Skip to content

Conversation

@bartoval
Copy link
Member

@bartoval bartoval commented May 9, 2024

Keycloak data and configurations are stored in Postgres (studiodb for semplicity), so if you restart, remove, and recreate Keycloak (or even the database itself), the configurations remain permanent.

Test:
https://skupper-x-vb-skupper-x-2.skupper-0-153f1de160110098c1928a6c05e19444-0000.us-east.containers.appdomain.cloud

user: myskupper and pass: skupper

Other config:
Two new Realm roles were created: van-owner and backbone-admin, then applied to the user myskypper (no need to set the admin role).
keycloack-config

Improvements:
Maybe we can to set up a script like this to get the credential locally and set the yaml to read env vars:

# Set environment variables for PostgreSQL configuration
export POSTGRESQL_SERVICE=
export POSTGRESQL_DATABASE=
export POSTGRESQL_USER=
export POSTGRESQL_PASSWORD=

# Set environment variables for Keycloak configuration
export KEYCLOAK_ADMIN=
export KEYCLOAK_ADMIN_PASSWORD=
export KC_PROXY=edge
export KC_DB=
export KC_DB_URL="jdbc:postgresql://$POSTGRESQL_SERVICE/$POSTGRESQL_DATABASE"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant