forked from pivotal-cf/docs-pcf-install
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path_ert_database_external.html.md.erb
38 lines (29 loc) · 2.27 KB
/
_ert_database_external.html.md.erb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
1. Ensure that you have a database instance with the following databases created. The steps vary depending on your database type. For an example procedure, see [Creating Databases for PAS](./create-pas-dbs.html).
* `account`
* `app_usage_service`
* `autoscale`
* `credhub`
* `diego`
* `locket`
* `networkpolicyserver`
* `nfsvolume`
* `notifications`
* `routing`
* `silk`
* `uaa`
1. In PAS, select **Databases**.
1. Select the **External Databases** option.
<p class="note"><strong>Note:</strong> If you configure external databases, you cannot configure an internal database in the <strong>UAA</strong> pane.</p>
1. For **Hostname**, enter the hostname of the database server. If you are installing PCF using Terraform, this value corresponds to the following variable:
* **AWS Terraform**: `rds_address`
* **GCP Terraform**: `sql_db_ip`
1. For **TCP Port**, enter the port of the database server.
* If you are using GCP CloudSQL, enter `3306`.
* If you are installing PCF on AWS using Terraform, enter the value for `rds_port`.
1. Each component that requires a relational database has two corresponding fields: one for the database username and one for the database password. For each set of fields, specify a unique username that can access this specific database on the database server and a password for the provided username. If you are installing PCF using Terraform, these values correspond to the following variables:
* **AWS Terraform**: `rds_username` and `rds_password`
* **GCP Terraform**: `pas_sql_username` and `pas_sql_password`
<p class='note'><strong>Note:</strong> Ensure that the networkpolicyserver database user has the <code>ALL PRIVILEGES</code> permission.</p>
1. (Optional) If you want to enable TLS for your external databases, paste your Certificate Authority (CA) certificate in the **Database CA Certificate** field.
<p class='note'><strong>Note:</strong> TLS is not currently supported for databases that do not include a matching hostname in their server certificate, e.g. GCP. For more information, see <a href="https://cloud.google.com/sql/docs/mysql/external-connection-methods?hl=en_US&_ga=2.66322158.-1313814630.1518122831">Connection Options for External Applications</a> in the GCP documentation.</p>
1. Click **Save**.