Continue follow the prompts so that email authorization is sent to the owner of the domain specified by the CSR (in our example, the domain was couchdb.apache.org, so the official contact for that domain will be looked up in DNS).
In some older versions of CouchDB 2.x (that have OTHER security issues, and we do NOT recommend you run these) you can disable port 5984 by amending /usr/local/etc/couchdb/default.ini [daemons ] section accordingly:
This alert monitors the boolean metric couchdb_couch_replicator_cluster_is_stable, replacing the typical up metric for measuring if the deployment is healthy. If a 0 (unhealthy) is observed for more than five minutes, a critical alert is fired.
The Operator for Apache CouchDB automatically generates a Service. This can be accessed using port-forwarding e.g. kubectl port-forward svc/my-couchdb-cluster 5984:5984 -u admin:mypassword. Alternatively, configure a Kubernetes Ingress to expose the service externally.
df19127ead