Database credentials can also be supplied with a secret. For this release, we are installing a bundled postgresql, so we will just pass the credentials as a plain text on values.yaml as shown below.
xray: jfrogUrl: <Provide JFrogUrl> joinKeySecretName: joinkey-secret masterKeySecretName: masterkey-secret name: xray persistence: mountPath: /var/opt/jfrog/xray postgresql: enabled: true postgresqlUsername: xray postgresqlPassword: "password" postgresqlDatabase: xraydb postgresqlExtendedConf: listenAddresses: "*" maxConnections: "1500" rabbitmq: enabled: true replicaCount: 1 rbac: create: true auth: username: guest password: "guest"
## Alternatively, you can use a pre-existing secret with a key called rabbitmq-password by specifying existingPasswordSecret # existingPasswordSecret: <name-of-existing-secret> erlangCookie: XRAYRABBITMQCLUSTER
We can also let the release generate a random password and retrieve it from a secret.