Change External-secrets structure and add oidc to kibana
This commit is contained in:
parent
6ae2f82e49
commit
7a0c80ba9b
@ -1,2 +1,6 @@
|
|||||||
env: int
|
env: int
|
||||||
host: kibana-int.dvirlabs.com
|
host: kibana-int.dvirlabs.com
|
||||||
|
|
||||||
|
oidc:
|
||||||
|
existingSecret: kibana-oidc-secret
|
||||||
|
realm: lab
|
||||||
@ -1,2 +1,6 @@
|
|||||||
env: prod
|
env: prod
|
||||||
host: kibana.dvirlabs.com
|
host: kibana.dvirlabs.com
|
||||||
|
|
||||||
|
oidc:
|
||||||
|
existingSecret: kibana-oidc-secret
|
||||||
|
realm: lab
|
||||||
|
|||||||
@ -2,17 +2,28 @@ apiVersion: kibana.k8s.elastic.co/v1
|
|||||||
kind: Kibana
|
kind: Kibana
|
||||||
metadata:
|
metadata:
|
||||||
name: kibana-{{ .Values.env }}
|
name: kibana-{{ .Values.env }}
|
||||||
|
namespace: monitoring
|
||||||
spec:
|
spec:
|
||||||
version: 8.12.0
|
version: 8.12.0
|
||||||
count: 1
|
count: 1
|
||||||
elasticsearchRef:
|
elasticsearchRef:
|
||||||
name: elasticsearch-{{ .Values.env }}
|
name: elasticsearch-{{ .Values.env }}
|
||||||
config:
|
config:
|
||||||
server:
|
xpack.security.authc.providers:
|
||||||
basePath: ""
|
oidc.oidc1:
|
||||||
rewriteBasePath: false
|
order: 0
|
||||||
ssl:
|
realm: "keycloak"
|
||||||
enabled: false
|
xpack.security.authc.oidc.realms.keycloak:
|
||||||
|
order: 0
|
||||||
|
rp.client_id: "kibana"
|
||||||
|
rp.response_type: "code"
|
||||||
|
rp.redirect_uri: "https://{{ .Values.host }}/api/security/oidc/callback"
|
||||||
|
rp.post_logout_redirect_uri: "https://{{ .Values.host }}"
|
||||||
|
rp.client_secret: {{ (lookup "v1" "Secret" "monitoring" .Values.oidc.existingSecret).data.clientSecret | b64dec | quote }}
|
||||||
|
idp.metadata_url: "https://keycloak.dvirlabs.com/realms/{{ .Values.oidc.realm }}/.well-known/openid-configuration"
|
||||||
|
idp.entity_id: "https://keycloak.dvirlabs.com/realms/{{ .Values.oidc.realm }}"
|
||||||
|
claim_patterns.principal: "preferred_username"
|
||||||
|
claim_patterns.groups: "roles"
|
||||||
http:
|
http:
|
||||||
tls:
|
tls:
|
||||||
selfSignedCertificate:
|
selfSignedCertificate:
|
||||||
|
|||||||
18
manifests/external-secrets/kibana/external-secret.yaml
Normal file
18
manifests/external-secrets/kibana/external-secret.yaml
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: kibana-oidc-secret
|
||||||
|
namespace: monitoring
|
||||||
|
spec:
|
||||||
|
refreshInterval: 1h
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault-backend
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: kibana-oidc-secret
|
||||||
|
creationPolicy: Owner
|
||||||
|
data:
|
||||||
|
- secretKey: clientSecret
|
||||||
|
remoteRef:
|
||||||
|
key: secret/kibana/oidc
|
||||||
|
property: clientSecret
|
||||||
Loading…
x
Reference in New Issue
Block a user