Changing BMC Helix Edge secrets and credentials
This section outlines the process for updating BMC Helix Edge secrets and credentials that were initially set during deployment.
The following are the supported secrets:
- MQTT message bus connection details
- DB connection details
- Consul connection details
- ADE connection details
- BMC DWP connection details
- Docker registry connection details
To update the secret
Execute the following command to initiate the secret update process:
Bash
./deploy.sh <namespace> -updatesecrets
The script presents a list of secrets.- Select the index (1-6) of the secret you wish to modify.
The system prompts you to specify which connection details such as username, and password within the selected secret need updating. - For sensitive values such as passwords, select regenerate a new secret automatically.
- If you prefer to provide a new value manually, enter it when the system prompt.
- To skip modifying a specific field, press ENTER without entering any value.If any part of a secret is modified, the Kubernetes Helix Edge stack automatically restarts.
- Wait for all Kubernetes services/pods to stabilize and make sure the BMC Helix Edge UI is accessible and functioning correctly.
To apply secret changes on Helix Edge nodes
If you change any secrets on the core machine, you must replicate the changes on all the BMC Helix Edge nodes.
Use the following steps on each node machine:
- Wait until all Kubernetes pods on the Core machine are stable and the Helix Edge UI is accessible.
- On the Core installer machine, locate the following secret files in the /tmp/ directory:
- .mqttencpwd
- .cnslenctok
- nats.crt.pem
- nats.key.pem
- Copy these files to the /temp/ directory on each mode machine.
On each node machine, navigate to the hedge-node installation and run the following commands:
Bash
make down
make run env=nodeWait for all Docker containers to stabilize on the Node before proceeding to the next Node.
.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*