            # -- The URI of the Vault for the Tenant-Instance
            uri: https://[vault-url]:[vault-port]
            # -- (Optional) The Namespace of the Vault for the Tenant-Instance
            # namespace: "[your-connect-namespace]"
            # -- The path of the `connectors` KV secrets defined for the Tenant-Instance
            connectorsPath: "connectors"
            # -- The RoleID of the Vault policy to access the `connectors` KV secrets for this Tenant-Instance
            roleId: "[existing-platform-manager-policy-role-id]"
            # -- The SecretID of the Vault policy to access the `connectors` KV secrets for this Tenant-Instance
            secretId: "[existing-platform-manager-policy-secret-id]"
            # -- The Name identifying the `private.key` of the Connector for the Tenant-Instance
            privateKeyName: "private.key"
            # -- The Name identifying the `certificate.chain` of the Connector for the Tenant-Instance
            certChainKeyName: "certificate.chain"
          tenant1ShortName-instance2shortName:
            # -- The URI of the Vault for the Tenant-Instance
            uri: https://[vault-url]:[vault-port]
            # -- (Optional) The Namespace of the Vault for the Tenant-Instance
            # namespace: "[your-connect-namespace]"
            # -- The path of the `connectors` KV secrets defined for the Tenant-Instance
            connectorsPath: "connectors"
            # -- The RoleID of the Vault policy to access the `connectors` KV secrets for this Tenant-Instance
            roleId: "[existing-platform-manager-policy-role-id]"
            # -- The SecretID of the Vault policy to access the `connectors` KV secrets for this Tenant-Instance
            secretId: "[existing-platform-manager-policy-secret-id]"
            # -- The Name identifying the `private.key` of the Connector for the Tenant-Instance
            privateKeyName: "private.key"
            # -- The Name identifying the `certificate.chain` of the Connector for the Tenant-Instance
            certChainKeyName: "certificate.chain"
          tenant2ShortName-instance2shortName:
            # -- The URI of the Vault for the Tenant-Instance
            uri: https://[vault-url]:[vault-port]
            # -- (Optional) The Namespace of the Vault for the Tenant-Instance
            # namespace: "[your-connect-namespace]"
            # -- The path of the `connectors` KV secrets defined for the Tenant-Instance
            connectorsPath: "connectors"
            # -- The RoleID of the Vault policy to access the `connectors` KV secrets for this Tenant-Instance
            roleId: "[existing-platform-manager-policy-role-id]"
            # -- The SecretID of the Vault policy to access the `connectors` KV secrets for this Tenant-Instance
            secretId: "[existing-platform-manager-policy-secret-id]"
            # -- The Name identifying the `private.key` of the Connector for the Tenant-Instance
            privateKeyName: "private.key"
            # -- The Name identifying the `certificate.chain` of the Connector for the Tenant-Instance
            certChainKeyName: "certificate.chain"

You can use the same Vault URI, in that case the separation will be logical and not physical.

Verification

In this step, we are going to verify that the new Platform Manager configuration can interact with Connect’s Vault for each Axual Connect Tenant-Instance.

Open a browser and access https://[mgmt-ingress-host]/login/[your-realm]

Verify that you can perform the below actions for all Instances using Axual Connect.

  • upload a certificate/privateKey for a new connector

  • start/stop a running connector

If all checks are successful, you can proceed to the next steps.

Post verification

Once you have verified that the new Platform Manager configuration works, you can disable the Management’s Vault configuration in the platform-manager section.

values.yaml
axual-governance:

  platform-manager:

    config:
      # Management Vault Configuration
      vault:
        enabled: false