Skip to content

Commit

Permalink
Merge pull request jaegertracing#374 from cloudoutloud/update-readme
Browse files Browse the repository at this point in the history
[jaeger] Update readme to include cookie secret flag and oauth2 doc link
  • Loading branch information
mehta-ankit committed Jun 16, 2022
2 parents eb6176b + 48801f8 commit e37405b
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 2 deletions.
2 changes: 1 addition & 1 deletion charts/jaeger/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ appVersion: 1.30.0
description: A Jaeger Helm chart for Kubernetes
name: jaeger
type: application
version: 0.56.6
version: 0.56.7
keywords:
- jaeger
- opentracing
Expand Down
5 changes: 4 additions & 1 deletion charts/jaeger/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -336,14 +336,16 @@ If extra protection of the Jaeger UI is needed, then the oAuth2 sidecar can be e
sidecar acts as a security proxy in front of the Jaeger Query service and enforces user authentication before reaching
the Jaeger UI. This method can work with any valid provider including Keycloak, Azure, Google, GitHub, and more.

Offical docs [here](https://oauth2-proxy.github.io/oauth2-proxy/docs/behaviour)

Content of the `jaeger-values.yaml` file:

```YAML
query:
enabled: true
oAuthSidecar:
enabled: true
image: quay.io/oauth2-proxy/oauth2-proxy:v7.1.0
image: quay.io/oauth2-proxy/oauth2-proxy:v7.3.0
pullPolicy: IfNotPresent
containerPort: 4180
args:
Expand All @@ -367,6 +369,7 @@ query:
client_id = "jaeger-query"
oidc_issuer_url = "https://keycloak-svc-domain/auth/realms/Default"
cookie_secure = "true"
cookie_secret = ""
email_domains = "*"
oidc_groups_claim = "groups"
user_id_claim = "preferred_username"
Expand Down

0 comments on commit e37405b

Please sign in to comment.