Jump to main content
HCL Logo Product Documentation
  • Customer Support
  • Cloud Native Unica
  • Implementation Guides
  • Release Notes
  • Cloud Native Unica Support Matrix
  • PDFs
  • Notices
  1. Home
  2. Implementation Guides
  3. Implementation Guide for Apache Tomcat
  4. Using AWS Secrets and Configuration Provider with Kubernetes Secret Store CSI Driver

    AWS Secrets Manager securely retrieves secrets from the AWS Secrets Manager for Amazon Elastic Kubernetes Service (Amazon EKS) Kubernetes pods.

  5. AWS Secret Manager Implementation

    To implement AWS Secret Manager, ensure that the prerequisites are met and the configurations are executed.

  • Implementation Guides
    • Implementation Guide for Apache Tomcat
      • Docker, Kubernetes, and Helm

        In this release, we have implemented Cloud Native Unica using Docker, Kubernetes, and Helm.

      • ELK Overview

        The ELK Stack is a collection of three open-source products: Elasticsearch, Logstash, and Kibana.

      • Pre-installation configurations

        Before installing or upgrading to Cloud Native Unica, you should complete some configurations.

      • Cloud Native Unica Helm release architecture

        The following is a diagrammatic representation of the Cloud Native Unica Helm release architecture:

      • Helm chart configuration

        Before you start the installation or upgrade of Cloud Native Unica, you should configure the appropriate configMap YAML files.

      • Installation and verifying the installation
      • Post installation configurations

        The following topics contain details about post installation configurations related to the products of Unica.

      • Migration of on-premises applications to Cloud Native Unica
      • Cloud Native Unica upgrade

        To upgrade an earlier version of Cloud Native Unica to a newer version, complete the following steps:

      • Scaling Unica containers

        Scaling a deployment ensures creation and scheduling of new Pods. Scaling increases the number of Pods to the new required state. Kubernetes also supports autoscaling of Pods.

      • Using Red Hat OpenShift

        You can use OpenShift to develop and runcontainerized applications. OpenShift allows applications, and the data centers that support them, to expand from just a few machines and applications to thousands of machines that serve millions of clients.

      • Deployment monitoring

        The Kubernetes Dashboard is a web-based user interface to monitor deployments.

      • Product utilities

        You can execute all the utilities of the Unica products in their assigned pods.

      • Using secret to avoid passwords in plain text

        To use a secret to avoid using passwords in plain text, complete the following steps:

      • Using AWS Secrets and Configuration Provider with Kubernetes Secret Store CSI Driver

        AWS Secrets Manager securely retrieves secrets from the AWS Secrets Manager for Amazon Elastic Kubernetes Service (Amazon EKS) Kubernetes pods.

        • AWS Secret Manager Implementation

          To implement AWS Secret Manager, ensure that the prerequisites are met and the configurations are executed.

          • Prerequisite Software for AWS Secret Manager

            The prerequisite software requirement for AWS Secret Manager are as follows:

          • Prerequisite Configurations for AWS Secret Manager

            Before implementing AWS Secret Manager, make the following configurations:

          • Implementing AWS Secret Manager

            To implement AWS Secret Manager on your setup, complete the following steps:

      • FAQs and troubleshooting

        This section covers the frequently asked questions and troubleshooting issues.

      • Uninstalling the chart
      • Appendix: Description of Helm chart parameters

        The following topics contain description of the parameters present in the configMap YAML files:

    • Implementation Guide for Red Hat JBoss Enterprise Application Platform
    • Implementation Guide for Oracle WebLogic Server

AWS Secret Manager Implementation

To implement AWS Secret Manager, ensure that the prerequisites are met and the configurations are executed.

For more details, see the following topics:
  • Prerequisite Software for AWS Secret Manager
  • Prerequisite Configurations for AWS Secret Manager
  • Implementing AWS Secret Manager
  • Prerequisite Software for AWS Secret Manager
    The prerequisite software requirement for AWS Secret Manager are as follows:
  • Prerequisite Configurations for AWS Secret Manager
    Before implementing AWS Secret Manager, make the following configurations:
  • Implementing AWS Secret Manager
    To implement AWS Secret Manager on your setup, complete the following steps:

Have feedback?
Google Analytics is used to store comments and ratings. To provide a comment or rating for a topic, click Accept All Cookies or Allow All in Cookie Preferences in the footer of this page.

Rate this topic


Comment on this topic.
  • Share: Email
  • Twitter
  • Disclaimer
  • Privacy
  • Terms of use
  • Cookie Preferences