2025-05-22 16:07:01 +03:00

39 lines
1.3 KiB
YAML

apiVersion: kibana.k8s.elastic.co/v1
kind: Kibana
metadata:
name: kibana-{{ .Values.env }}
namespace: monitoring
spec:
version: 8.12.0
count: 1
elasticsearchRef:
name: elasticsearch-{{ .Values.env }}
config:
xpack.security.authc.providers:
oidc.oidc1:
order: 0
realm: "keycloak"
xpack.security.authc.oidc.realms.keycloak:
order: 0
rp.client_id: "kibana"
rp.response_type: "code"
rp.redirect_uri: "https://{{ .Values.host }}/api/security/oidc/callback"
rp.post_logout_redirect_uri: "https://{{ .Values.host }}"
{{- if and .Values.oidc .Values.oidc.existingSecret }}
rp.client_secret: {{ (lookup "v1" "Secret" "monitoring" .Values.oidc.existingSecret).data.clientSecret | b64dec | quote }}
idp.metadata_url: "https://keycloak.dvirlabs.com/realms/{{ .Values.oidc.realm }}/.well-known/openid-configuration"
idp.entity_id: "https://keycloak.dvirlabs.com/realms/{{ .Values.oidc.realm }}"
{{- else }}
rp.client_secret: ""
idp.metadata_url: ""
idp.entity_id: ""
{{- end }}
claim_patterns.principal: "preferred_username"
claim_patterns.groups: "roles"
http:
tls:
selfSignedCertificate:
disabled: true
service:
spec:
type: ClusterIP