summaryrefslogtreecommitdiffstats
path: root/docs/sections/services/ves-hv/running-insecure.rst
blob: 8d366ac256ee7227c3dd51f11634b545713386d0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
.. This work is licensed under a Creative Commons Attribution 4.0 International License.
.. http://creativecommons.org/licenses/by/4.0

.. _running_insecure:

Running insecure HV-VES in test environments
============================================

HV-VES application is configured by default to use TLS/SSL encryption on TCP connection. However it is posible to turn off TLS/SSL authorization by overriding Cloudify blueprint inputs.


Accessing bootstrap container with Kubernetes command line tool
---------------------------------------------------------------

To find bootstrap pod, execute the following command:

::

    kubectl -n <onap namespace> get pods | grep bootstrap

To run command line in bootstrap pod, execute:

::

    kubectl -n <onap namespace> exec -it <bootstrap-pod-name> bash


Disable TLS/SSL by overriding Cloudify blueprint inputs
-------------------------------------------------------

1. If You have a running HV-VES instance, uninstall HV-VES and delete current deployment:

:: 

    cfy executions start -d hv-ves uninstall
    cfy deployments delete hv-ves 

2. Create new deployment with inputs from yaml file and override 'security_ssl_disable' value:

:: 

    cfy deployments create -b hv-ves -i inputs/k8s-hv_ves-inputs.yaml -i security_ssl_disable=True hv-ves

To verify inputs, You can execute: 

:: 

    cfy deployments inputs hv-ves

3. Install HV-VES deployment:

:: 

    cfy executions start -d hv-ves install