- config_name : iectl iehub config name
- iem_instance_name: iem instance name that will be created on iehub
variables:
config_name: "test_iehub" #update iectl iehub config name
config_url: "https://iehub.eu1.edge.siemens.cloud" #update iehub url on which iem needs to be onboarded
config_user: "user@siemens.com" #update iehub cli user
config_password: "cliuserpassword" #update iehub cli user password
onboard_file: "/Downloads/helm.json" #update local path where onboarding file needs to be downloaded
iem_instance_name: "devieminstance" #update iem instance name that will be created on iehub
iem_namespace: "deviem" #update same namespace of iem which was used during kind cluster and kong cert creation
iemuser: "iemuser@siemens.com" #update iem user email
iemurl: "https://165.218.200.235:443" #update iem url
iemip: "165.218.200.235" #update iem url
iempassword: "S@MpleP@ssw0rd" #update iem admin password, must contain at least 12 characters, one lower case, one upper chase, one special character (!@$#*&%) and one digit
commands:
- command:
target: config
resource: add.iehub
parameters:
user: "${{config_user}}"
password: "${{config_password}}"
url: "${{config_url}}"
name: "${{config_name}}"
- command:
target: iehub
resource: iem-instance.create
parameters:
name: "${{iem_instance_name}}"
allowfailure: "true"
- command:
target: iehub
resource: iem-instance.get-details
parameters:
name: "${{iem_instance_name}}"
filepath: "${{onboard_file}}"
- command:
target: provision
resource: install
arguments:
- ${{onboard_file}}
parameters:
namespace: "${{iem_namespace}}"
set:
- global.hostname=${{iemip}}
- global.iemAdminPassword=${{iempassword}}
- global.iamAdminPassword=${{iempassword}}
- central-auth.keycloak.initialUser.username=iemuser
- central-auth.keycloak.initialUser.email=${{iemuser}}
- global.certChain=LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUdIVENDQkFXZ0F3SUJBZ0lVRHdGL3VPaTdZQ #update output of : cat /path/to/certChain.crt | base64 -w 0
- kong.deployment.hostNetwork=true
- kong.dnsPolicy=ClusterFirstWithHostNet
- kong.proxy.tls.hostPort=443
- kong.proxy.http.hostPort=80
- kong.containerSecurityContext.capabilities.add={NET_BIND_SERVICE}
- kong.containerSecurityContext.runAsGroup=0
- kong.containerSecurityContext.runAsNonRoot=false
- kong.containerSecurityContext.runAsUser=0
- kong.proxy.http.containerPort=80
- kong.proxy.tls.containerPort=443
- kong.deployment.daemonset=true
- kong.env.SSL_CERT=/etc/secrets/kongcert/tls.crt
- kong.env.SSL_CERT_KEY=/etc/secrets/kongcert/tls.key
- kong.secretVolumes.kong-proxy-tls=kongcert
- device-catalog.workflowexecutor.enabled=true
- device-catalog.firmwaremanagement.enabled=true
- command:
target: iem
resource: system.onboard-status
parameters:
url: "${{iemurl}}"
username: "${{iemuser}}"
password: "${{iempassword}}"