feat: ElasticSearch | add oidc login for kibana

This commit is contained in:
2026-02-06 22:16:16 +05:00
parent c24e88562a
commit 0ff067505e
2 changed files with 54 additions and 1 deletions

View File

@@ -1,4 +1,14 @@
--- ---
apiVersion: onepassword.com/v1
kind: OnePasswordItem
metadata:
name: kibana-authentik
namespace: elastic-system
annotations:
operator.1password.io/auto-restart: "true"
spec:
itemPath: "vaults/Lab/items/kibana-authentik"
---
apiVersion: elasticsearch.k8s.elastic.co/v1 apiVersion: elasticsearch.k8s.elastic.co/v1
kind: Elasticsearch kind: Elasticsearch
metadata: metadata:
@@ -10,6 +20,11 @@ spec:
tls: tls:
certificate: certificate:
secretName: elasticsearch-es-http-tls-internal secretName: elasticsearch-es-http-tls-internal
secureSettings:
- secretName: kibana-authentik
entries:
- key: client-secret
path: "xpack.security.authc.realms.oidc.authentik.rp.client_secret"
nodeSets: nodeSets:
- name: master - name: master
count: 3 count: 3
@@ -32,6 +47,21 @@ spec:
storageClassName: longhorn storageClassName: longhorn
config: config:
node.roles: ["master"] node.roles: ["master"]
xpack.security.authc.token.enabled: true
xpack.security.authc.realms.oidc.authentik:
order: 2
rp.client_id: "atlY82FGIBYvUg87cnENzks5ft1AUUtIfQsXSDog"
rp.response_type: code
rp.redirect_uri: "https://kibana.dogar.dev/api/security/oidc/callback"
op.issuer: "https://auth.dogar.dev/application/o/kibana/"
op.authorization_endpoint: "https://auth.dogar.dev/application/o/authorize/"
op.token_endpoint: "https://auth.dogar.dev/application/o/token/"
op.jwkset_path: "https://auth.dogar.dev/application/o/kibana/jwks/"
op.userinfo_endpoint: "https://auth.dogar.dev/application/o/userinfo/"
op.endsession_endpoint: "https://auth.dogar.dev/application/o/kibana/end-session/"
rp.post_logout_redirect_uri: "https://kibana.dogar.dev/security/logged_out"
claims.principal: sub
claims.groups: groups
- name: data - name: data
count: 3 count: 3
podTemplate: podTemplate:
@@ -53,3 +83,18 @@ spec:
storageClassName: longhorn storageClassName: longhorn
config: config:
node.roles: ["data", "ingest"] node.roles: ["data", "ingest"]
xpack.security.authc.token.enabled: true
xpack.security.authc.realms.oidc.authentik:
order: 2
rp.client_id: "atlY82FGIBYvUg87cnENzks5ft1AUUtIfQsXSDog"
rp.response_type: code
rp.redirect_uri: "https://kibana.dogar.dev/api/security/oidc/callback"
op.issuer: "https://auth.dogar.dev/application/o/kibana/"
op.authorization_endpoint: "https://auth.dogar.dev/application/o/authorize/"
op.token_endpoint: "https://auth.dogar.dev/application/o/token/"
op.jwkset_path: "https://auth.dogar.dev/application/o/kibana/jwks/"
op.userinfo_endpoint: "https://auth.dogar.dev/application/o/userinfo/"
op.endsession_endpoint: "https://auth.dogar.dev/application/o/kibana/end-session/"
rp.post_logout_redirect_uri: "https://kibana.dogar.dev/security/logged_out"
claims.principal: sub
claims.groups: groups

View File

@@ -13,4 +13,12 @@ spec:
tls: tls:
certificate: certificate:
secretName: kibana-kb-http-tls-internal secretName: kibana-kb-http-tls-internal
config:
server.publicBaseUrl: "https://kibana.dogar.dev"
xpack.security.authc.providers:
oidc.authentik:
order: 0
realm: authentik
description: "Log in with Authentik"
basic.basic1:
order: 1