Database credentials can also be supplied with a secret. For this release, we are installing a bundled postgresql, so we will just pass the credentials as a plain text on values.yaml as shown below.
xray:
jfrogUrl: <Provide JFrogUrl>
joinKeySecretName: joinkey-secret
masterKeySecretName: masterkey-secret
name: xray
persistence:
mountPath: /var/opt/jfrog/xray
postgresql:
enabled: true
postgresqlUsername: xray
postgresqlPassword: "password"
postgresqlDatabase: xraydb
postgresqlExtendedConf:
listenAddresses: "*"
maxConnections: "1500"
rabbitmq:
enabled: true
replicaCount: 1
rbac:
create: true
auth:
username: guest
password: "guest"
## Alternatively, you can use a pre-existing secret with a key called rabbitmq-password by specifying existingPasswordSecret # existingPasswordSecret: <name-of-existing-secret> erlangCookie: XRAYRABBITMQCLUSTER
We can also let the release generate a random password and retrieve it from a secret.