Change External-secrets structure and add oidc to kibana

This commit is contained in:
dvirlabs 2025-05-22 16:01:45 +03:00
parent 6ae2f82e49
commit 7a0c80ba9b
5 changed files with 44 additions and 7 deletions

View File

@ -1,2 +1,6 @@
env: int env: int
host: kibana-int.dvirlabs.com host: kibana-int.dvirlabs.com
oidc:
existingSecret: kibana-oidc-secret
realm: lab

View File

@ -1,2 +1,6 @@
env: prod env: prod
host: kibana.dvirlabs.com host: kibana.dvirlabs.com
oidc:
existingSecret: kibana-oidc-secret
realm: lab

View File

@ -2,17 +2,28 @@ apiVersion: kibana.k8s.elastic.co/v1
kind: Kibana kind: Kibana
metadata: metadata:
name: kibana-{{ .Values.env }} name: kibana-{{ .Values.env }}
namespace: monitoring
spec: spec:
version: 8.12.0 version: 8.12.0
count: 1 count: 1
elasticsearchRef: elasticsearchRef:
name: elasticsearch-{{ .Values.env }} name: elasticsearch-{{ .Values.env }}
config: config:
server: xpack.security.authc.providers:
basePath: "" oidc.oidc1:
rewriteBasePath: false order: 0
ssl: realm: "keycloak"
enabled: false xpack.security.authc.oidc.realms.keycloak:
order: 0
rp.client_id: "kibana"
rp.response_type: "code"
rp.redirect_uri: "https://{{ .Values.host }}/api/security/oidc/callback"
rp.post_logout_redirect_uri: "https://{{ .Values.host }}"
rp.client_secret: {{ (lookup "v1" "Secret" "monitoring" .Values.oidc.existingSecret).data.clientSecret | b64dec | quote }}
idp.metadata_url: "https://keycloak.dvirlabs.com/realms/{{ .Values.oidc.realm }}/.well-known/openid-configuration"
idp.entity_id: "https://keycloak.dvirlabs.com/realms/{{ .Values.oidc.realm }}"
claim_patterns.principal: "preferred_username"
claim_patterns.groups: "roles"
http: http:
tls: tls:
selfSignedCertificate: selfSignedCertificate:

View File

@ -0,0 +1,18 @@
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: kibana-oidc-secret
namespace: monitoring
spec:
refreshInterval: 1h
secretStoreRef:
name: vault-backend
kind: ClusterSecretStore
target:
name: kibana-oidc-secret
creationPolicy: Owner
data:
- secretKey: clientSecret
remoteRef:
key: secret/kibana/oidc
property: clientSecret