Secrets and Configuration Restore¶
To restore a DataRobot application with previously backed up configuration and secrets, you must use that configuration during the installation of the new DataRobot application.
Important: Old secrets can only be restored during the DataRobot chart installation. It is not possible to add them to an already deployed DataRobot application.
Restore Encryption Keys¶
Add the encryption key values to the values.yaml file of the DataRobot Helm chart before installing the application. This configuration will make the cluster use the old secrets instead of generating new ones:
core:
services:
core:
asymmetrickey: # Value from ASYMMETRIC_KEY_PAIR_MONGO_ENCRYPTION_KEY.txt
drsecurekey: # Value from DRSECURE_MONGO_ENCRYPTION_KEY.txt
Configure Custom Certificates¶
For each custom certificate that was previously used, you need to create a Kubernetes secret from the backed up file.
Step 1: Create the Kubernetes Secret¶
kubectl -n $DR_CORE_NAMESPACE create secret generic rabbit-cert --from-file=./path/to/certificate
Step 2: Map Secrets in values.yaml¶
In your values.yaml file, create a mapping of these secrets to filesystem paths inside the container. Paths are relative to the /opt/datarobot/etc/certs directory:
globals:
certs:
# Previously created secret
- secret: rabbit-cert
# Will be mounted at /opt/datarobot/etc/certs/rabbit-cert.pem
path: rabbit-cert.pem