IBM
IBM Cloud Catalog Installation Guide
Provision all required IBM Cloud services and install Dynamiq via Helm so that the platform is production‑ready, fully private, and upgradeable through IBM Cloud Schematics.
Table of contents
Prerequisites
IBM Cloud account
Billing enabled & quota for VPC, Kubernetes, Databases for PostgreSQL, and Cloud Object Storage
Access
Manager and Administrator roles on the destination Kubernetes cluster service citeibm_roles_doc
Local tooling
bash, curl, IBM Cloud CLI v2.20+, kubectl v1.31+, Helm v3.13+, jq, openssl
Kubernetes version
1.31 (latest LTS)
Outbound network
Port 22 (SSH), 443 (HTTPS) open to IBM Cloud APIs
Tip If you prefer containerised tooling, grab the official 💡 ibmcloud‑tools image:
docker run --rm -it ibmcom/ibmcloud-tools:latest.
Quick‑start variables
Export once and reuse everywhere:
1 – Install CLI & plugins
Verify:
2 – Authenticate & target a resource group
3 – Create networking (VPC + Subnet + Gateway)
Grab IDs for automation:
4 – Provision the Kubernetes cluster
Configure kubectl:
5 – Provision PostgreSQL
Create credentials:
6 – Provision Object Storage
7 – Install Dynamiq platform
Install Fission CRDs + Dynamiq dependencies:
8 – Create production secrets
Generate secure keys:
Apply secret:
Remember to pass
--set nexus.appSecret=nexus-secret(or prefixed name) when you deploy Dynamiq’s Helm chart.
Install Dynamiq:
9 – Verify installation
Browse to https://<YOUR_DOMAIN> and log in with the initial admin user.
10 – Upgrade
A new chart version appears as an Update inside your IBM Cloud Schematics workspace.
Go to Menu ▸ Schematics → select the workspace.
Click Settings → Update.
Pick the desired chart version and confirm. The Dynamiq pods will roll seamlessly with zero‑downtime if you have ≥ 2 replicas per component.
11 – Uninstall
Appendix A – values.yaml reference
values.yaml referencedynamiq.imageCredentials.username
Container registry username
``
✅
dynamiq.imageCredentials.password
Container registry password
``
✅
nexus.ingress.enabled
Expose Nexus API via ingress
true
✅
nexus.configMapData.DOMAIN
Public FQDN mapped in DNS (e.g. dynamiq.example.com)
``
✅
nexus.appSecret
Name of Kubernetes secret with DB/ObjectStore credentials
nexus-secret
✅
synapse.ingress.enabled
Expose WebSocket gateway
true
✅
ui.ingress.enabled
Expose web UI
true
✅
Appendix B – Security & Compliance controls
Network isolation – all components run inside your VPC with no public ingress unless explicitly enabled.
TLS‑only – Dynamiq forces HTTPS and uses Cert‑Manager (optional) for automated certificate rotation.
IAM separation – each IBM Cloud service instance uses least‑privileged service IDs.
Need help?
Email: [email protected]
Last updated