Alfresco Content Services Helm Deployment with external infrastructure
Our Helm charts includes a set of dependency which are meaningful for testing and easy evaluation but can’t be really suggested for production workloads (unless you really understand what you are doing).
Activemq broker
For enhanced durability and scalability, you can provide an externally provisioned ActiveMq cluster by providing the following values:
messageBroker:
url: failover:(nio://YOUR-MQ-HOSTNAME:61616)?timeout=3000&jms.useCompression=true
user: YOUR-MQ-USERNAME
password: YOUR-MQ-PASSWORD
activemq:
enabled: false
or alternatively you can provide your own secret instead of specifying credentials as plain values:
messageBroker:
url: failover:(nio://YOUR-MQ-HOSTNAME:61616)?timeout=3000&jms.useCompression=true
existingSecretName: YOUR-MQ-SECRET
activemq:
enabled: false
alfresco-transform-service:
messageBroker:
name: YOUR-MQ-SECRET
alfresco-search-enterprise:
messageBroker:
existingSecretName: YOUR-MQ-SECRET
alfresco-repository:
configuration:
messageBroker:
existingSecret:
name: YOUR-MQ-SECRET
alfresco-sync-service:
messageBroker:
existingSecret:
name: YOUR-MQ-SECRET
alfresco-ai-transformer:
messageBroker:
existingSecret:
name: YOUR-MQ-SECRET
Elasticsearch index
When using Search Enterprise, the default search backend since ACS v23, you can provide connection details to an external elasticsearch cluster by providing the following values:
global:
search:
url: https://YOUR-DOMAIN-HOSTNAME/
flavor: elasticsearch
username: YOUR-DOMAIN-MASTER-USERNAME
password: YOUR-DOMAIN-MASTER-PASSWORD
alfresco-repository:
configuration:
search:
flavor: elasticsearch
securecomms: https
or alternatively you can provide your own secret instead of specifying credentials as plain values:
global:
search:
url: https://YOUR-DOMAIN-HOSTNAME/
flavor: elasticsearch
existingSecretName: YOUR-ES-SECRET
alfresco-repository:
configuration:
search:
flavor: elasticsearch
securecomms: https
existingSecret:
name: YOUR-ES-SECRET
alfresco-search-enterprise:
search:
existingSecret:
name: YOUR-ES-SECRET
Postgresql database
For better performances and durability, you can provide an externally provisioned Postgres database by providing the following values:
database:
external: true
driver: org.postgresql.Driver
url: jdbc:postgresql://YOUR-DATABASE-ENDPOINT:5432/
user: YOUR-DATABASE-USERNAME
password: YOUR-DATABASE-PASSWORD
postgresql:
enabled: false
or alternatively you can provide your own secret instead of specifying credentials as plain values:
database:
external: true
driver: org.postgresql.Driver
url: jdbc:postgresql://YOUR-DATABASE-ENDPOINT:5432/
existingSecretName: YOUR-DATABASE-SECRET
postgresql:
enabled: false
alfresco-repository:
configuration:
db:
existingSecret:
name: YOUR-DATABASE-SECRET
alfresco-search-enterprise:
reindexing:
db:
existingSecret:
name: YOUR-DATABASE-SECRET