<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://all.docs.genesys.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jumunn</id>
	<title>Genesys Documentation - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://all.docs.genesys.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jumunn"/>
	<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/Special:Contributions/Jumunn"/>
	<updated>2026-05-23T20:30:17Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide/DeployIngress&amp;diff=124267</id>
		<title>GWS/Current/GWSPEGuide/DeployIngress</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide/DeployIngress&amp;diff=124267"/>
		<updated>2022-07-08T16:26:53Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ArticlePEServiceDeploy&lt;br /&gt;
|ServiceId=11ff3d39-ae2b-4526-b7e5-7dcdf781ef01&lt;br /&gt;
|IncludedServiceId=1dd952ea-ff42-44ac-9046-ca5786df98c8&lt;br /&gt;
|IncludeAssumptions=Yes&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext={{NoteFormat|If you are deploying Genesys Web Services and Applications in a single namespace with other private edition services, then you do not need to deploy GWS ingress.|3}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Prerequisites&lt;br /&gt;
|anchor=prerequisites&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Before you deploy GWS ingress, you must first {{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Deploy}} and {{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ConfigureIngress}}.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Deploy&lt;br /&gt;
|anchor=deploy&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=To deploy GWS ingress, you need the GWS ingress Helm package and override file. Copy '''values.yaml''' and the Helm package ('''gws-ingress-&amp;lt;version&amp;gt;.tgz''') to the installation location.&lt;br /&gt;
&lt;br /&gt;
For OpenShift, select the '''gws''' project you created in {{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Deploy|anchor=OpenShift|display text=Prepare your environment}}:&lt;br /&gt;
 oc project gws&lt;br /&gt;
Run the following command to deploy GWS ingress:&lt;br /&gt;
 helm upgrade --install gws-ingress &amp;lt;helm_directory&amp;gt;/gws-ingress --version=&amp;lt;version&amp;gt; -n gws -f ./override.gws-ingress.values.yaml -f ./versions.yaml&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Create routes in OpenShift&lt;br /&gt;
|anchor=https&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Follow the instructions to configure external access to GWS ingress in OpenShift. &lt;br /&gt;
&lt;br /&gt;
Genesys recommends using the following hostname format: &amp;lt;code&amp;gt;gws.&amp;lt;cluster-subdomain&amp;gt;&amp;lt;/code&amp;gt;. For example, the VCE cluster (&amp;lt;nowiki&amp;gt;https://console-openshift-console.apps&amp;lt;/nowiki&amp;gt;.&amp;lt;yourclusterdomain&amp;gt;.com/) should have the hostname '''gws.&amp;lt;yourclusterdomain&amp;gt;.com'''&lt;br /&gt;
&lt;br /&gt;
 oc create route edge --service=gws-service-proxy --hostname=&amp;lt;hostname&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Validate the deployment&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=First, check that the pod is running:&lt;br /&gt;
&lt;br /&gt;
 kubectl get pod&lt;br /&gt;
&lt;br /&gt;
The result should show that gws-service-proxy is running. For example:&lt;br /&gt;
&lt;br /&gt;
 gws-service-proxy-d5997957f-m4kcg 1/1 Running 0 4d13h&lt;br /&gt;
&lt;br /&gt;
Check the service:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
kubectl get svc&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;The result should display the service name, gws-service-proxy. For example:&lt;br /&gt;
&lt;br /&gt;
 gws-service-proxy ClusterIP 10.202.55.20 &amp;lt;none&amp;gt; 80/TCP,81/TCP,85/TCP,86/TCP 4d13h&lt;br /&gt;
&lt;br /&gt;
Check the '''gws-ingress''' status:&lt;br /&gt;
 helm status gws-ingress -n gws&lt;br /&gt;
&lt;br /&gt;
The result should show the namespace details with a status of deployed:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight&amp;gt;NAME: gws-ingress&lt;br /&gt;
LAST DEPLOYED: Fri Sep 17 11:54:31 2021&lt;br /&gt;
NAMESPACE: gws&lt;br /&gt;
STATUS: deployed&lt;br /&gt;
REVISION: 1&lt;br /&gt;
TEST SUITE: None&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Check the installed Helm release:&lt;br /&gt;
 helm list –n gws&lt;br /&gt;
&lt;br /&gt;
The result should show the '''gws-services''' and '''gws-ingress''' deployment details. For example:&lt;br /&gt;
&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NAME            NAMESPACE    REVISION    UPDATED                                 STATUS       CHART                  APP VERSION&lt;br /&gt;
&lt;br /&gt;
gws-ingress     gws          1           2021-09-17 11:54:31.339091 -0300 ADT    deployed     gws-ingress-0.2.7      1.0       &lt;br /&gt;
&lt;br /&gt;
gws-services    gws          1           2021-09-17 11:43:50.0692273 -0300 ADT   deployed     gws-services-1.0.55    1.0&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
Check the GWS Kubernetes objects created by Helm:&lt;br /&gt;
 kubectl get all -n gws&lt;br /&gt;
The result should show all the created pods, services, ConfigMaps, and so on.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Next steps&lt;br /&gt;
|anchor=next&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Provision}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/Configure&amp;diff=120976</id>
		<title>AUTH/Current/AuthPEGuide/Configure</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/Configure&amp;diff=120976"/>
		<updated>2022-05-27T19:43:04Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Article&lt;br /&gt;
|Standalone=No&lt;br /&gt;
|DisplayName=Configure Genesys Authentication&lt;br /&gt;
|Context=Learn how to configure Genesys Authentication.&lt;br /&gt;
|ComingSoon=No&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Complete the steps on this page to configure your Genesys Authentication deployment.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Add Java KeyStore support (optional)&lt;br /&gt;
|anchor=jks&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Complete the steps in this section to set up a [https://en.wikipedia.org/wiki/Java_KeyStore Java KeyStore] (JKS) if you need to configure Genesys Authentication to use [https://jwt.io/ JSON Web Token] authentication. This method of authentication is currently used for {{Link-AnywhereElse|product=WebRTC|version=Current|manual=WebRTCPEGuide|display text=WebRTC}}.&lt;br /&gt;
&lt;br /&gt;
Create a keystore file:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;keytool -keystore idp_keystore.jks -genkey -alias gws-auth-key -storepass &amp;lt;password&amp;gt; -keypass &amp;lt;password&amp;gt; -keyalg RSA&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Get the Base64 encoded key:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;cat ./idp_keystore.jks | base64&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The result looks like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;/u3+7QAAAAIAAAABAAAAAQAMZ3dzLWF1dGgta2V5AAABeRmB2Y4AAAUBMIIE/TAOBgorBgEEASoCEQEBBQAEggTpwQQ5aW5CUYAsf4/IheBuNrlPPyZhUA+NWh3SG52HV3sVjV+p18vKp2k/q12I9NynoM6R/DW5bFfEWU1zx3cfXH2kNirRUOIbNZpa43NOroyyF1GSdZFlwa8Kq8Xtp8ZBmiJdSb1n12ODaTKGKv1cb5tsfdzkWs99QeTBGJypHMCdnBvdFB0Nvid+yaxdmK3bdQlCwDgDOHZ2RnU0oxXebH3o+jIrrowyo7DidJDyUwIeT2PPPI9F88QsP+CdDRRR1T7t0ojd1hIJ8YYMwJ1wQmwgF4QZRbtrEnwXqkHinJnwOERcp4FLuceds6YTlcxvWsS+GEv38Jv8YokLwRb/mMACTHk4R9yASsd7fljgNLSn0jhrz9FuxvYgpOVvExiq+sb5YrfbZjtTzZDzFVOu/2kWzASfZBSiyyxMOr3IhUPkMpIrg+UYkI0tgn/C3yR1wLr9HElpx8fCu61ORqp8hhp1yvL46K0c6eTa2JcRpO6fmysf2EG0JagG7zNEJHlvtNnt3JpQV06xos2iWsFAtHq+9w8LwvCVbDzx/UHoCYenIdJ7SBv06mXgKisa3RDIi/y5x5/9T4brgCLUvwI4Z5Rf/oi2Zx5/lXjQXmBPlPAcUVHLr5PvNQUUx5NBr/ooioD7qka4ADF1/cx8I2bzqTi+U01fiFdMGRlNlCfcGDMI2h82JUeCswRYi4+dMDiSaGgC2MoL2susLxMYa5CTo9Vs0Y2k+6j8fhIO4h8h0JxdXZODU63OM0cDSUHXfbyKSey/4IhiV3k7W4OHYeXUeDvoNmfo/AriELZl+WgYETiXGsKzxmrsHrBKC0+aT098FwqdY9ACsM/7WoF2+9eftc7fa2jruutrRjmk0A/BaIqzboJLFiWaUUGV9gsexEmpGszikQsmOYSIRxY8BYF+SYldehcfcsRRxDnhTaGNV8y2ZnwA61FNPAFps3gaFXeaYsUzlxTSi9m70HJJrUp7JDK6SGg6luiKMG4O7QjsGgOOwGpoLJf7EFOCspN3t4damhH/KFi9OrEuAdhMJa+iQ21PBZ+iIwxb0y9xMReImoUtoqy6Epre3qMOS6MILLw2bVrxJYo38+hR5uzNdlbsUlpYOoorI1Hp8A/VEYtG9PDHEhhoqUamdUYUzkFDi9QZfylIgi8Jc4G4PPrPKgMPqqE7sl6bJvoLavU58eHpdWo/Mb9UtdTx+l/SlulCCE0Xce6M9YE1SyC2B3gd82zNQa81lx+QAY8IaSmX+C2nMz+UeXKngSEzguK6gXg9RwCs8pUavuLQ6uZGkJ+fhDBvDAFgD7hG1XdHs27XGSUsRq6GiiwmjZXsZ70ETIVmXfuSvGuYYpv4CKzIDvweGdbkUWap2oQqm6Sw+OkJLbim1aW4MSYGCZItLOM36108onELop0wTIMiZBv2cIaQ+WzbyKDXIi94ebntxu42GSeUn1IGDMGAa+vh4itLDV6yIXCRHCd9GM6JBj+SKXkn+J0FIZ257Kf4k3kg6rm9Ha1800NMB7ILrbJChCZd5bmDmMwUGsNrlar2Oa4S41Y81vmBQJlMzSvAS37gk3eFX3XLKtfn7+Dxq8aYRA0TQEMln0uUuoiNRZH8iaLwhpI4bEkaoSU/DT/KHRB7AHN5/vQpj6KOscxqmyPrgPY/+TseczEeaQLQ6MfjvXY+AAAAAQAFWC41MDkAAAN7MIIDdzCCAl+gAwIBAgIEYxhLHTANBgkqhkiG9w0BAQsFADBsMRAwDgYDVQQGEwdVbmtub3duMRAwDgYDVQQIEwdVbmtub3duMRAwDgYDVQQHEwdVbmtub3duMRAwDgYDVQQKEwdVbmtub3duMRAwDgYDVQQLEwdVbmtub3duMRAwDgYDVQQDEwdVbmtub3duMB4XDTIxMDQyODE3MjMzMFoXDTIxMDcyNzE3MjMzMFowbDEQMA4GA1UEBhMHVW5rbm93bjEQMA4GA1UECBMHVW5rbm93bjEQMA4GA1UEBxMHVW5rbm93bjEQMA4GA1UEChMHVW5rbm93bjEQMA4GA1UECxMHVW5rbm93bjEQMA4GA1UEAxMHVW5rbm93bjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK0300E4F3NDKRHYwrkqDgeUPwoIrozyLp6JvkCsOe1nj5L44vwJjnrYw9falOVDQ9ggwquwXoD5RNEf5/esYcJNEqu1btJLwLvhXb651OyZnsmeNGP2BrNCPXZS6CBReMMKJaZrlCwJQxiSrGPHB/gpxKoAowLwl3V7wB2BHKDhrczQBPdvtsfBAzeqpN/yRpdKZRAtu2LyGqRZKCglSrwYenJFqROdOeworbNmtIKXfQLiamE4KdhzQdPfnyBC7ZWtCIJUp9Va4LmCYD/ISOmVyfQ9Xql1rRNQLcVaewCKRM2ffBAkx98d3n79XUZDljOzHh+79tCpheuuYfbMQqMCAwEAAaMhMB8wHQYDVR0OBBYEFNtM8mIEb67VYot5tjDAdrhiq+31MA0GCSqGSIb3DQEBCwUAA4IBAQBued3SqK+1chAUpNz06Ceak2Ldzlz6MXxBZx6fx50odSY3C4rwywK31RSAAtCe/Ta4y+B6JcdPjFtII6Pf5W0DDTOa3cHNMeukYn5lBnaMbIKqoxFT7nM7MD3DB+dISvMu8FtVWFwbPzXWhl+Aycuu9ETGlCoJqYfl+vmLyGjJVadcUg4E3u7b29woO+bH9pagJErfi7Wq0vaaqMtkKjfOSovMTwz5ruXSiCDZlxb8C8CEr9lkpT3F0G1XFaNNOHoZiZNwXFKLoLrdI2t3pOCYyhwYbGKGMyitRguYz490dxZ0G5R4kMo/YbN7be2QIJwmucIZzH7fkU90V+rmVZhl9Bo8ixuIJG/vZTxmEBaDqmhiP4w=&amp;lt;/source&amp;gt;&lt;br /&gt;
Make note of the following values - you need them to configure JKS support in the {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=Override|display text=Helm chart}}:&lt;br /&gt;
&lt;br /&gt;
*Keystore filename&lt;br /&gt;
*Keystore password&lt;br /&gt;
*Key alias&lt;br /&gt;
*Key password&lt;br /&gt;
*Base64 encoded key&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Configure a secret to access JFrog&lt;br /&gt;
|anchor=Secret&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=If you haven't done so already, create a secret for accessing the JFrog registry:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;kubectl create secret docker-registry &amp;lt;credential-name&amp;gt; --docker-server=&amp;lt;docker repo&amp;gt; --docker-username=&amp;lt;username&amp;gt; --docker-password=&amp;lt;password&amp;gt; --docker-email=&amp;lt;emailid&amp;gt;&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now map the secret to the default service account:&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;kubectl secrets link default &amp;lt;credential-name&amp;gt; --for=pull&amp;lt;/source&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Override Helm chart values&lt;br /&gt;
|anchor=Override&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=You can specify parameters for the deployment by overriding Helm chart values in the '''values.yaml''' file. See the '''Parameters''' table for a full list of overridable values.&lt;br /&gt;
&lt;br /&gt;
For more information about how to override Helm chart values, see {{SuiteLevelLink|helmoverride}} in the {{Link-AnywhereElse|product=PrivateEdition|version=Current|manual=PEGuide}} guide.&lt;br /&gt;
&lt;br /&gt;
If you want to use arbitrary UIDs in your OpenShift deployment, you must override the '''securityContext''' settings in the '''values.yaml''' file, so that no user or group IDs are specified. For details, see {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=Security|display text=Configure security}} below.&lt;br /&gt;
{{{!}} class=&amp;quot;wikitable&amp;quot; style=&amp;quot;table-layout: fixed; overflow-wrap: break-word;&amp;quot; {{!}}&lt;br /&gt;
{{!}}+&lt;br /&gt;
Parameters&lt;br /&gt;
!Parameter&lt;br /&gt;
!Description&lt;br /&gt;
!Valid values&lt;br /&gt;
!Default&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}gws-core-auth&lt;br /&gt;
{{!}}The gws-core-auth image version tag. For example, 100.0.003.3508.&lt;br /&gt;
{{!}}A valid image version&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}gws-core-environment&lt;br /&gt;
{{!}}The gws-core-environment image version tag. For example, 100.0.003.1866.&lt;br /&gt;
{{!}}A valid image version&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}gws-ui-auth&lt;br /&gt;
{{!}}The gws-ui-auth image version tag. For example, 100.0.003.1328.&lt;br /&gt;
{{!}}A valid image version&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}image.imagePullSecrets&lt;br /&gt;
{{!}}The secret Kubernetes uses to get credentials to pull images from the registry.&lt;br /&gt;
{{!}}A valid secret&lt;br /&gt;
{{!}}[]&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}image.pullPolicy&lt;br /&gt;
{{!}}Specifies when Kubernetes pulls images from the registry on start up.&lt;br /&gt;
{{!}}IfNotPresent or Always&lt;br /&gt;
{{!}}&amp;quot;IfNotPresent&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}image.registry&lt;br /&gt;
{{!}}Docker registry address&lt;br /&gt;
{{!}}A valid registry URL&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}{{AnchorDiv|consul}}consul.discovery_register&lt;br /&gt;
{{!}}Specifies whether services are registered in Consul.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.discovery_tenants&lt;br /&gt;
{{!}}Enables tenant discovery through Consul.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.enabled&lt;br /&gt;
{{!}}Enables a connection to Consul.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.host&lt;br /&gt;
{{!}}The host of the local Consul agent.&lt;br /&gt;
{{!}}A valid URL&lt;br /&gt;
{{!}}&amp;quot;&amp;lt;nowiki&amp;gt;http://$(K8_HOST_IP)&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.port&lt;br /&gt;
{{!}}The port of the local Consul agent.&lt;br /&gt;
{{!}}A valid port&lt;br /&gt;
{{!}}8500&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.require_token&lt;br /&gt;
{{!}}Specifies whether Genesys Authentication reads the API token from a Kubernetes secret.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.secret.create&lt;br /&gt;
{{!}}Create or use an existing secret with the Consul API token.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.secret.name_override&lt;br /&gt;
{{!}}The name of the Kubernetes secret for Consul.&lt;br /&gt;
{{!}}A valid secret name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}consul.secret.token&lt;br /&gt;
{{!}}The API token to access Consul.&lt;br /&gt;
{{!}}A valid API token&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}ingress.enabled&lt;br /&gt;
{{!}}Enables external ingress for Genesys Authentication.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}{{AnchorDiv|ingress.frontend}}ingress.frontend&lt;br /&gt;
{{!}}The host that is used by external ingress.&lt;br /&gt;
{{!}}A valid host&lt;br /&gt;
{{!}}&amp;quot;gauth.local&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}ingress.annotations.&lt;br /&gt;
{{!}}Annotations that are applied to external ingress. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}nginx.ingress.kubernetes.io/proxy-body-size: &amp;quot;0&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}ingress.tls_enabled&lt;br /&gt;
{{!}}Enables Transport Layer Security (TLS) on external ingress.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}ingress.tls&lt;br /&gt;
{{!}}The name of the secret for Secure Sockets Layer (SSL) certificates.&lt;br /&gt;
{{!}}A valid secret name&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
- hosts:&lt;br /&gt;
  - gauth.local&lt;br /&gt;
  secretName: letsencrypt&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}internal_ingress.enabled&lt;br /&gt;
{{!}}Enables internal ingress for Genesys Authentication.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}{{AnchorDiv|internal_ingress.frontend}}internal_ingress.frontend&lt;br /&gt;
{{!}}The host that is used by internal ingress.&lt;br /&gt;
{{!}}A valid host&lt;br /&gt;
{{!}}&amp;quot;gauth-int.local&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}internal_ingress.annotations&lt;br /&gt;
{{!}}Annotations that are applied to internal ingress. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}nginx.ingress.kubernetes.io/proxy-body-size: &amp;quot;0&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}{{AnchorDiv|internal_ingress.tls_enabled}}internal_ingress.tls_enabled&lt;br /&gt;
{{!}}Enables Transport Layer Security (TLS) on internal ingress.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}internal_ingress.tls&lt;br /&gt;
{{!}}The name of the secret for Secure Sockets Layer (SSL) certificates.&lt;br /&gt;
{{!}}A valid secret name&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
- hosts:&lt;br /&gt;
  - gauth-int.local&lt;br /&gt;
  secretName: letsencrypt&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}monitoring.enabled&lt;br /&gt;
{{!}}Specifies whether to deploy Custom Resource Definitions (CRD) for ServiceMonitors to determine which services should be monitored.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}monitoring.interval&lt;br /&gt;
{{!}}The interval at which Prometheus scrapes metrics.&lt;br /&gt;
{{!}}A duration in seconds&lt;br /&gt;
{{!}}&amp;quot;15s&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}monitoring.alarms&lt;br /&gt;
{{!}}Specifies whether to deploy CRD for PrometheusRules to define rules for alarms.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}monitoring.alarmThresholds.redisKeys&lt;br /&gt;
{{!}}The threshold to trigger an alarm on the total number of keys in Redis.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}5000000&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}monitoring.alarmThresholds.redisMaxMemoryPerentage&lt;br /&gt;
{{!}}The threshold to trigger an alarm for used Redis memory.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}85&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}monitoring.dashboards&lt;br /&gt;
{{!}}Specifies whether to deploy ConfigMaps with Grafana Dashboards.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}monitoring.pagerduty&lt;br /&gt;
{{!}}Enables alarms with a severity of &amp;lt;code&amp;gt;CRITICAL&amp;lt;/code&amp;gt;.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.affinity&lt;br /&gt;
{{!}}Specifies the affinity and anti-affinity for Genesys Authentication pods. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
podAntiAffinity:&lt;br /&gt;
  preferredDuringSchedulingIgnoredDuringExecution:&lt;br /&gt;
    - podAffinityTerm:&lt;br /&gt;
        labelSelector:&lt;br /&gt;
          matchLabels:&lt;br /&gt;
            gauth: '{{ .gauth }}'&lt;br /&gt;
            app.kubernetes.io/name: '{{ include &amp;quot;auth.name&amp;quot; . }}'&lt;br /&gt;
            app.kubernetes.io/instance: '{{ .Release.Name }}'&lt;br /&gt;
        topologyKey: failure-domain.beta.kubernetes.io/zone&lt;br /&gt;
      weight: 100&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.dnsConfig&lt;br /&gt;
{{!}}Specifies custom DNS settings for Genesys Authentication pods. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pods-dns-policy|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
options:&lt;br /&gt;
  - name: ndots&lt;br /&gt;
    value: &amp;quot;3&amp;quot;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.dnsPolicy&lt;br /&gt;
{{!}}Specifies the DNS policy for Genesys Authentication pods. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pods-dns-policy|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}&amp;quot;Default&amp;quot;, &amp;quot;ClusterFirst&amp;quot;, &amp;quot;ClusterFirstWithHostNet&amp;quot;, or &amp;quot;None&amp;quot;&lt;br /&gt;
{{!}}&amp;quot;ClusterFirst&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.nodeSelector&lt;br /&gt;
{{!}}The labels Kubernetes uses to assign pods to nodes. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/configuration/assign-pod-node/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.priorityClassName&lt;br /&gt;
{{!}}The class name Kubernetes uses to determine the priority of a pod relative to other pods. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/#priorityclass|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid priority class name&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.securityContext&lt;br /&gt;
{{!}}Specifies the privilege and access control settings Genesys Authentication pods. See {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=Security|display text=Configure security}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.strategy&lt;br /&gt;
{{!}}Specifies details for the rolling update strategy Genesys Authentication uses to upgrade it containers. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
type: RollingUpdate&lt;br /&gt;
rollingUpdate:&lt;br /&gt;
  maxSurge: 10&lt;br /&gt;
  maxUnavailable: 0&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}optional.tolerations&lt;br /&gt;
{{!}}The tolerations Kubernetes uses for advanced pod scheduling. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}[]&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}podDisruptionBudget.create&lt;br /&gt;
{{!}}Specifies whether to create a PodDisruptionBudget. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/tasks/run-application/configure-pdb/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}podDisruptionBudget.spec&lt;br /&gt;
{{!}}Specifies the details of your PodDisruptionBudget. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/tasks/run-application/configure-pdb/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid spec that defines a value for either minAvailable or maxUnavailable. Do not specify .spec.selector because it is calculated by Helm.&lt;br /&gt;
{{!}}minAvailable: 2&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}pod_autoscaler.auth.enabled&lt;br /&gt;
{{!}}Enables the Horizontal Pod Autoscaler for the Authentication Service. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}pod_autoscaler.auth.maxReplicas&lt;br /&gt;
{{!}}Specifies the maximum number of Authentication Service replicas the Horizontal Pod Autoscaler controller will scale.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}10&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}pod_autoscaler.auth.metrics&lt;br /&gt;
{{!}}Specifies resource metrics the Horizontal Pod Autoscaler controller uses to scale Authentication Service pods up or down. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
- type: Resource&lt;br /&gt;
  resource:&lt;br /&gt;
    name: cpu&lt;br /&gt;
    target:&lt;br /&gt;
      type: Utilization&lt;br /&gt;
      averageUtilization: 350%&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}pod_autoscaler.environment.enabled&lt;br /&gt;
{{!}}Enables the Horizontal Pod Autoscaler for the Environment Service. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}pod_autoscaler.environment.maxReplicas&lt;br /&gt;
{{!}}Specifies the maximum number of Environment Service replicas the Horizontal Pod Autoscaler controller will scale.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}10&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}pod_autoscaler.environment.metrics&lt;br /&gt;
{{!}}Specifies resource metrics the Horizontal Pod Autoscaler controller uses to scale Environment Service pods up or down. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
- type: Resource&lt;br /&gt;
  resource:&lt;br /&gt;
    name: cpu&lt;br /&gt;
    target:&lt;br /&gt;
      type: Utilization&lt;br /&gt;
      averageUtilization: 350%&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.deploy&lt;br /&gt;
{{!}}Specifies whether to deploy PostgreSQL. Set this option for lab environments only.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.image&lt;br /&gt;
{{!}}Specifies the Docker image to use in the lab environment if &amp;lt;code&amp;gt;postgres.deploy=true&amp;lt;/code&amp;gt;.&lt;br /&gt;
{{!}}A Docker image&lt;br /&gt;
{{!}}&amp;quot;postgres:11-alpine&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.configmap.create&lt;br /&gt;
{{!}}Specifies whether Genesys Authentication creates a ConfigMap with PostgreSQL connection parameters. If the value is false, you must create the ConfigMap manually.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.configmap.name_override&lt;br /&gt;
{{!}}The name of the ConfigMap.&lt;br /&gt;
{{!}}A value name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.db&lt;br /&gt;
{{!}}The name of Genesys Authentication's PostgreSQL database.&lt;br /&gt;
{{!}}A valid database name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.host&lt;br /&gt;
{{!}}The host of the PostgreSQL instance.&lt;br /&gt;
{{!}}A valid host&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.port&lt;br /&gt;
{{!}}The port of the PostgreSQL instance.&lt;br /&gt;
{{!}}A valid port&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.username&lt;br /&gt;
{{!}}The username to access Genesys Authentication's PostgreSQL database.&lt;br /&gt;
{{!}}A valid username&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.password&lt;br /&gt;
{{!}}The password to access Genesys Authentication's PostgreSQL database.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.secret.create&lt;br /&gt;
{{!}}Specifies whether to create a Kubernetes secret with user credentials for PostgreSQL. If this value is false, you must create the secret manually.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}postgres.secret.name_override&lt;br /&gt;
{{!}}The name of the PostgreSQL secret.&lt;br /&gt;
{{!}}A valid name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.cluster_nodes&lt;br /&gt;
{{!}}The Redis nodes in your cluster. For example, &amp;quot;redis-cluster1:7000,redis-cluster2:7002&amp;quot;.&lt;br /&gt;
{{!}}A comma-separated list of &amp;quot;host:port&amp;quot; pairs&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.configmap.create&lt;br /&gt;
{{!}}Specifies whether to create a ConfigMap with connection parameters for Redis. If this value is false, you must create the ConfigMap manually.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.configmap.name_override&lt;br /&gt;
{{!}}The name of the Redis ConfigMap.&lt;br /&gt;
{{!}}A valid name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.deploy&lt;br /&gt;
{{!}}Specifies whether to deploy a Redis cluster. Set this option for lab environments only.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.image&lt;br /&gt;
{{!}}Specifies the Docker image to use in the lab environment if &amp;lt;code&amp;gt;redis.deploy=true&amp;lt;/code&amp;gt;.&lt;br /&gt;
{{!}}A Docker image&lt;br /&gt;
{{!}}&amp;quot;redis:5-stretch&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.password&lt;br /&gt;
{{!}}The Redis password.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.password_required&lt;br /&gt;
{{!}}Specifies whether Genesys Authentication should read the Redis password from a Kubernetes secret.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.secret.create&lt;br /&gt;
{{!}}Specifies whether to create a Kubernetes secret with Redis password. If this value is false, you must create the secret manually.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}redis.secret.name_override&lt;br /&gt;
{{!}}The name of the Redis secret.&lt;br /&gt;
{{!}}A valid name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}{{AnchorDiv|redis.use_tls}}redis.use_tls&lt;br /&gt;
{{!}}Enable or disable a TLS connection to the Redis cluster.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}serviceAccount.create&lt;br /&gt;
{{!}}Specifies whether to create a service account.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}serviceAccount.name&lt;br /&gt;
{{!}}The name of the service account to use.&lt;br /&gt;
{{!}}A service account name&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}serviceAccount.annotations&lt;br /&gt;
{{!}}Annotations to add to the service account. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of labels as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.initContainers&lt;br /&gt;
{{!}}Optional init containers to add to Genesys Authentication deployments.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.location&lt;br /&gt;
{{!}}Location of the deployment. For example, &amp;quot;/USW1&amp;quot;.&lt;br /&gt;
{{!}}A valid location.&lt;br /&gt;
{{!}}&amp;quot;/&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.replicas&lt;br /&gt;
{{!}}The number of Genesys Authentication pod replicas to deploy.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}3&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.db.init&lt;br /&gt;
{{!}}Enable automatic updates for the database schema.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.db.poolCheckoutTimeout&lt;br /&gt;
{{!}}The database pool timeout.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}3000&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.db.poolSize&lt;br /&gt;
{{!}}The database pool size.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}3&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.db.ssl&lt;br /&gt;
{{!}}Enable or disable an SSL connection to PostgreSQL. See the {{#Widget:ExtLink|link=https://www.postgresql.org/docs/9.0/libpq-ssl.html|displaytext=PostgreSQL documentation}} for details about SSL modes.&lt;br /&gt;
{{!}}disable, prefer, require, verify-ca, or verify-full&lt;br /&gt;
{{!}}&amp;quot;disable&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.loglevel&lt;br /&gt;
{{!}}Specifies the log level for the Authentication Service.&lt;br /&gt;
{{!}}INFO, DEBUG, WARN&lt;br /&gt;
{{!}}DEBUG&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.deploymentAnnotations&lt;br /&gt;
{{!}}Annotations for Authentication Service deployment objects. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.env.GWS_AUTH_SECURITY_HTTP_SCHEME_HEADER_NAME&lt;br /&gt;
{{!}}The name of the header with protocol. This value can be used when HTTPS is terminated by the load balancer.&lt;br /&gt;
{{!}}A valid header name&lt;br /&gt;
{{!}}&amp;quot;X-Forwarded-Proto&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.env.GWS_AUTH_timeouts_requestTimeoutMs&lt;br /&gt;
{{!}}The Authentication Service request timeout.&lt;br /&gt;
{{!}}A value in milliseconds&lt;br /&gt;
{{!}}30000&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.env.JAVA_TOOL_OPTIONS&lt;br /&gt;
{{!}}Specifies JVM arguments to set in the JAVA_TOOL_OPTIONS environment variable.&lt;br /&gt;
{{!}}Valid JVM arguments&lt;br /&gt;
{{!}}&amp;quot;-XX:+PrintFlagsFinal -XX:+UseG1GC -Dfile.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -XX:MaxRAMPercentage=80.0&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.env.GWS_AUTH_logging_level_com_genesys_gws_v3&lt;br /&gt;
{{!}}Specifies the log level for the Authentication Service.&lt;br /&gt;
{{!}}INFO, DEBUG, WARN&lt;br /&gt;
{{!}}DEBUG&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.env.GWS_AUTH_http_headers_frame_options&lt;br /&gt;
{{!}}Specifies the value of the X-Frame-Options HTTP response header.&lt;br /&gt;
{{!}}SAMEORIGIN, DENY, DISABLE, ALLOW&lt;br /&gt;
{{!}}ALLOW&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.enabled&lt;br /&gt;
{{!}}Specifies whether Genesys Authentication uses Java KeyStore. See {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=jks|display text=Add JKS support}} for details. This value must be set to true for Security Assertion Markup Language single sign-on (SAML SSO) functionality.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.keyAlias&lt;br /&gt;
{{!}}The name of the key alias in the keystore used by the Authentication Service. This value comes from {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=jks|display text=Add JKS support}}.&lt;br /&gt;
{{!}}A valid key alias&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.keyPassword&lt;br /&gt;
{{!}}The keystore password from {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=jks|display text=Add JKS support}}.&lt;br /&gt;
{{!}}A valid keystore password&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.keyStore&lt;br /&gt;
{{!}}The name of the Java keystore file from {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=jks|display text=Add JKS support}}.&lt;br /&gt;
{{!}}A valid keystore name&lt;br /&gt;
{{!}}&amp;quot;jksStorage.jks&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.keyStorePassword&lt;br /&gt;
{{!}}The keystore password from {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=jks|display text=Add JKS support}}.&lt;br /&gt;
{{!}}A valid keystore password&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.secret.create&lt;br /&gt;
{{!}}Specifies whether to create a new secret with the keystore file content and keystore credentials.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.keyStoreFileData&lt;br /&gt;
{{!}}The Base64 encoded key value from {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=jks|display text=Add JKS support}}.&lt;br /&gt;
{{!}}A valid key&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.secret.name&lt;br /&gt;
{{!}}A Kubernetes secret name with the keystore credentials and content.&lt;br /&gt;
{{!}}A valid secret name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.jks.sso.enabled&lt;br /&gt;
{{!}}Specifies whether to enable SAML SSO functionality.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.livenessProbe&lt;br /&gt;
{{!}}Specifies parameters for the livenessProbe. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
livenessProbe:&lt;br /&gt;
  httpGet:&lt;br /&gt;
    path: /health&lt;br /&gt;
    port: management&lt;br /&gt;
  initialDelaySeconds: 120&lt;br /&gt;
  periodSeconds: 10&lt;br /&gt;
  successThreshold: 1&lt;br /&gt;
  timeoutSeconds: 3&lt;br /&gt;
  failureThreshold: 3&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.readinessProbe&lt;br /&gt;
{{!}}Specifies parameters for the readinessProbe. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
readinessProbe:&lt;br /&gt;
  httpGet:&lt;br /&gt;
    path: /health&lt;br /&gt;
    port: management&lt;br /&gt;
  initialDelaySeconds: 30&lt;br /&gt;
  timeoutSeconds: 3&lt;br /&gt;
  periodSeconds: 10&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.replicas&lt;br /&gt;
{{!}}The number of Authentication Service pod replicas to deploy. This value overrides services.replicas.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.resources&lt;br /&gt;
{{!}}The requests and limits for Authentication Service pod resources. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
requests:&lt;br /&gt;
  cpu: 500m&lt;br /&gt;
  memory: 4Gi&lt;br /&gt;
limits:&lt;br /&gt;
  cpu: &amp;quot;4&amp;quot;&lt;br /&gt;
  memory: 6Gi&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth.serviceAnnotations&lt;br /&gt;
{{!}}Annotations for Authentication Service service objects. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth_ui.deploymentAnnotations&lt;br /&gt;
{{!}}Annotations for Authentication UI deployment objects. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth_ui.env.GWS_NGINX_ENABLE_MAPPING&lt;br /&gt;
{{!}}Use Consul to discover Auth Service&lt;br /&gt;
{{!}}&lt;br /&gt;
{{!}}&amp;quot;false&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth_ui.livenessProbe&lt;br /&gt;
{{!}}Specifies parameters for the livenessProbe. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth_ui.readinessProbe&lt;br /&gt;
{{!}}Specifies parameters for the readinessProbe. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth_ui.replicas&lt;br /&gt;
{{!}}The number of Authentication UI pod replicas to deploy. This value overrides services.replicas.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth_ui.resources&lt;br /&gt;
{{!}}The requests and limits for Authentication UI pod resources. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
requests:&lt;br /&gt;
  cpu: 100m&lt;br /&gt;
  memory: 500Mi&lt;br /&gt;
limits:&lt;br /&gt;
  cpu: 500m&lt;br /&gt;
  memory: 1Gi&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.auth_ui.serviceAnnotations&lt;br /&gt;
{{!}}Annotations for Authentication UI service objects. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.loglevel&lt;br /&gt;
{{!}}Specifies the log level for the Environment Service.&lt;br /&gt;
{{!}}INFO, DEBUG, WARN&lt;br /&gt;
{{!}}INFO&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.deploymentAnnotations&lt;br /&gt;
{{!}}Annotations for Environment Service deployment objects. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.env.JAVA_TOOL_OPTIONS&lt;br /&gt;
{{!}}Specifies JVM arguments to set in the JAVA_TOOL_OPTIONS environment variable.&lt;br /&gt;
{{!}}Valid JVM arguments&lt;br /&gt;
{{!}}&amp;quot;-XX:+PrintFlagsFinal -XX:+UseG1GC -Dfile.encoding=UTF-8 -XX:+ExitOnOutOfMemoryError -XX:MaxRAMPercentage=80.0&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.env.GWS_ENVIRONMENT_logging_level_com_genesys_gws_v3&lt;br /&gt;
{{!}}Specifies the log level for the Environment Service.&lt;br /&gt;
{{!}}INFO, DEBUG, WARN&lt;br /&gt;
{{!}}INFO&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.force_writable&lt;br /&gt;
{{!}}Ignore the Data Center topology in a single-region deployment.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.livenessProbe&lt;br /&gt;
{{!}}Specifies parameters for the livenessProbe. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
livenessProbe:&lt;br /&gt;
  httpGet:&lt;br /&gt;
    path: /health&lt;br /&gt;
    port: management&lt;br /&gt;
  initialDelaySeconds: 120&lt;br /&gt;
  periodSeconds: 10&lt;br /&gt;
  successThreshold: 1&lt;br /&gt;
  timeoutSeconds: 3&lt;br /&gt;
  failureThreshold: 3&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.readinessProbe&lt;br /&gt;
{{!}}Specifies parameters for the readinessProbe. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
readinessProbe:&lt;br /&gt;
  httpGet:&lt;br /&gt;
    path: /health&lt;br /&gt;
    port: management&lt;br /&gt;
  initialDelaySeconds: 30&lt;br /&gt;
  timeoutSeconds: 3&lt;br /&gt;
  periodSeconds: 10&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.replicas&lt;br /&gt;
{{!}}The number of Environment Service pod replicas. This value overrides services.replicas.&lt;br /&gt;
{{!}}Number&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.resources&lt;br /&gt;
{{!}}The requests and limits for Environment Service pod resources. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}Object&lt;br /&gt;
{{!}}&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
requests:&lt;br /&gt;
  cpu: 500m&lt;br /&gt;
  memory: 4Gi&lt;br /&gt;
limits:&lt;br /&gt;
  cpu: &amp;quot;4&amp;quot;&lt;br /&gt;
  memory: 6Gi&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.environment.serviceAnnotations&lt;br /&gt;
{{!}}Annotations for Authentication Service service objects. See the {{#Widget:ExtLink|link=https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/|displaytext=Kubernetes documentation}} for details.&lt;br /&gt;
{{!}}A valid set of annotations as &amp;quot;name: value&amp;quot;&lt;br /&gt;
{{!}}{}&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}{{AnchorDiv|services.secret.admin_password}}services.secret.admin_password&lt;br /&gt;
{{!}}Encrypted password of the operational user. The password should be encrypted with bcrypt hashing with any number of rounds. You can generate an encrypted password on the following site: https://www.javainuse.com/onlineBcrypt&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}{{AnchorDiv|services.secret.admin_username}}services.secret.admin_username&lt;br /&gt;
{{!}}The username of an operational user.&lt;br /&gt;
{{!}}Any valid username. For example, opsAdmin, clientAdmin, ops.&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secret.client_id&lt;br /&gt;
{{!}}The ID of an encrypted client secret.&lt;br /&gt;
{{!}}Any valid client ID. For example, external_api_client, nexus_client, authclient.&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secret.client_secret&lt;br /&gt;
{{!}}The encrypted client secret. The client secret should be encrypted with bcrypt hashing with any number of rounds. You can generate an encrypted client secret  on the following site:https://www.javainuse.com/onlineBcrypt&lt;br /&gt;
{{!}}A valid client secret&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secret.create&lt;br /&gt;
{{!}}Specifies whether to create the Kubernetes secret with the credentials of the operational user and client ID.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}true&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secret.name_override&lt;br /&gt;
{{!}}The name of the secret.&lt;br /&gt;
{{!}}A valid name&lt;br /&gt;
{{!}}nil&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.secretProviderClassNames.admin_user&lt;br /&gt;
{{!}}The name of the secretProviderClass with the operational user credentials.&lt;br /&gt;
{{!}}A valid class name&lt;br /&gt;
{{!}}&amp;quot;keyvault-gauth-admin-user&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.secretProviderClassNames.client_credentials&lt;br /&gt;
{{!}}The name of the secretProviderClass with the client credentials.&lt;br /&gt;
{{!}}A valid class name&lt;br /&gt;
{{!}}&amp;quot;keyvault-gauth-client-credentials&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.secretProviderClassNames.consul_token&lt;br /&gt;
{{!}}The name of the secretProviderClass with the Consul token.&lt;br /&gt;
{{!}}A valid class name&lt;br /&gt;
{{!}}&amp;quot;keyvault-consul-consul-gauth-token&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.secretProviderClassNames.jks_credentials&lt;br /&gt;
{{!}}The name of the secretProviderClass with the JKS credentials.&lt;br /&gt;
{{!}}A valid class name&lt;br /&gt;
{{!}}&amp;quot;keyvault-gauth-jks-credentials&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.secretProviderClassNames.jks_keyvault&lt;br /&gt;
{{!}}The name of the secretProviderClass with the JKS keystore.&lt;br /&gt;
{{!}}A valid class name&lt;br /&gt;
{{!}}&amp;quot;keyvault-gauth-jks-keyvault&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.secretProviderClassNames.pg_user&lt;br /&gt;
{{!}}The name of the secretProviderClass with PostgreSQL credentials.&lt;br /&gt;
{{!}}A valid class name&lt;br /&gt;
{{!}}&amp;quot;keyvault-gauth-pg-user&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.secretProviderClassNames.redis_password&lt;br /&gt;
{{!}}The name of the secretProviderClass with the Redis password.&lt;br /&gt;
{{!}}A valid class name&lt;br /&gt;
{{!}}&amp;quot;keyvault-gauth-redis-password&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}services.secrets.useSecretProviderClass&lt;br /&gt;
{{!}}Specifies whether to read secrets from the secretProviderClass instead of Kubernetes secrets.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Configure Kubernetes&lt;br /&gt;
|anchor=Kubernetes&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=The sections below provide more information about configuring Kubernetes.&lt;br /&gt;
&lt;br /&gt;
===ConfigMaps===&lt;br /&gt;
Genesys Authentication includes separate ConfigMaps for PostgreSQL and Redis configuration.&lt;br /&gt;
&lt;br /&gt;
'''PostgreSQL - configmap-pg.yaml'''&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;{{- if or .Values.postgres.configmap.create .Values.postgres.deploy }}&lt;br /&gt;
apiVersion: v1&lt;br /&gt;
kind: ConfigMap&lt;br /&gt;
metadata:&lt;br /&gt;
  name: {{ include &amp;quot;configmap.postgres&amp;quot; . }}&lt;br /&gt;
  namespace: {{ .Release.Namespace | quote }}&lt;br /&gt;
  labels:&lt;br /&gt;
    {{- include &amp;quot;gauth.labels&amp;quot; . | nindent 4 }}&lt;br /&gt;
    gauth: postgres&lt;br /&gt;
data:&lt;br /&gt;
  db: {{ required &amp;quot;Missing required parameter 'postgres.password'&amp;quot; .Values.postgres.db |quote}}&lt;br /&gt;
  host: {{ default ( include &amp;quot;name.postgres&amp;quot; . ) .Values.postgres.host |quote}}&lt;br /&gt;
  port: {{ default ( include &amp;quot;port.postgres.service&amp;quot; . ) .Values.postgres.port |quote }}&lt;br /&gt;
  {{- end }}&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Redis - configmap-redis.yaml'''&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;&lt;br /&gt;
{{ if or .Values.redis.configmap.create .Values.redis.deploy }}&lt;br /&gt;
apiVersion: v1&lt;br /&gt;
kind: ConfigMap&lt;br /&gt;
metadata:&lt;br /&gt;
  name: {{ include &amp;quot;configmap.redis&amp;quot; . }}&lt;br /&gt;
  namespace: {{ .Release.Namespace | quote }}&lt;br /&gt;
  labels:&lt;br /&gt;
    {{- include &amp;quot;gauth.labels&amp;quot; . | nindent 4 }}&lt;br /&gt;
    gauth: redis&lt;br /&gt;
data:&lt;br /&gt;
  cluster_nodes: {{ default ( include &amp;quot;service.redis&amp;quot; . ) .Values.redis.cluster_nodes | quote}}&lt;br /&gt;
  {{end}}&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Secrets===&lt;br /&gt;
The following Genesys Authentication services artifacts are stored as Kubernetes secrets:&lt;br /&gt;
&lt;br /&gt;
*Administrator user credentials for the Authentication API and Environment API services.&lt;br /&gt;
*OAuth 20 client IDs and client secrets for the Authentication API and Environment API services.&lt;br /&gt;
*PostgreSQL database credentials for the Environment API service.&lt;br /&gt;
*PostgreSQL database credentials for the Authentication API service.&lt;br /&gt;
*Java keystore password for Authentication API service.&lt;br /&gt;
*Credentials for access to a password-protected Redis (Access Key) for the Authentication API service.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Configure security&lt;br /&gt;
|anchor=Security&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=To learn more about how security is configured for private edition, be sure to read the {{Link-AnywhereElse|product=PrivateEdition|version=Current|manual=PEGuide|topic=Prerequisites|display text=Permissions}} and {{Link-AnywhereElse|product=PrivateEdition|version=Current|manual=PEGuide|topic=ConfigSecurity}} topics in the ''Setting up Genesys Multicloud CX Private Edition'' guide.&lt;br /&gt;
&lt;br /&gt;
The security context settings define the privilege and access control settings for pods and containers.&lt;br /&gt;
&lt;br /&gt;
By default, the user and group IDs are set in the '''values.yaml''' file as &amp;lt;tt&amp;gt;500:500:500&amp;lt;/tt&amp;gt;, meaning the '''genesys''' user.&lt;br /&gt;
&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
optional:&lt;br /&gt;
  securityContext:&lt;br /&gt;
    runAsUser: 500&lt;br /&gt;
    runAsGroup: 500&lt;br /&gt;
    fsGroup: 500&lt;br /&gt;
    runAsNonRoot: true&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Arbitrary UIDs in OpenShift===&lt;br /&gt;
If you want to use arbitrary UIDs in your OpenShift deployment, you must override the '''securityContext''' settings in the '''values.yaml''' file, so that you do not define any specific IDs.&lt;br /&gt;
&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
optional:&lt;br /&gt;
  securityContext:&lt;br /&gt;
    runAsUser: null&lt;br /&gt;
    runAsGroup: 0&lt;br /&gt;
    fsGroup: null&lt;br /&gt;
    runAsNonRoot: true&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
For details about these parameters and possible values, see '''optional.securityContext.*''' in the {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Configure|anchor=Override|display text=Parameters}} table above.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
|PEPageType=9c3ae89b-4f75-495b-85f8-d8c4afcb3f97&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/Metrics&amp;diff=120673</id>
		<title>AUTH/Current/AuthPEGuide/Metrics</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/Metrics&amp;diff=120673"/>
		<updated>2022-05-24T16:15:20Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Redirected page to AUTH/Current/AuthPEGuide/Observability&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[AUTH/Current/AuthPEGuide/Observability]]&lt;br /&gt;
{{Article&lt;br /&gt;
|Standalone=No&lt;br /&gt;
|DisplayName=Metrics&lt;br /&gt;
|Context=Learn which metrics you should monitor for Genesys Authentication and when to sound the alarm.&lt;br /&gt;
|ComingSoon=No&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext={{Notices|Notice=PEComingSoon}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
|PEPageType=21ecf3f4-ef12-4276-8872-1e0e3af9561e&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=Draft:RN/DigitalChannels/100.0.118.0000&amp;diff=120018</id>
		<title>Draft:RN/DigitalChannels/100.0.118.0000</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=Draft:RN/DigitalChannels/100.0.118.0000&amp;diff=120018"/>
		<updated>2022-05-06T16:41:03Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Jumunn moved page Draft:RN/DigitalChannels/100.0.118.0000 to Draft:RN/DigitalChannels/100.0.118.0865&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Draft:RN/DigitalChannels/100.0.118.0865]]&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide/ConfigureTLS&amp;diff=119922</id>
		<title>GWS/Current/GWSPEGuide/ConfigureTLS</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide/ConfigureTLS&amp;diff=119922"/>
		<updated>2022-05-04T18:36:07Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Article&lt;br /&gt;
|Standalone=No&lt;br /&gt;
|DisplayName=Configure connections with TLS and authentication&lt;br /&gt;
|Context=Learn how to configure Transport Layer Security and Authentication for connections to third-party services and non-containerized Genesys servers.&lt;br /&gt;
|ComingSoon=No&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Genesys Web Services and Applications (GWS) supports secure connections to third-party services and legacy Genesys servers using Transport Layer Security (TLS) version 1.2. &lt;br /&gt;
&lt;br /&gt;
To enable TLS, you must download and unpack the '''gws-services''' Helm chart locally. Next, create any required certificates for the services and put the truststores under the '''gws-services''' directory of the unpacked chart. For example: '''gws-services/crts/gwsPlatformSettingPostgresTrustore.p12.''' Following this example, the setting for the PostgreSQL truststore would be: &amp;lt;code&amp;gt;secretsTls.postgres.truststores.gws-plaftom-setting-postgres-truststore: crts/gwsPlatformSettingPostgresTrustore.p12&amp;lt;/code&amp;gt;{{NoteFormat|When you {{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Deploy}}, make sure to point to your local files during the installation.|}}Next, configure TLS by overriding Helm chart values in the '''values.yaml''' file. See {{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ConfigureTLS|anchor=thirdpartyservices|display text=TLS for third-party services}} and {{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ConfigureTLS|anchor=genesysservers|display text=TLS for legacy Genesys servers}} for details.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=TLS for third-party services&lt;br /&gt;
|anchor=thirdpartyservices&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=GWS supports TLS connections to the third-party services Redis, PostgreSQL, and Elasticsearch. To enable TLS for these services, set the following parameters in the '''values.yaml''' file:  &lt;br /&gt;
&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Configure|anchor=gwsServices.gwsAppProvisioning.postgres.enableTls|display text=gwsServices.gwsAppProvisioning.postgres.enableTls}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Configure|anchor=postgres.enableTls  |display text=postgres.enableTls  }}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Configure|anchor=elasticSearch.enableTls|display text=elasticSearch.enableTls}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Configure|anchor= redis.enableTls |display text= redis.enableTls }}&lt;br /&gt;
&lt;br /&gt;
You must also define the truststore paths and passwords in the tables below:{{AnchorDiv|redis}}&lt;br /&gt;
===Redis===&lt;br /&gt;
{{{!}} class=&amp;quot;wikitable&amp;quot; style=&amp;quot;table-layout: fixed; overflow-wrap: break-word;&amp;quot; {{!}}&lt;br /&gt;
!Parameter&lt;br /&gt;
!Description&lt;br /&gt;
!Valid values&lt;br /&gt;
!Default&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.enabled&lt;br /&gt;
{{!}}Specifies whether a Kubernetes secret is created for the TLS connection to the Redis cluster.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.truststores.gws-platform-datacollector-redis-truststore&lt;br /&gt;
{{!}}The Redis client truststore path for the GWS Data Collector Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.truststores.gws-platform-ixn-redis-truststore&lt;br /&gt;
{{!}}The Redis client truststore path for the GWS Interaction Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.truststores.gws-app-workspace-redis-truststore&lt;br /&gt;
{{!}}The Redis client truststore path for the GWS Workspace Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.truststores.gws-app-provisioning-redis-truststore&lt;br /&gt;
{{!}}The Redis client truststore path for Agent Setup.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.truststores.gws-platform-voice-redis-truststore&lt;br /&gt;
{{!}}The Redis client truststore path for the GWS Voice Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.passwords.gws-platform-datacollector-redis-truststore-password&lt;br /&gt;
{{!}}The Redis client truststore password for the GWS Data Collector Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.passwords.gws-platform-ixn-redis-truststore-password&lt;br /&gt;
{{!}}The Redis client truststore password for the GWS Interaction Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.passwords.gws-app-workspace-redis-truststore-password&lt;br /&gt;
{{!}}The Redis client truststore password for the GWS Workspace Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.passwords.gws-app-provisioning-redis-truststore-password&lt;br /&gt;
{{!}}The Redis client truststore password for Agent Setup.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.redis.passwords.gws-platform-voice-redis-truststore-password&lt;br /&gt;
{{!}}The Redis client truststore password for the GWS Voice Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}}&lt;br /&gt;
{{AnchorDiv|postgres}}&lt;br /&gt;
===PostgreSQL===&lt;br /&gt;
{{{!}} class=&amp;quot;wikitable&amp;quot; style=&amp;quot;table-layout: fixed; overflow-wrap: break-word;&amp;quot; {{!}}&lt;br /&gt;
!Parameter&lt;br /&gt;
!Description&lt;br /&gt;
!Valid values&lt;br /&gt;
!Default&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.postgres.enabled&lt;br /&gt;
{{!}}Specifies whether a Kubernetes secret is created for the TLS connection to PostgreSQL.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.postgres.truststores.gws-platform-setting-postgres-truststore&lt;br /&gt;
{{!}}The PostgreSQL client truststore path for the GWS Setting Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.postgres.passwords.gws-platform-setting-postgres-truststore-password&lt;br /&gt;
{{!}}The PostgreSQL client truststore password for the GWS Setting Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.postgresprovisioning.enabled&lt;br /&gt;
{{!}}Specifies whether a Kubernetes secret is created for the gws-app-provisioning TLS connection to PostgreSQL.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.postgresprovisioning.truststores.gws-app-provisioning-postgres-truststore&lt;br /&gt;
{{!}}The PostgreSQL client truststore path for gws-app-provisioning.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.postgresprovisioning.passwords.gws-app-provisioning-postgres-truststore-password&lt;br /&gt;
{{!}}The PostgreSQL client truststore password for gws-app-provisioning.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}}&lt;br /&gt;
{{AnchorDiv|elasticsearch}}&lt;br /&gt;
===Elasticsearch===&lt;br /&gt;
{{{!}} class=&amp;quot;wikitable&amp;quot; style=&amp;quot;table-layout: fixed; overflow-wrap: break-word;&amp;quot; {{!}}&lt;br /&gt;
!Parameter&lt;br /&gt;
!Description&lt;br /&gt;
!Valid values&lt;br /&gt;
!Default&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.elasticsearch.enabled&lt;br /&gt;
{{!}}Specifies whether a Kubernetes secret is created for the TLS connection to the Elasticsearch cluster.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.elasticsearch.truststores.gws-platform-datacollector-elasticsearch-truststore&lt;br /&gt;
{{!}}The Elasticsearch client truststore path for the GWS Data Collector Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}secretsTls.elasticsearch.passwords.gws-platform-datacollector-elasticsearch-truststore-password&lt;br /&gt;
{{!}}The Elasticsearch client truststore password for the GWS Data Collector Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=TLS for legacy Genesys servers&lt;br /&gt;
|anchor=genesysservers&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=GWS supports TLS connections to legacy Genesys servers in a mixed mode environment. GWS uses the [https://docs.genesys.com/Documentation/PSDK Platform SDK] to connect to legacy Genesys servers, such as [https://docs.genesys.com/Documentation/FR Configuration Server], [https://docs.genesys.com/Documentation/IXN Interaction Server], [https://docs.genesys.com/Documentation/TS T-Server], [https://docs.genesys.com/Documentation/UCS Universal Contact Server], [https://docs.genesys.com/Documentation/RTME Stat Server], [https://docs.genesys.com/Documentation/ES Chat Server], and [https://docs.genesys.com/Documentation/OU Outbound Contact Server].&lt;br /&gt;
&lt;br /&gt;
GWS services use [https://docs.genesys.com/Documentation/PSDK/9.0.x/Developer/TLSQuickStart upgrade mode ports] for TLS connections between Platform SDK and legacy Genesys services, which means you cannot enable TLS in the GWS '''values.yaml''' file. Instead, [https://docs.genesys.com/Documentation/PSDK/9.0.x/Developer/TLSTLSParametersinConfigManager configure the TLS parameters] in Configuration Server.&lt;br /&gt;
&lt;br /&gt;
You must also define the truststore paths and passwords in the tables below:&lt;br /&gt;
{{AnchorDiv|truststore}}&lt;br /&gt;
===Truststore paths===&lt;br /&gt;
{{{!}} class=&amp;quot;wikitable&amp;quot; style=&amp;quot;table-layout: fixed; overflow-wrap: break-word;&amp;quot; {{!}}&lt;br /&gt;
!Parameter&lt;br /&gt;
!Description&lt;br /&gt;
!Valid values&lt;br /&gt;
!Default&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.enabled&lt;br /&gt;
{{!}}Specifies whether a Kubernetes secret is created for TLS connections to legacy Genesys servers.&lt;br /&gt;
{{!}}true or false&lt;br /&gt;
{{!}}false&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.truststores.gws-platform-configuration-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the GWS Configuration Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.truststores.gws-platform-ixn-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the GWS Interaction Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.truststores.gws-platform-chat-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the Chat Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.truststores.gws-platform-ucs-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the UCS Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.truststores.gws-platform-voice-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the GWS Voice Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.truststores.gws-platform-statistics-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the GWS Statistics Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.truststores.truststores.gws-platform-datacollector-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the GWS Data Collector Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.gws-platform-ocs-psdk-truststore&lt;br /&gt;
{{!}}The PSDK client truststore path for the GWS OCS Service.&lt;br /&gt;
{{!}}A valid path to the truststore file, relative to the '''gws-services''' directory.&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}}&lt;br /&gt;
{{AnchorDiv|passwords}}&lt;br /&gt;
===Truststore passwords===&lt;br /&gt;
{{{!}} class=&amp;quot;wikitable&amp;quot; style=&amp;quot;table-layout: fixed; overflow-wrap: break-word;&amp;quot; {{!}}&lt;br /&gt;
!Parameter&lt;br /&gt;
!Description&lt;br /&gt;
!Valid values&lt;br /&gt;
!Default&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-configuration-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the GWS Configuration Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-ixn-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the GWS Interaction Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-chat-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the Chat Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-ucs-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the UCS Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-voice-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the GWS Voice Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-statistics-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the GWS Statistics Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-datacollector-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the GWS Data Collector Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}-&lt;br /&gt;
{{!}}psdk.passwords.gws-platform-ocs-psdk-truststore-password&lt;br /&gt;
{{!}}The PSDK client truststore password for the GWS OCS Service.&lt;br /&gt;
{{!}}A valid password&lt;br /&gt;
{{!}}&amp;quot;&amp;quot;&lt;br /&gt;
{{!}}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide/Planning&amp;diff=119919</id>
		<title>GWS/Current/GWSPEGuide/Planning</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide/Planning&amp;diff=119919"/>
		<updated>2022-05-04T18:34:36Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{PEPrerequisites&lt;br /&gt;
|DisplayName=Before you begin&lt;br /&gt;
|Context=Find out what to do before deploying Web Services and Applications.&lt;br /&gt;
|LimitationsStatus=Yes&lt;br /&gt;
|HelmStatus=No&lt;br /&gt;
|HelmText=Web Services and Applications (GWS) in Genesys Multicloud CX private edition is made up of multiple containers and Helm charts. The pages in this &amp;quot;Configure and deploy&amp;quot; chapter walk you through how to deploy the following Helm charts:&lt;br /&gt;
&lt;br /&gt;
*GWS services (gws-services) - all the GWS components.&lt;br /&gt;
*GWS ingress (gws-ingress) - provides internal and external access to GWS services. Internal ingress is used for cross-component communication inside the GWS deployment. It also can be used by other clients located inside the same Kubernetes cluster. External ingress provides access to GWS services to clients located outside the Kubernetes cluster. If you are deploying Web Services and Applications in a single namespace with other private edition services, then you do not need to deploy GWS ingress.&lt;br /&gt;
&lt;br /&gt;
GWS also includes a Helm chart for Nginx (wwe-nginx) for Workspace Web Edition - see the {{Link-AnywhereElse|product=PEC-AD|version=Current|manual=WWEPEGuide}} for details about how to deploy this chart. &lt;br /&gt;
&lt;br /&gt;
See {{Link-AnywhereElse|product=ReleaseNotes|version=Current|manual=GenesysEngage-cloud|topic=GWSHelm}} for the Helm chart versions you must download for your release.&lt;br /&gt;
&lt;br /&gt;
For information about downloading Helm charts from JFrog Edge, see {{SuiteLevelLink|helmchart}}.&lt;br /&gt;
|ThirdPartyStatus=No&lt;br /&gt;
|ThirdPartyText=Install the prerequisite dependencies listed in the '''Third-party services''' table before you deploy Web Services and Applications. See {{SuiteLevelLink|softwarereq}} for a full list of prerequisites and third-party services required by all Genesys Multicloud CX private edition services.&lt;br /&gt;
|SectionThirdPartyItem={{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=0d238336-2626-4954-8be3-2f1e16fdd0ce&lt;br /&gt;
|Notes=You must configure additional options for Elasticsearch to support the Data Collector Service.&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
action.auto_create_index: false&lt;br /&gt;
  thread_pool.write.queue_size: -1&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
You can set up Elasticsearch as a shared or dedicated service.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}{{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=3aee73ed-68e0-4c70-8693-2421c68b86cd&lt;br /&gt;
|Notes=The Redis server must run in cluster mode. You can set up Redis as a shared or dedicated service.&lt;br /&gt;
}}{{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=1a407778-58fe-4acd-8ca7-5af8eac31283&lt;br /&gt;
|Notes=You can set up PostgreSQL as a shared or dedicated service. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
}}{{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=2afd763e-337c-47eb-8428-3bafcc89dbca&lt;br /&gt;
|Notes='''GWS supports Consul 1.8'''. Consul can be installed either inside or outside the Kubernetes cluster. GWS pods require a Consul agent that is running at the Kubernetes node and GWS only communicates with this Consul agent. You must configure a connection to the Consul server in the local Consul agent.&lt;br /&gt;
}}{{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=bc90a902-fc45-4546-b05b-bba8f567dba2&lt;br /&gt;
}}{{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=0ce020f7-57d0-430e-bd82-27bef7d7834c&lt;br /&gt;
}}{{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=17ed8d61-7149-43bb-8f0e-199f7d206ec8&lt;br /&gt;
}}{{SectionThirdPartyItem&lt;br /&gt;
|ThirdPartyItem=f1d380bf-42b1-4b67-9d27-d574bad90c86&lt;br /&gt;
}}&lt;br /&gt;
|StorageStatus=No&lt;br /&gt;
|StorageText=GWS uses PostgreSQL to store tenant information, Redis to cache session data, and Elasticsearch to store monitored statistics for fast access. If you set up any of these services as dedicated services for GWS, they have the following minimal requirements:&lt;br /&gt;
&lt;br /&gt;
===PostgreSQL===&lt;br /&gt;
&lt;br /&gt;
*CPU: 2&lt;br /&gt;
*RAM: 8 GB&lt;br /&gt;
*HDD: 50 GB&lt;br /&gt;
&lt;br /&gt;
===Redis===&lt;br /&gt;
&lt;br /&gt;
*2 nodes:&lt;br /&gt;
**CPU: 2&lt;br /&gt;
**RAM: 8 GB&lt;br /&gt;
**HDD: 20 GB&lt;br /&gt;
&lt;br /&gt;
===Elasticsearch===&lt;br /&gt;
&lt;br /&gt;
*3 &amp;quot;master&amp;quot; nodes:&lt;br /&gt;
**CPU: 2&lt;br /&gt;
**RAM: 8 GB&lt;br /&gt;
**HDD: 20 GB&lt;br /&gt;
*4 &amp;quot;data&amp;quot; nodes)&lt;br /&gt;
**CPU: 4&lt;br /&gt;
**RAM: 16 GB&lt;br /&gt;
**HDD: 20 GB&lt;br /&gt;
|NetworkStatus=No&lt;br /&gt;
|NetworkText=GWS ingress objects support Transport Layer Security (TLS) version 1.2 for a secure connection between Kubernetes cluster ingress and GWS ingress. TLS is disabled by default, but you can configure it for internal and external ingress by overriding the '''entryPoints.internal.ingress.tls''' and '''entryPoints.external.ingress.tls''' sections of the {{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ConfigureIngress|anchor=override|display text=GWS ingress Helm chart}}.&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
 entryPoints:&lt;br /&gt;
   external:&lt;br /&gt;
     ingress:&lt;br /&gt;
     tls:&lt;br /&gt;
       - secretName: gws-secret-ext&lt;br /&gt;
         hosts:&lt;br /&gt;
           - gws.genesys.com&lt;br /&gt;
In the example above:&lt;br /&gt;
&lt;br /&gt;
*'''secretName''' is the name of the Kubernetes secret that contains the certificate. The secret is a prerequisite and must be created before you deploy GWS Ingress.&lt;br /&gt;
*'''hosts''' is a list of the fully qualified domain names that should use the certificate. The list must be the same as the value configured for the '''entryPoints.external.ingress.hosts''' parameter.&lt;br /&gt;
&lt;br /&gt;
===Cookies===&lt;br /&gt;
GWS components use cookies for following purposes:&lt;br /&gt;
&lt;br /&gt;
*identify HTTP/HTTPS user sessions&lt;br /&gt;
*identify CometD user sessions&lt;br /&gt;
*support session stickiness&lt;br /&gt;
|BrowserStatus=Yes&lt;br /&gt;
|BrowserText={{Editgrn open}}JM: Are these browsers are supported for Agent Setup? Browser support for WWE is documented in the WWE guid for private edition: {{Link-AnywhereElse|product=PEC-AD|version=Current|manual=WWEPEGuide|topic=Planning}}. Also, can we align with the versions that are supposed to be supported for cloud/private edition in all products? Those versions are:{{Editgrn close}}&lt;br /&gt;
&lt;br /&gt;
*{{Editgrn open}}Chrome: Current release or one version previous&lt;br /&gt;
*{{Editgrn open}}Firefox: Current release or one version previous&lt;br /&gt;
*{{Editgrn open}}Microsoft Edge: Current release&lt;br /&gt;
*{{Editgrn open}}Microsoft Edge Chromium: Current release &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can use any of the following browsers for UIs:&lt;br /&gt;
&lt;br /&gt;
*Chrome 75+&lt;br /&gt;
*Firefox 68+&lt;br /&gt;
*Firefox ESR 60.9&lt;br /&gt;
*Microsoft Edge&lt;br /&gt;
|DependenciesStatus=No&lt;br /&gt;
|DependenciesText=Genesys Web Services and Applications must be deployed after Genesys Authentication. &lt;br /&gt;
&lt;br /&gt;
For a look at the high-level deployment order, see {{SuiteLevelLink|deployorder}} in the ''Setting up Genesys Multicloud CX Private Edition'' guide.&lt;br /&gt;
|GDPRStatus=Yes&lt;br /&gt;
|GDPRText={{Notices}}&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|sectionHeading=Next steps&lt;br /&gt;
|anchor=next&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Configure}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Deploy}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ConfigureIngress}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=DeployIngress}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Provision}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
|PEPageType=bf21dc7c-597d-4bbe-8df2-a2a64bd3f167&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/ENVMetrics&amp;diff=119904</id>
		<title>AUTH/Current/AuthPEGuide/ENVMetrics</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/ENVMetrics&amp;diff=119904"/>
		<updated>2022-05-04T16:42:58Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ArticlePEServiceMetrics&lt;br /&gt;
|IncludedServiceId=94d22886-7976-4bce-9e98-0400c32c222b&lt;br /&gt;
|Annotations=Annotations&lt;br /&gt;
|Port=8081&lt;br /&gt;
|Endpoint=/prometheus&lt;br /&gt;
|MetricsUpdateInterval=Real-time&lt;br /&gt;
|MetricsDefined=Yes&lt;br /&gt;
|MetricsIntro=Environment Service exposes many Genesys-defined as well as system metrics. You can query Prometheus directly to see all the available metrics. The metrics documented on this page are likely to be particularly useful. Genesys does not commit to maintain other currently available Environment Service metrics not documented on this page.&lt;br /&gt;
|PEMetric={{PEMetric&lt;br /&gt;
|Metric=api_requests_seconds_count_total&lt;br /&gt;
|Type=Counter&lt;br /&gt;
|MetricDescription=The total number of API requests to the Environment Service.&lt;br /&gt;
}}{{PEMetric&lt;br /&gt;
|Metric=api_requests_seconds_sum_total&lt;br /&gt;
|Type=Counter&lt;br /&gt;
|MetricDescription=The total time of the API requests.&lt;br /&gt;
}}{{PEMetric&lt;br /&gt;
|Metric=jvm_threads_deadlocked&lt;br /&gt;
|Type=Gauge&lt;br /&gt;
|MetricDescription=The number of deadlocked threads.&lt;br /&gt;
}}{{PEMetric&lt;br /&gt;
|Metric=jvm_gc_pause_seconds_count&lt;br /&gt;
|Type=Counter&lt;br /&gt;
|MetricDescription=How long garbage collection took, in seconds.&lt;br /&gt;
}}{{PEMetric&lt;br /&gt;
|Metric=gws_responses_total&lt;br /&gt;
|Type=Counter&lt;br /&gt;
|Label=&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Code - The response status code.&lt;br /&gt;
*Group - The goup of response codes. The values are: 4xx,5xx&lt;br /&gt;
|MetricDescription=The number of responses grouped by HTTP code.&lt;br /&gt;
}}{{PEMetric&lt;br /&gt;
|Metric=jetty_threads_current&lt;br /&gt;
|Type=Gauge&lt;br /&gt;
|MetricDescription=The current number of Jetty threads.&lt;br /&gt;
}}{{PEMetric&lt;br /&gt;
|Metric=jvm_memory_used_bytes&lt;br /&gt;
|Type=Gauge&lt;br /&gt;
|Label=&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*area – The values are &amp;quot;heap&amp;quot; or ”nonheap”.&lt;br /&gt;
*id  - The values are “G1 Eden Space&amp;quot;, &amp;quot;CodeHeap 'non-nmethods'&amp;quot;, &amp;quot;G1 Old Gen&amp;quot;, &amp;quot;Compressed Class Space&amp;quot;, &amp;quot;CodeHeap 'non-profiled nmethods'&amp;quot;, &amp;quot;G1 Survivor Space&amp;quot;, or &amp;quot;Metaspace&amp;quot;.&lt;br /&gt;
|MetricDescription=The amount of memory used, in bytes.&lt;br /&gt;
}}&lt;br /&gt;
|AlertsDefined=No&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/Deploy&amp;diff=119125</id>
		<title>AUTH/Current/AuthPEGuide/Deploy</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=AUTH/Current/AuthPEGuide/Deploy&amp;diff=119125"/>
		<updated>2022-04-22T16:35:56Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ArticlePEServiceDeploy&lt;br /&gt;
|ServiceId=6f7f1a8d-4e60-4b8d-a6f0-8cafdbdf0a3e&lt;br /&gt;
|IncludeAssumptions=Yes&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext={{NoteFormat|Make sure to review {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Planning}} for the full list of prerequisites required to deploy Genesys Authentication.|}}&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Prepare your environment&lt;br /&gt;
|anchor=Prepare&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=To prepare your environment for the deployment, complete the steps in this section for either OpenShift or Google Kubernetes Engine (GKE).&lt;br /&gt;
&lt;br /&gt;
===OpenShift===&lt;br /&gt;
Log in to the OpenShift cluster from the host where you will run the deployment:&lt;br /&gt;
 oc login --token &amp;lt;token&amp;gt; --server &amp;lt;url of api server&amp;gt;&lt;br /&gt;
First confirm the cluster is running:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;oc get clusterversion&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Create a new project for Genesys Authentication:{{NoteFormat|Deploy Genesys Authentication in the '''gws''' namespace if you use the default OpenShift Ingress Controller; otherwise, deploy in the '''gauth''' namespace.|}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;text&amp;quot;&amp;gt;oc new-project gws&amp;lt;/source&amp;gt;&lt;br /&gt;
===GKE===&lt;br /&gt;
Log in to the GKE cluster from the host where you will run the deployment:&lt;br /&gt;
&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
gcloud container clusters get-credentials &amp;lt;cluster&amp;gt;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Create a JSON file called '''create-gauth-namespace.json''' with the following content: &amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;apiVersion&amp;quot;: &amp;quot;v1&amp;quot;,&lt;br /&gt;
  &amp;quot;kind&amp;quot;: &amp;quot;Namespace&amp;quot;,&lt;br /&gt;
  &amp;quot;metadata&amp;quot;: {&lt;br /&gt;
    &amp;quot;name&amp;quot;: &amp;quot;gauth&amp;quot;,&lt;br /&gt;
    &amp;quot;labels&amp;quot;: {&lt;br /&gt;
      &amp;quot;name&amp;quot;: &amp;quot;gauth&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
  }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Use the JSON file to create a new namespace for Genesys Authentication:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
kubectl apply -f create-gauth-namespace.json&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Now confirm the namespace was created:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
kubectl describe namespace gauth&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Deploy&lt;br /&gt;
|anchor=de&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=To deploy Genesys Authentication, you'll need the Helm package and your overrides file. Copy '''values.yaml''' and the Helm package ('''gauth-&amp;lt;version&amp;gt;.tgz''') to the installation location.&lt;br /&gt;
&lt;br /&gt;
For OpenShift, select the '''gauth''' project (or '''gws''' if you are using the OpenShift Ingress Controller) you created in {{Link-SomewhereInThisVersion|manual=AuthPEGuide|topic=Deploy|anchor=OpenShift|display text=Prepare your environment}}:&lt;br /&gt;
 oc project gauth&lt;br /&gt;
&lt;br /&gt;
For debugging purposes, use the following command to render templates without installing so you can check that resources are created properly:&lt;br /&gt;
 helm template --debug /gauth-&amp;lt;version&amp;gt;.tgz -f values.yaml&lt;br /&gt;
&lt;br /&gt;
The result shows Kubernetes descriptors. The values you see are generated from Helm templates, and based on settings from '''values.yaml'''. Ensure that no errors are displayed; you will later apply this configuration to your Kubernetes cluster.&lt;br /&gt;
&lt;br /&gt;
Now you're ready to deploy Genesys Authentication:&lt;br /&gt;
 helm install gauth ./gauth-&amp;lt;version&amp;gt;.tgz -f values.yaml -n gauth&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Configure external access&lt;br /&gt;
|anchor=access&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Follow the instructions for either OpenShift or GKE to make the Genesys Authentication services accessible from outside the cluster.&lt;br /&gt;
&lt;br /&gt;
===Create routes in OpenShift===&lt;br /&gt;
After deploying, make the Genesys Authentication services accessible from outside the OpenShift cluster using the standard HTTP port. Make sure to use the same hostname for all three routes. Genesys recommends using the following hostname format: &amp;lt;code&amp;gt;gauth.&amp;lt;cluster-subdomain&amp;gt;&amp;lt;/code&amp;gt;. For example, the VCE cluster (&amp;lt;nowiki&amp;gt;https://console-openshift-console.apps.&amp;lt;yourclusterdomain&amp;gt;.com/&amp;lt;/nowiki&amp;gt;) should have the hostname '''gauth.apps.&amp;lt;yourclusterdomain&amp;gt;.com'''&lt;br /&gt;
 oc create route edge --service=&amp;lt;env-service&amp;gt; --hostname=&amp;lt;hostname&amp;gt; --path /environment&lt;br /&gt;
 oc create route edge --service=&amp;lt;gauth-service&amp;gt; --hostname=&amp;lt;hostname&amp;gt; --path /auth&lt;br /&gt;
 oc create route edge --service=&amp;lt;gauth-auth-ui-service&amp;gt; --hostname=&amp;lt;hostname&amp;gt; --path /ui/auth&lt;br /&gt;
Verify the new route is created in the '''gauth''' namespace (or '''gws''' if you are using the OpenShift Ingress Controller):&lt;br /&gt;
 oc get route -n gauth&lt;br /&gt;
The result includes the following information about the services:&lt;br /&gt;
 NAME            HOST/PORT                                          PATH                SERVICES              PORT   TERMINATION   WILDCARD&lt;br /&gt;
 env             gauth.apps.&amp;lt;yourclusterdomain&amp;gt;.com                 /environment        gauth-environment     https                 None&lt;br /&gt;
 gauth           gauth.apps.&amp;lt;yourclusterdomain&amp;gt;.com                 /auth               gauth-auth            https                 None&lt;br /&gt;
 gauth-auth-ui   gauth.apps.&amp;lt;yourclusterdomain&amp;gt;.com                 /ui/auth            gauth-auth-ui         https                 None&lt;br /&gt;
Note: &amp;lt;code&amp;gt;HOST&amp;lt;/code&amp;gt; is the host name generated by OpenShift.&lt;br /&gt;
&lt;br /&gt;
{{AnchorDiv|GKEingress}}&lt;br /&gt;
===Provision ingresses for GKE===&lt;br /&gt;
After deploying, make Genesys Authentication services accessible from outside the GKE cluster using the NGINX Ingress Controller. &lt;br /&gt;
&lt;br /&gt;
Create a YAML file called '''gauth-ingress.yaml''' with the content below. '''Note:''' Replace '''gws.&amp;lt;domain&amp;gt;''' and '''gauth.&amp;lt;domain&amp;gt;''' with your GWS and Genesys Authentication domains, such as &amp;lt;code&amp;gt;gws.test.dev&amp;lt;/code&amp;gt;.&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
apiVersion: extensions/v1beta1&lt;br /&gt;
kind: Ingress&lt;br /&gt;
metadata:&lt;br /&gt;
  name: gauth-gws-ingress&lt;br /&gt;
  namespace: gauth&lt;br /&gt;
  annotations:&lt;br /&gt;
    # add an annotation indicating the issuer to use.&lt;br /&gt;
    cert-manager.io/cluster-issuer: &amp;quot;selfsigned-cluster-issuer&amp;quot;&lt;br /&gt;
    # Custom annotations for NGINX Ingress Controller&lt;br /&gt;
    kubernetes.io/ingress.class: &amp;quot;nginx&amp;quot;&lt;br /&gt;
    nginx.ingress.kubernetes.io/ssl-redirect: &amp;quot;false&amp;quot;&lt;br /&gt;
    nginx.ingress.kubernetes.io/use-regex: &amp;quot;true&amp;quot;&lt;br /&gt;
spec:&lt;br /&gt;
  rules:&lt;br /&gt;
  - host: gws.&amp;lt;domain&amp;gt; - e.g. gws.test.dev&lt;br /&gt;
    http:&lt;br /&gt;
      paths:&lt;br /&gt;
        - path: /ui/auth/.*&lt;br /&gt;
          backend:&lt;br /&gt;
            serviceName:  gauth-auth-ui&lt;br /&gt;
            servicePort: 80&lt;br /&gt;
        - path: /auth/.*&lt;br /&gt;
          backend:&lt;br /&gt;
            serviceName:  gauth-auth&lt;br /&gt;
            servicePort: 80&lt;br /&gt;
        - path: /environment/.*&lt;br /&gt;
          backend:&lt;br /&gt;
            serviceName:  gauth-environment&lt;br /&gt;
            servicePort: 80&lt;br /&gt;
  tls:&lt;br /&gt;
  - hosts:&lt;br /&gt;
    - gws.&amp;lt;domain&amp;gt; - e.g. gws.test.dev&lt;br /&gt;
    secretName: gauth-gws-ingress-cert&lt;br /&gt;
---&lt;br /&gt;
apiVersion: extensions/v1beta1&lt;br /&gt;
kind: Ingress&lt;br /&gt;
metadata:&lt;br /&gt;
  name: gauth-gauth-ingress&lt;br /&gt;
  namespace: gauth&lt;br /&gt;
  annotations:&lt;br /&gt;
    # add an annotation indicating the issuer to use.&lt;br /&gt;
    cert-manager.io/cluster-issuer: &amp;quot;selfsigned-cluster-issuer&amp;quot;&lt;br /&gt;
    # Custom annotations for NGINX Ingress Controller&lt;br /&gt;
    kubernetes.io/ingress.class: &amp;quot;nginx&amp;quot;&lt;br /&gt;
    nginx.ingress.kubernetes.io/ssl-redirect: &amp;quot;false&amp;quot;&lt;br /&gt;
    nginx.ingress.kubernetes.io/use-regex: &amp;quot;true&amp;quot;&lt;br /&gt;
spec:&lt;br /&gt;
  rules:&lt;br /&gt;
  - host: gauth.&amp;lt;domain&amp;gt; - e.g. gauth.test.dev&lt;br /&gt;
    http:&lt;br /&gt;
      paths:&lt;br /&gt;
        - path: /ui/auth/.*&lt;br /&gt;
          backend:&lt;br /&gt;
            serviceName:  gauth-auth-ui&lt;br /&gt;
            servicePort: 80&lt;br /&gt;
        - path: /auth/.*&lt;br /&gt;
          backend:&lt;br /&gt;
            serviceName:  gauth-auth&lt;br /&gt;
            servicePort: 80&lt;br /&gt;
 &lt;br /&gt;
        - path: /environment/.*&lt;br /&gt;
          backend:&lt;br /&gt;
            serviceName:  gauth-environment&lt;br /&gt;
            servicePort: 80&lt;br /&gt;
  tls:&lt;br /&gt;
  - hosts:&lt;br /&gt;
    - gauth.&amp;lt;domain&amp;gt; - e.g. gauth.test.dev&lt;br /&gt;
    secretName: gauth-gauth-ingress-cert&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;Create ingresses with the following command:&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
kubectl apply -f gauth-ingress.yaml -n gws&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Validate the deployment&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Check the installed Helm release:&lt;br /&gt;
 helm list&lt;br /&gt;
The results should show the Genesys Authentication deployment details. For example:&lt;br /&gt;
 NAME    NAMESPACE       REVISION        UPDATED                                 STATUS          CHART           APP VERSION&lt;br /&gt;
 gauth   gauth           1               2021-05-20 11:56:32.5531685 +0530 +0530 deployed        gauth-0.1.77    0.1&lt;br /&gt;
Check the '''gauth''' namespace (or '''gws''' if you are using the OpenShift Ingress Controller) status:&lt;br /&gt;
 helm status gauth&lt;br /&gt;
The result should show the namespace details with a status of deployed:&lt;br /&gt;
 NAME: gauth&lt;br /&gt;
 LAST DEPLOYED: Thu May 20 11:56:32 2021&lt;br /&gt;
 NAMESPACE: gauth&lt;br /&gt;
 STATUS: deployed&lt;br /&gt;
 REVISION: 1&lt;br /&gt;
 TEST SUITE: None&lt;br /&gt;
Check the Genesys Authentication Kubernetes objects created by Helm:&lt;br /&gt;
 kubectl get all -n gauth&lt;br /&gt;
The result should show all the created pods, service ConfigMaps, and so on.&lt;br /&gt;
&lt;br /&gt;
Finally, verify that you can now access Genesys Authentication at the following URL: https://&amp;lt;hostname&amp;gt;/ui/auth/sign-in.html&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
|PEPageType=45d1441f-dc69-4a17-bd47-af5d811ce167&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide&amp;diff=118155</id>
		<title>GWS/Current/GWSPEGuide</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide&amp;diff=118155"/>
		<updated>2022-04-08T19:03:13Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{MintyDocsManual&lt;br /&gt;
|product=Draft:PrivateEdition&lt;br /&gt;
|version=Current&lt;br /&gt;
|manual=Deployment&lt;br /&gt;
|alternateforms=Form:ArticleUnstructured, Form:TaskSummary&lt;br /&gt;
|displayname={{MINTYDOCSPRODUCT}} Private Edition Guide&lt;br /&gt;
|pagination=no&lt;br /&gt;
|Notice=EAP&lt;br /&gt;
|ServiceId=11ff3d39-ae2b-4526-b7e5-7dcdf781ef01&lt;br /&gt;
|topicslist=* -Overview&lt;br /&gt;
** Overview&lt;br /&gt;
** Architecture&lt;br /&gt;
** HADR&lt;br /&gt;
* -Configure and deploy&lt;br /&gt;
** Planning&lt;br /&gt;
** Configure&lt;br /&gt;
** ConfigureTLS&lt;br /&gt;
** Deploy&lt;br /&gt;
** ConfigureIngress&lt;br /&gt;
** DeployIngress&lt;br /&gt;
** Provision&lt;br /&gt;
** ProvisionAS&lt;br /&gt;
** Upgrade&lt;br /&gt;
** UpgradeIngress&lt;br /&gt;
* -Operations&lt;br /&gt;
** Metrics&lt;br /&gt;
** Logging&lt;br /&gt;
|defaultform=Form:Article&lt;br /&gt;
|inherit=no&lt;br /&gt;
|Auto=Crafted summary table&lt;br /&gt;
|Context=Find links to all the topics in this guide.&lt;br /&gt;
|Description=Genesys Web Services and Applications is a service available with the Genesys Multicloud CX private edition offering.&lt;br /&gt;
|TSSection={{TSSection&lt;br /&gt;
|sectionheading=Overview&lt;br /&gt;
|description=Learn more about Genesys Web Services and Applications and how to get started.&lt;br /&gt;
|relatedarticles=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Overview}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Architecture}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=HADR}}&lt;br /&gt;
}}{{TSSection&lt;br /&gt;
|sectionheading=Configure and deploy&lt;br /&gt;
|description=Find out how to configure and deploy Genesys Web Services and Applications.&lt;br /&gt;
|relatedarticles=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Planning}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Configure}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ConfigureTLS}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Deploy}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=DeployIngress}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Provision}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ProvisionAS}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Upgrade}}&lt;br /&gt;
}}{{TSSection&lt;br /&gt;
|sectionheading=Operations&lt;br /&gt;
|description=Learn how to monitor Genesys Web Services and Applications with metrics and logging.&lt;br /&gt;
|relatedarticles=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Metrics}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Logging}}&lt;br /&gt;
}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide&amp;diff=118154</id>
		<title>GWS/Current/GWSPEGuide</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=GWS/Current/GWSPEGuide&amp;diff=118154"/>
		<updated>2022-04-08T19:01:45Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{MintyDocsManual&lt;br /&gt;
|product=Draft:PrivateEdition&lt;br /&gt;
|version=Current&lt;br /&gt;
|manual=Deployment&lt;br /&gt;
|alternateforms=Form:ArticleUnstructured, Form:TaskSummary&lt;br /&gt;
|displayname={{MINTYDOCSPRODUCT}} Private Edition Guide&lt;br /&gt;
|pagination=no&lt;br /&gt;
|Notice=EAP&lt;br /&gt;
|ServiceId=11ff3d39-ae2b-4526-b7e5-7dcdf781ef01&lt;br /&gt;
|topicslist=* -Overview&lt;br /&gt;
** Overview&lt;br /&gt;
** Architecture&lt;br /&gt;
** HADR&lt;br /&gt;
* -Configure and deploy&lt;br /&gt;
** Planning&lt;br /&gt;
** Configure&lt;br /&gt;
** ConfigureTLS&lt;br /&gt;
** Deploy&lt;br /&gt;
** ConfigureIngress&lt;br /&gt;
** DeployIngress&lt;br /&gt;
** Provision&lt;br /&gt;
** ProvisionAS&lt;br /&gt;
** Upgrade&lt;br /&gt;
** UpgradeIngress&lt;br /&gt;
* -Operations&lt;br /&gt;
** Metrics&lt;br /&gt;
** Logging&lt;br /&gt;
|defaultform=Form:Article&lt;br /&gt;
|inherit=no&lt;br /&gt;
|Auto=Crafted summary table&lt;br /&gt;
|Context=Find links to all the topics in this guide.&lt;br /&gt;
|Description=Genesys Web Services and Applications is a service available with the Genesys Multicloud CX private edition offering.&lt;br /&gt;
|TSSection={{TSSection&lt;br /&gt;
|sectionheading=Overview&lt;br /&gt;
|description=Learn more about Genesys Web Services and Applications and how to get started.&lt;br /&gt;
|relatedarticles=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Overview}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Architecture}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=HADR}}&lt;br /&gt;
}}{{TSSection&lt;br /&gt;
|sectionheading=Configure and deploy&lt;br /&gt;
|description=Find out how to configure and deploy Genesys Web Services and Applications.&lt;br /&gt;
|relatedarticles=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Planning}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Configure}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Deploy}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=DeployIngress}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Provision}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=ProvisionAS}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Upgrade}}&lt;br /&gt;
}}{{TSSection&lt;br /&gt;
|sectionheading=Operations&lt;br /&gt;
|description=Learn how to monitor Genesys Web Services and Applications with metrics and logging.&lt;br /&gt;
|relatedarticles=*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Metrics}}&lt;br /&gt;
*{{Link-SomewhereInThisVersion|manual=GWSPEGuide|topic=Logging}}&lt;br /&gt;
}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=PEC-DC/Current/DCPEGuide/Upgrade&amp;diff=116938</id>
		<title>PEC-DC/Current/DCPEGuide/Upgrade</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=PEC-DC/Current/DCPEGuide/Upgrade&amp;diff=116938"/>
		<updated>2022-03-30T12:04:26Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Published&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Article&lt;br /&gt;
|Standalone=No&lt;br /&gt;
|DisplayName=Upgrade, rollback, or uninstall Digital Channels&lt;br /&gt;
|TocName=Upgrade, rollback, or uninstall&lt;br /&gt;
|Context=Learn how to upgrade, rollback or uninstall Digital Channels.&lt;br /&gt;
|ComingSoon=No&lt;br /&gt;
|Section={{Section&lt;br /&gt;
|sectionHeading=Upgrade Digital Channels&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Use '''helm upgrade''' to upgrade to a new revision.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Rollback Digital Channels&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Use '''helm rollback''' to rollback to the previous revision.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
|Status=No&lt;br /&gt;
}}{{Section&lt;br /&gt;
|sectionHeading=Uninstall Digital Channels&lt;br /&gt;
|anchor=uninstall&lt;br /&gt;
|alignment=Vertical&lt;br /&gt;
|structuredtext=Use '''helm delete''' to uninstall the deployment.&lt;br /&gt;
|Status=No&lt;br /&gt;
}}&lt;br /&gt;
|PEPageType=2cad3824-b3b9-43aa-a726-143cc1aaefe2&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=Form:ThirdPartyItem&amp;diff=116867</id>
		<title>Form:ThirdPartyItem</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=Form:ThirdPartyItem&amp;diff=116867"/>
		<updated>2022-03-29T12:32:05Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
This is the &amp;quot;ThirdPartyItem&amp;quot; form.&lt;br /&gt;
To create a page with this form, enter the page name below;&lt;br /&gt;
if a page with that name already exists, you will be sent to a form to edit that page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{#forminput:form=ThirdPartyItem}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;&lt;br /&gt;
&amp;lt;div id=&amp;quot;wikiPreview&amp;quot; style=&amp;quot;display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
{{{for template|ThirdPartyItem|multiple|displayed fields when minimized=Name,Version}}}&lt;br /&gt;
{{{field|Id|unique|default=uuid|hidden}}}&lt;br /&gt;
{| class=&amp;quot;formtable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%&amp;quot;| Name: &lt;br /&gt;
| style=&amp;quot;width: 70%&amp;quot;| {{{field|Name}}}&lt;br /&gt;
|-&lt;br /&gt;
! Link:&lt;br /&gt;
| {{{field|Link}}}&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! Version:&lt;br /&gt;
| {{{field|Version}}}&lt;br /&gt;
|-&lt;br /&gt;
! Service name in OpenShift:&lt;br /&gt;
| {{{field|OpenShiftName}}}&lt;br /&gt;
|-&lt;br /&gt;
! Service URL in OpenShift:&lt;br /&gt;
| {{{field|OpenShiftURL}}}&lt;br /&gt;
|-&lt;br /&gt;
! Service name in GKE:&lt;br /&gt;
| {{{field|GKEName}}}&lt;br /&gt;
|-&lt;br /&gt;
! Service URL in GKE:&lt;br /&gt;
| {{{field|GKEURL}}}&lt;br /&gt;
|-&lt;br /&gt;
! Purpose of the service:&lt;br /&gt;
| {{{field|Purpose|input type=textarea|editor=visualeditor}}}&lt;br /&gt;
|-&lt;br /&gt;
! Common across Private Edition?&lt;br /&gt;
| {{{field|Common|input type=radiobutton|mandatory|values=Yes,No|default=No}}}&lt;br /&gt;
|-&lt;br /&gt;
! Shared service?&lt;br /&gt;
| {{{field|Shared|input type=dropdown|existing values only|values=Yes,No,Optional|default=No}}}&lt;br /&gt;
|-&lt;br /&gt;
! Mandatory service?&lt;br /&gt;
| {{{field|Mandatory|input type=dropdown|existing values only|values=Yes,No,Optional|default=No}}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{{end template}}}&lt;br /&gt;
&lt;br /&gt;
{{{standard input|summary}}}&lt;br /&gt;
&lt;br /&gt;
{{{standard input|minor edit}}} {{{standard input|watch}}}&lt;br /&gt;
&lt;br /&gt;
{{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
{{HideExpandAll}}&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116806</id>
		<title>File:Pe auth architecture.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116806"/>
		<updated>2022-03-25T19:43:49Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Jumunn uploaded a new version of File:Pe auth architecture.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116803</id>
		<title>File:Pe auth architecture.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116803"/>
		<updated>2022-03-25T19:33:34Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Jumunn uploaded a new version of File:Pe auth architecture.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116802</id>
		<title>File:Pe auth architecture.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116802"/>
		<updated>2022-03-25T19:31:22Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Jumunn uploaded a new version of File:Pe auth architecture.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Pe_gws_architecture.png&amp;diff=116798</id>
		<title>File:Pe gws architecture.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Pe_gws_architecture.png&amp;diff=116798"/>
		<updated>2022-03-25T19:05:06Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Jumunn uploaded a new version of File:Pe gws architecture.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Pe_gws_architecture.png&amp;diff=116750</id>
		<title>File:Pe gws architecture.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Pe_gws_architecture.png&amp;diff=116750"/>
		<updated>2022-03-25T00:49:46Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116739</id>
		<title>File:Pe auth architecture.png</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=File:Pe_auth_architecture.png&amp;diff=116739"/>
		<updated>2022-03-24T14:39:36Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Jumunn uploaded a new version of File:Pe auth architecture.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
	<entry>
		<id>https://all.docs.genesys.com/index.php?title=Template:TrafficTypes&amp;diff=116736</id>
		<title>Template:TrafficTypes</title>
		<link rel="alternate" type="text/html" href="https://all.docs.genesys.com/index.php?title=Template:TrafficTypes&amp;diff=116736"/>
		<updated>2022-03-24T14:09:32Z</updated>

		<summary type="html">&lt;p&gt;Jumunn: Created page with &amp;quot;&amp;lt;noinclude&amp;gt; This is the &amp;quot;TrafficTypes&amp;quot; template. It should be called in the following format: &amp;lt;pre&amp;gt; {{TrafficTypes |Id= |Name= }} &amp;lt;/pre&amp;gt; Edit the page to see the template text...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
This is the &amp;quot;TrafficTypes&amp;quot; template.&lt;br /&gt;
It should be called in the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{TrafficTypes&lt;br /&gt;
|Id=&lt;br /&gt;
|Name=&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Edit the page to see the template text.&lt;br /&gt;
{{#cargo_declare:_table=TrafficTypes|Id=String|Name=String}}&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&amp;lt;includeonly&amp;gt;{{#cargo_store:_table=TrafficTypes|Id={{{Id|}}}|Name={{{Name|}}} }}&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;[[Category:PrivateEdition]]&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jumunn</name></author>
		
	</entry>
</feed>