I am trying to configure elasticsearch in our kubernetes cluster using helm charts and values.yaml as we use Azure DevOps pipelines for our deployment strategy into Azure Kubernetes clusters.
However, I am struggling to configure the in-built X-pack security so that I can utilitise the role based security features that come with elasticsearch.
Are there any tutorials/step-by-step guides on how to configure the helm charts and what values to enter into the values.yaml file so that I can get this working? I have found various things on github but, so far, I have been unable to get them working.
Is the alternative to use the ECK yaml file to deploy the entire thing but I am not sure whether I can do this via our DevOps pipeline.
Has anyone deployed elasticsearch via a DevOps pipeline and can offer some assistance?
I would like to have the ability of using the built in functionality so that different users can log into Kibana and have different roles...e.g. some users can edit and others users only have read access. I have spoken to the guys at elastic and they say that I can configure this using the basic subscription but when I enable xpack in the values.yml file, it fails to deploy so there is obviously some configuration steps that I am missing but I can't work out what I am missing...
My first problem is configuring xpack in the values.yml file for the standard deployment helm charts - it seems to be falling over there..
Once I have the master "elastic" account, I then have the second problem of creating accounts for the different users... can this be done through the kibana UI or does it have to be done via helm charts too?
I apologise if I don't make sense as I am VERY new to elasticsearch/k8s/helm etc... but thanks for all your help so far..
I haven't done any secretMounts as I am not sure whether I need those.. And I will need to link the user name and password to pipeline variables at some point.
I can see you have opened this topic in wrong section , you are using elastic search official helm chart so topic should me elasticsearch not elastic cloud on kubernetes.
alternatively what you can do it is:
add xpack.security.authc.realms.file.file1.order: 0 under elasticsearch.yaml
and have a init container edit your {ES-PATH-CONF}/users_roles and {ES-PATH-CONF}/users with the required roles and username
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.