You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/private-platform/pmp-quickstart.md
+68-10Lines changed: 68 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,6 +47,7 @@ Before starting the installation process, make sure that you have all the necess
47
47
* An optional Redis server version 6.2.0 or higher, for the task queue and cache. Using Redis is recommended for high availability, where you expect a high volume of webhook calls, or if you have multiple Svix servers. As a best practice, enable persistence in Redis so that tasks are persisted across Redis server restarts and upgrades.
48
48
49
49
* If you plan to use the AWS Secret Manager, install an AWS provider at your cluster, as described in [Kubernetes Secrets Store CSI Driver](https://secrets-store-csi-driver.sigs.k8s.io/).
50
+
* If you plan to use Azure Key Vault, see [Configuring a Secret Store with Azure Key Vault](/developerportal/deploy/secret-store-credentials/#azure-key-vault).
50
51
51
52
## Installing and Configuring the Mendix Operator {#install-operator}
52
53
@@ -156,7 +157,7 @@ To use the secret provider option for your database plan or storage plan, config
156
157
| Data Type | Key | Example Value |
157
158
| --- | --- | --- |
158
159
| Database type (for example, PostgreSQL) | **database-type** | `PostgreSQL` |
To use the secret provider option for your database plan or storage plan, configure the following keys in your Azure Key Vault. All keys are required unless noted otherwise.
190
+
191
+
### Database Plan Keys
192
+
193
+
| Data Type | Key | Example Value |
194
+
| --- | --- | --- |
195
+
| Database type (for example, SQLSERVER or PostgreSQL) | **database-type** | `PostgreSQL` |
| Storage service name | **storage-service-name** | `com.mendix.storage.azure` | |
207
+
| Azure storage account | **storage-azure-account-name** | `examplename` | This value is required only for Azure Blob Storage with the static authentication method. |
208
+
| Azure storage account key | **storage-azure-account-key** | `examplekey` | This value is required only for Azure Blob Storage with the static authentication method. |
| Use configured CA trust for file storage | **storage-use-ca-certificates** | `true` | |
211
+
| Use HTTP for Azure | **storage-azure-use-https** | `true` | |
212
+
| Delete files from storage when deleted in the app | **storage-perform-delete** | `true` | |
213
+
| Use managed identity authentication for Azure Blob Storage | **storage-azure-use-default-azure-credential** | `false` | Set to `true` to use managed identity authentication for Azure Blob Storage. |
Private Cloud License Manager is a required component of Private Mendix Platform. Before you install the Platform, install PCLM by doing the following steps:
189
226
@@ -264,11 +301,21 @@ Svix is required if you want to use webhooks. Install the Svix component by doin
264
301
4. Select **Svix**, and then specify the following parameters:
265
302
266
303
* **Image** - The Svix image path. The default path is `svix/svix-server:v1.25.0`. If you are using a self-signed TLS certificate, set this path to `{customer-private-image-registry-url}/svix/svix-server:v1.25.tls`.
267
-
* **Use Secret Provider** - Optional. Select this option to use the AWS Secret Manager. Selecting this option enables the following additional fields:
304
+
* **Use Secret Provider** - Optional. Select this option to use the AWS Secret Manager or the Azure Key Vault. Selecting this option enables the following additional fields:
305
+
306
+
* For AWS Secret Manager:
268
307
269
-
* **Secret Provider** - Set to **AWS** by default.
270
-
* **AWS-Role-ARN** - An AWS role ARN which can access the specified Secret Manager.
271
-
* **AWS SecretManager Name** - The AWS Secret Manager name where the sensitive data is stored.
308
+
* **Secret Provider** - Set to **AWS**.
309
+
* **AWS-Role-ARN** - An AWS role ARN which can access the specified Secret Manager.
310
+
* **AWS SecretManager Name** - The AWS Secret Manager name where the sensitive data is stored.
311
+
312
+
* For Azure Key Vault:
313
+
314
+
* **Secret Provider** - Set to **Azure**.
315
+
* **Client ID** - Enter a Client ID assigned to the Azure Managed Identity which enables Private Mendix Platform to access Azure resources.
316
+
* **Tenant ID** - Enter the Directory ID of the key vault.
317
+
* **Key Vault Name** - Enter the key vault name.
318
+
* **Use identity auth for Blob** - Set to **True** if you use the Azure Blob Storage with managed identity auth; the default value is **false**.
272
319
273
320
* **POSTGRES_DSN** - Available only if you do not use the AWS Secret Manager. A Postgres DSN, for example, `postgresql://postgres:postgres@pgbouncer/postgres`.
274
321
* **Use Redis** - Optional. Select this check box if you want to use Redis for message cache and queues.
@@ -309,10 +356,21 @@ Install the Private Mendix Platform by doing the following steps:
309
356
* **MxAdminPassword** - Optional. The password for the admin user, required if you are not planning to use the AWS Secret Manager. It must have at least one number, one upper case letter, one lower case letter and one symbol, with a minimum length of 12 characters.
310
357
* **dtapmode** - For production deployments, leave this value set to **P**. For the development of the app, for example acceptance testing, set the value to **D**.
311
358
* **ApplicationRootUrl** - Optional. Manually specify the URL of your Private Mendix Platform, for example, for use with SSO or when sending emails. For more information about this functionality, see [ApplicationRootUrl Needs to be Set Manually](/developerportal/deploy/private-cloud-operator/#applicationrooturl-needs-to-be-set-manually).
312
-
* **Use Secret Provider** - Optional. Select this option to use the AWS Secret Manager. Selecting this option enables the following additional fields:
313
-
* **Secret Provider** - Set to **AWS** by default.
314
-
* **AWS-Role-ARN** - An [AWS role ARN](https://docs.mendix.com/developerportal/deploy/secret-store-credentials/#aws-secrets-manager) which can access the specified Secret Manager.
315
-
* **AWS SecretManager Name** - The AWS Secret Manager name where the sensitive data is stored.
359
+
* **Use Secret Provider** - Optional. Select this option to use the AWS Secret Manager or the Azure Key Vault. Selecting this option enables the following additional fields:
360
+
361
+
* For AWS Secret Manager:
362
+
363
+
* **Secret Provider** - Set to **AWS**.
364
+
* **AWS-Role-ARN** - An [AWS role ARN](https://docs.mendix.com/developerportal/deploy/secret-store-credentials/#aws-secrets-manager) which can access the specified Secret Manager.
365
+
* **AWS SecretManager Name** - The AWS Secret Manager name where the sensitive data is stored.
366
+
367
+
* For Azure Key Vault:
368
+
369
+
* **Secret Provider** - Set to **Azure**.
370
+
* **Client ID** - Enter a Client ID assigned to the Azure Managed Identity which enables Private Mendix Platform to access Azure resources.
371
+
* **Tenant ID** - Enter the Directory ID of the key vault.
372
+
* **Key Vault Name** - Enter the key vault name.
373
+
* **Use identity auth for Blob** - Set to **True** if you use the Azure Blob Storage with managed identity auth; the default value is **false**.
316
374
317
375
5. In the **Enabled Functions** section, select or clear the functions that you want to enable or disable:
0 commit comments