rancher-partner-charts/charts/elastic/kibana/examples/security
Samuel Attwood 5335667721 Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
..
test Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
Makefile Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
README.md Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00
values.yaml Removing unpacked chart versions. Changing configuration to just store latest release to reduce quantity of tracked files over time 2022-12-01 23:19:00 -05:00

README.md

Security

This example deploy Kibana 8.5.1 using authentication and TLS to connect to Elasticsearch (see values).

Usage

  • Deploy Elasticsearch Helm chart.

  • Deploy Kibana chart with security: make secrets install

  • You can now retrieve the elastic user password and setup a port forward to connect Kibana:

    # Get elastic user password:
    kubectl get secrets --namespace=default security-master-credentials -ojsonpath='{.data.password}' | base64 -d
    # Setup port forward
    kubectl port-forward svc/helm-kibana-security-kibana 5601
    

Testing

You can also run goss integration tests using make test