Database Integration
All production deployments should use an external database for data persistence. The following sections provide information on connecting to an external database along with examples for different databases.
The following databases are supported:
- MariaDB 
- MySQL 
- Microsoft SQL Server 
- PostgreSQL 
- Oracle 
Connect EJBCA to an external database
To connect EJBCA to a database, you need to provide a JDBC connection string, a username, and a password. These can be specified in the values.yaml file of the Helm Chart in one of the following ways.
Reference Kubernetes Secret
Create a Kubernetes secret to store the database credentials, then reference it in values.yaml using envFrom to make all keys and values available to EJBCA.
- Create a dedicated Kubernetes secret for storing the database credentials: BASH- kubectl create secret generic ejbca-db-credentials \ --from-literal=DATABASE_USER='ejbca' \ --from-literal=DATABASE_PASSWORD='foo123'
- Make all keys and values of the secret available to EJBCA by referencing it in - values.yaml:YAML- ejbca: env: DATABASE_JDBC_URL: <jdbc connection string> envFrom: - secretRef: name: ejbca-db-credentials
Reference specific credentials
Reference specific credentials in an existing secret , for example, ejbca-credentials using envRaw:
ejbca:
  env:
    DATABASE_JDBC_URL: <jdbc connection string>
  envRaw:
    - name: DATABASE_PASSWORD
      valueFrom:
       secretKeyRef:
         name: ejbca-credentials
         key: database_password
    - name: DATABASE_USER
      valueFrom:
       secretKeyRef:
         name: ejbca-credentials
         key: database_user Use plain text values
This method is only recommended for testing purposes.
For testing, you can optionally use env and plain text values:
ejbca:
  env:
    DATABASE_JDBC_URL: <jdbc connection string>
    DATABASE_USER: ejbca
    DATABASE_PASSWORD: foo123Database Connection Examples
The following sections provide examples of connecting to different databases.
MariaDB/MySQL
The following example shows modifications to the helm chart values file used to connect EJBCA to a MariaDB/MySQL database with server name mariadb-server and database name ejbca using username ejbca and password foo123:
ejbca:
  env:
    DATABASE_JDBC_URL: jdbc:mariadb://mariadb-server:3306/ejbca?characterEncoding=UTF-8
    DATABASE_USER: ejbca
    DATABASE_PASSWORD: foo123Please use jdbc:mariadb even when connecting to a MySQL database. This JDBC driver supports both MariaDB and MySQL databases.
PostgreSQL
The following example connects EJBCA to a PostgreSQL database and uses a Kubernetes secret for storing the database username and password:
ejbca:
  env:
    DATABASE_JDBC_URL: jdbc:postgresql://postgresql-server:5432/ejbcadb
  envRaw:
    - name: DATABASE_PASSWORD
      valueFrom:
       secretKeyRef:
         name: ejbca-db-credentials
         key: database_password
    - name: DATABASE_USER
      valueFrom:
       secretKeyRef:
         name: ejbca-db-credentials
         key: database_userMicrosoft SQL Server
The following example connects EJBCA to a Microsoft SQL Server database using a secret that contains DATABASE_USER and DATABASE_PASSWORD keys:
ejbca:
  env:
    DATABASE_JDBC_URL: jdbc:sqlserver://mssql-server:1433;DatabaseName=ejbca;encrypt=true;trustServerCertificate=false;hostNameInCertificate=*.database.windows.net;loginTimeout=30;sendStringParametersAsUnicode=false
  envFrom:
    - secretRef:
        name: ejbca-db-credentialsOracle
The following example connects EJBCA to an Oracle database using a secret that contains DATABASE_USER and DATABASE_PASSWORD keys:
ejbca:
  env:
    DATABASE_JDBC_URL: jdbc:oracle:thin:@//oracle-server:1521/ejbca
  envFrom:
    - secretRef:
        name: ejbca-db-credentialsConnect SignServer to an external database
All production deployments of SignServer should use an external database for data persistence.
The following sections provides examples for connecting to different databases.
Reference Kubernetes Secret
Create a Kubernetes secret to store the database credentials, then reference it in values.yaml using envFrom to make all keys and values available to SignServer.
- Create a dedicated Kubernetes secret for storing the database credentials: BASH- kubectl create secret generic signserver-db-credentials \ --from-literal=DATABASE_USER='signserver' \ --from-literal=DATABASE_PASSWORD='foo123'
- Make all keys and values of the secret available to SignServer by referencing it in - values.yaml:YAML- signserver: env: DATABASE_JDBC_URL: <jdbc connection string> envFrom: - secretRef: name: signserver-db-credentials
Reference specific credentials
Reference specific credentials in an existing secret , for example, signserver-credentials using envRaw:
signserver:
  env:
    DATABASE_JDBC_URL: <jdbc connection string>
  envRaw:
    - name: DATABASE_PASSWORD
      valueFrom:
       secretKeyRef:
         name: signserver-credentials
         key: database_password
    - name: DATABASE_USER
      valueFrom:
       secretKeyRef:
         name: signserver-credentials
         key: database_user Use plain text values
This method is only recommended for testing purposes.
For testing, you can optionally use env and plain text values:
signserver:
  env:
    DATABASE_JDBC_URL: <jdbc connection string>
    DATABASE_USER: signserver
    DATABASE_PASSWORD: foo123MariaDB
The following example shows modifications to the helm chart values file used to connect to a MariaDB database with server name mariadb-server and database name signserverdb using username signserver and password foo123:
signserver:
  useEphemeralH2Database: false
  env:
    DATABASE_JDBC_URL: "jdbc:mariadb://signserver-mariadb:3306/signserverdb?characterEncoding=utf8"
    DATABASE_USER: signserver
    DATABASE_PASSWORD: foo123PostgreSQL
The following example connects SignServer to a PostgreSQL database and uses a Kubernetes secret for storing the database username and password:
signserver:
  useEphemeralH2Database: false
  env:
    DATABASE_JDBC_URL: jdbc:postgresql://postgresql-server:5432/signserverdb
  envRaw:
    - name: DATABASE_PASSWORD
      valueFrom:
       secretKeyRef:
         name: signserver-db-credentials
         key: database_password
    - name: DATABASE_USER
      valueFrom:
       secretKeyRef:
         name: signserver-db-credentials
         key: database_userMicrosoft SQL Server
The following example connects SignServer to a Microsoft SQL Server database…
signserver:
  env:
    DATABASE_JDBC_URL: jdbc:sqlserver://mssql-server:1433;DatabaseName=signserver;encrypt=true;trustServerCertificate=false;hostNameInCertificate=*.database.windows.net;loginTimeout=30;sendStringParametersAsUnicode=false
  envFrom:
    - secretRef:
        name: signserver-db-credentialsOracle
The following example connects SignServer to an Oracle database using a secret that contains DATABASE_USER and DATABASE_PASSWORD keys:
signserver:
  env:
    DATABASE_JDBC_URL: jdbc:oracle:thin:@//oracle-server:1521/signserver
  envFrom:
    - secretRef:
        name: signserver-db-credentials.png)