This is an IBM Automation portal for Integration products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
See this idea on ideas.ibm.com
We are running ACE SC-2 release pods on CP4I on Openshift on Azure, we have complex CI/CD pipelines + ArgoCD to rollout ACE integrations. Sometimes we need ACE pods with unique keystores as some partners require mTLS and usually issue a personal certificate (.p12). We upload this certificate to Azure key vault from where it is automatically synced as an Openshift secret of type "kubernetes.io/tls" (with a tls.crt and tls.key Data fields) using a utility.
The issue is that the ACE configuration "keystore" integration server configuration object type expects a generic Openshift secret which contains the .p12 keystore itself (see command below), this is not GitOps friendly as we need a script or pipeline to extract the synced secret and create a generic secret which is against our configuration driven policy in our company.
It would be great if IBM can fix this by accepting Openshift secret of type "kubernetes.io/tls" and then building a .p12 file underneath and mounting it to the ACE pod.
Official documentation: https://www.ibm.com/docs/en/app-connect/containers_cd?topic=types-keystore-type
oc -n ace create secret generic conf-keystore --from-file=configuration=ace.p12
apiVersion: appconnect.ibm.com/v1beta1
kind: Configuration
metadata:
name: conf-keystore
namespace: ace
spec:
secretName: conf-keystore
type: keystore
version: 12.0.12.0-r1-lts
Idea priority | High |
By clicking the "Post Comment" or "Submit Idea" button, you are agreeing to the IBM Ideas Portal Terms of Use.
Do not place IBM confidential, company confidential, or personal information into any field.
Thank you for taking the time to raise this idea. Whilst unlikely to be an immediate short term priority for us (especially noting that we tend to ship enhancements in our CD stream prior to rolling updates into the SC2 stream which we treat as the more stable offering), we will place this into Future Consideration status, noting that in future it is possible we could overhaul our approach to storing configuration more generally at which point we may wish to use K8S secrets directly and for a wider array of data types.
Hi Abu, Thanks for raising this - passing it onto the App Connect team for appropriate review.