Configuration
Published 07 December 2022
To view or change Redgate Clone configuration settings, use the Config tab of the Admin Console.
Available Settings
Section | What |
---|---|
Authentication: Token-based | Configure authentication parameters for the various components of Redgate Clone when used in a token-based fashion. This is intended for CI/CD pipeline usage. |
Authentication: OpenID Connect (OIDC) | Settings that enable our authentication mechanisms to talk to an existing identity provider using OIDC (e.g. Azure Active Directory). |
Data Image and Data Container Storage Settings (Embedded, Managed Kubernetes) | Specify the path to the attached storage disks, where data images and data containers are going to be stored. |
Communications Security | Settings that control how the host should be accessed from outside the cluster in a secure way (TLS). |
Backup Storage Settings | Specify where the database backups are located so they can be accessed during data image creation. |
Default Clone Lifetimes | Settings that control how long data images and data containers will persist for by default. |
Data Container Port Range | Settings that control the port range that will be used to expose data containers. |
Advanced Settings: Resource Limit & Request Configuration | Settings that enable fine-grained control over memory and CPU usage of data containers for each database engine. |
Advanced Settings: Monitoring | Settings that control access to the monitoring dashboards that ship with Redgate Clone by default. |