-
Notifications
You must be signed in to change notification settings - Fork 706
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for custom realms for Elasticsearch authentication. #40
Comments
Now supported through a mixture of |
Hi, Any documentation how to enable LDAP user auth through ECK operator? |
There is no special thing to do to configure LDAP authentication for Elasticsearch when using ECK. See the Elasticsearch documentation to configure LDAP: https://www.elastic.co/guide/en/elasticsearch/reference/current/ldap-realm.html#ldap-realm-configuration See the ECK documentation to add settings to the Elasticsearch configuration: Note that in version |
Great, Thanks |
@thbkrkr I tried this config but doesnt seem to take any effect , is there a way to chck where it is failing? I don't see any ldap config created by operator.
|
The Corrected manifest: apiVersion: elasticsearch.k8s.elastic.co/v1beta1
kind: Elasticsearch
metadata:
name: livelogs
namespace: livelogs
spec:
version: 7.5.0
nodeSets:
- name: livelogs
count: 3
podTemplate:
spec:
containers:
- name: elasticsearch
image: docker.elastic.co/elasticsearch/elasticsearch:7.5.0
resources:
limits:
memory: 24Gi
cpu: 4
env:
- name: ES_JAVA_OPTS
value: "-Xms16g -Xmx16g"
config:
node.master: true
node.data: true
node.ingest: true
node.store.allow_mmap: true
xpack.security.authc.realms:
ldap:
ldap1:
order: 0
url: "ldaps://hh-ldap.mydomain"
bind_dn: "ou=people, dc=example, dc=com"
user_search:
base_dn: "dc=example,dc=com"
filter: "(uid={0})"
group_search:
base_dn: "example,dc=com"
volumeClaimTemplates:
- metadata:
name: elasticsearch-data
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 500Gi
storageClassName: standard-01
http:
service:
spec:
type: NodePort
tls:
selfSignedCertificate:
disabled: true |
@thbkrkr still not able to login , which pod logs should I check to see any ldap related errors. |
but our ldap setup is working without password for other services. |
According to the documentation https://www.elastic.co/guide/en/elasticsearch/reference/master/active-directory-realm.html, you need to add a Since it is not related to ECK, please use https://discuss.elastic.co/c/elasticsearch/6 to ask this kind of questions about setting up Elasticsearch. |
By default we will use the file realm for our internal uses and let consumers of our deployment use the ES native realm. For larger deployments, custom realms become more important:
These resources might have to include a versioned component as well (not all of these are as important as the others):
In some cases, this would also entail installing a certificate (e.g ldaps) so we can support encryption.
The text was updated successfully, but these errors were encountered: