Optional parameters - Manual - Industrial Edge - Industrial Edge - Industrial Edge - Documentation of Industrial Edge APIs - CLI tools - Industrial Edge - References - APIs

Industrial Edge Platform Operation - APIs & References

Product
Industrial Edge
Edition
12/2024
Language
en-US (original)
  • config_name : iectl iehub config name
  • iem_instance_name: iem instance name that will be created on iehub
variables:
  config_name: "test_iehub"   #update iectl iehub config name
  config_url: "https://iehub.eu1.edge.siemens.cloud"    #update iehub url on which iem needs to be onboarded
  config_user: "user@siemens.com"   #update iehub cli user
  config_password: "cliuserpassword"   #update iehub cli user password
  onboard_file: "/Downloads/helm.json"   #update local path where onboarding file needs to be downloaded
  iem_instance_name: "devieminstance"    #update iem instance name that will be created on iehub
  iem_namespace: "deviem"    #update same namespace of iem which was used during kind cluster and kong cert creation
  iemuser: "iemuser@siemens.com"   #update iem user email
  iemurl: "https://165.218.200.235:443"   #update iem url
  iemip: "165.218.200.235"   #update iem url
  iempassword: "S@MpleP@ssw0rd"     #update iem admin password, must contain at least 12 characters, one lower case, one upper chase, one special character (!@$#*&%) and one digit
commands:
 - command:
   target: config
   resource: add.iehub
   parameters:
     user: "${{config_user}}"
     password: "${{config_password}}"
     url: "${{config_url}}"
     name: "${{config_name}}"
 - command:
   target: iehub
   resource: iem-instance.create
   parameters:
     name: "${{iem_instance_name}}"
     allowfailure: "true"
 - command:
   target: iehub
   resource: iem-instance.get-details
   parameters:
     name: "${{iem_instance_name}}"
     filepath: "${{onboard_file}}"
 - command:
   target: provision
   resource: install
   arguments:
      - ${{onboard_file}}
   parameters:
      namespace: "${{iem_namespace}}"
      set: 
       - global.hostname=${{iemip}}  
       - global.iemAdminPassword=${{iempassword}}    
       - global.iamAdminPassword=${{iempassword}}   
       - central-auth.keycloak.initialUser.username=iemuser
       - central-auth.keycloak.initialUser.email=${{iemuser}}  
       - global.certChain=LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUdIVENDQkFXZ0F3SUJBZ0lVRHdGL3VPaTdZQ #update output of : cat /path/to/certChain.crt | base64 -w 0
       - kong.deployment.hostNetwork=true
       - kong.dnsPolicy=ClusterFirstWithHostNet
       - kong.proxy.tls.hostPort=443
       - kong.proxy.http.hostPort=80
       - kong.containerSecurityContext.capabilities.add={NET_BIND_SERVICE}
       - kong.containerSecurityContext.runAsGroup=0
       - kong.containerSecurityContext.runAsNonRoot=false
       - kong.containerSecurityContext.runAsUser=0
       - kong.proxy.http.containerPort=80
       - kong.proxy.tls.containerPort=443
       - kong.deployment.daemonset=true
       - kong.env.SSL_CERT=/etc/secrets/kongcert/tls.crt
       - kong.env.SSL_CERT_KEY=/etc/secrets/kongcert/tls.key
       - kong.secretVolumes.kong-proxy-tls=kongcert
       - device-catalog.workflowexecutor.enabled=true
       - device-catalog.firmwaremanagement.enabled=true
 - command:
   target: iem
   resource: system.onboard-status
   parameters:
     url: "${{iemurl}}"
     username: "${{iemuser}}"
     password: "${{iempassword}}"