diff --git a/charts/jaeger/Chart.yaml b/charts/jaeger/Chart.yaml index c43ba62a..ac02ebaa 100644 --- a/charts/jaeger/Chart.yaml +++ b/charts/jaeger/Chart.yaml @@ -3,7 +3,7 @@ appVersion: 1.30.0 description: A Jaeger Helm chart for Kubernetes name: jaeger type: application -version: 0.56.6 +version: 0.56.7 keywords: - jaeger - opentracing diff --git a/charts/jaeger/README.md b/charts/jaeger/README.md index 0be137e8..dfc2d0b9 100644 --- a/charts/jaeger/README.md +++ b/charts/jaeger/README.md @@ -336,6 +336,8 @@ If extra protection of the Jaeger UI is needed, then the oAuth2 sidecar can be e sidecar acts as a security proxy in front of the Jaeger Query service and enforces user authentication before reaching the Jaeger UI. This method can work with any valid provider including Keycloak, Azure, Google, GitHub, and more. +Offical docs [here](https://oauth2-proxy.github.io/oauth2-proxy/docs/behaviour) + Content of the `jaeger-values.yaml` file: ```YAML @@ -343,7 +345,7 @@ query: enabled: true oAuthSidecar: enabled: true - image: quay.io/oauth2-proxy/oauth2-proxy:v7.1.0 + image: quay.io/oauth2-proxy/oauth2-proxy:v7.3.0 pullPolicy: IfNotPresent containerPort: 4180 args: @@ -367,6 +369,7 @@ query: client_id = "jaeger-query" oidc_issuer_url = "https://keycloak-svc-domain/auth/realms/Default" cookie_secure = "true" + cookie_secret = "" email_domains = "*" oidc_groups_claim = "groups" user_id_claim = "preferred_username"