diff --git a/elasticsearch/templates/_kibana.sh.tpl b/elasticsearch/templates/_kibana.sh.tpl
new file mode 100644
index 000000000..303347751
--- /dev/null
+++ b/elasticsearch/templates/_kibana.sh.tpl
@@ -0,0 +1,32 @@
+#!/bin/bash
+{{/*
+Copyright 2017 The Openstack-Helm Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/}}
+
+set -ex
+COMMAND="${@:-start}"
+
+function start () {
+ exec kibana \
+ --elasticsearch.url="${ELASTICSEARCH_URL}" \
+ --elasticsearch.username="${ELASTICSEARCH_USERNAME}" \
+ --elasticsearch.password="{$ELASTICSEARCH_PASSWORD}"
+}
+
+function stop () {
+ kill -TERM 1
+}
+
+$COMMAND
diff --git a/elasticsearch/templates/bin/_apache.sh.tpl b/elasticsearch/templates/bin/_apache.sh.tpl
new file mode 100644
index 000000000..b03ac0945
--- /dev/null
+++ b/elasticsearch/templates/bin/_apache.sh.tpl
@@ -0,0 +1,46 @@
+#!/bin/bash
+
+{{/*
+Copyright 2017 The Openstack-Helm Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/}}
+
+set -ev
+
+COMMAND="${@:-start}"
+
+function start () {
+
+ if [ -f /etc/apache2/envvars ]; then
+ # Loading Apache2 ENV variables
+ source /etc/httpd/apache2/envvars
+ fi
+ # Apache gets grumpy about PID files pre-existing
+ rm -f /etc/httpd/logs/httpd.pid
+
+ if [ -f {{ .Values.conf.apache.htpasswd }} ]; then
+ htpasswd -b {{ .Values.conf.apache.htpasswd }} $ELASTICSEARCH_USERNAME $ELASTICSEARCH_PASSWORD
+ else
+ htpasswd -cb {{ .Values.conf.apache.htpasswd }} $ELASTICSEARCH_USERNAME $ELASTICSEARCH_PASSWORD
+ fi
+
+ #Launch Apache on Foreground
+ exec httpd -DFOREGROUND
+}
+
+function stop () {
+ apachectl -k graceful-stop
+}
+
+$COMMAND
diff --git a/elasticsearch/templates/bin/_helm-tests.sh.tpl b/elasticsearch/templates/bin/_helm-tests.sh.tpl
index 94f776a3c..918c8fd1a 100644
--- a/elasticsearch/templates/bin/_helm-tests.sh.tpl
+++ b/elasticsearch/templates/bin/_helm-tests.sh.tpl
@@ -19,7 +19,8 @@ limitations under the License.
set -ex
function create_index () {
- index_result=$(curl -XPUT "${ELASTICSEARCH_ENDPOINT}/test_index?pretty" -H 'Content-Type: application/json' -d'
+ index_result=$(curl -K- <<< "--user ${ELASTICSEARCH_USERNAME}:${ELASTICSEARCH_PASSWORD}" \
+ -XPUT "${ELASTICSEARCH_ENDPOINT}/test_index?pretty" -H 'Content-Type: application/json' -d'
{
"settings" : {
"index" : {
@@ -39,7 +40,8 @@ function create_index () {
}
function insert_test_data () {
- insert_result=$(curl -XPUT "${ELASTICSEARCH_ENDPOINT}/sample_index/sample_type/123/_create?pretty" -H 'Content-Type: application/json' -d'
+ insert_result=$(curl -K- <<< "--user ${ELASTICSEARCH_USERNAME}:${ELASTICSEARCH_PASSWORD}" \
+ -XPUT "${ELASTICSEARCH_ENDPOINT}/sample_index/sample_type/123/_create?pretty" -H 'Content-Type: application/json' -d'
{
"name" : "Elasticsearch",
"message" : "Test data text entry"
@@ -56,18 +58,19 @@ function insert_test_data () {
function check_hits () {
- total_hits=$(curl -XGET "${ELASTICSEARCH_ENDPOINT}/_search?pretty" -H 'Content-Type: application/json' -d'
- {
- "query" : {
- "bool": {
- "must": [
- { "match": { "name": "Elasticsearch" }},
- { "match": { "message": "Test data text entry" }}
- ]
- }
+ total_hits=$(curl -K- <<< "--user ${ELASTICSEARCH_USERNAME}:${ELASTICSEARCH_PASSWORD}" \
+ "${ELASTICSEARCH_ENDPOINT}/_search?pretty" -H 'Content-Type: application/json' -d'
+ {
+ "query" : {
+ "bool": {
+ "must": [
+ { "match": { "name": "Elasticsearch" }},
+ { "match": { "message": "Test data text entry" }}
+ ]
}
}
- ' | python -c "import sys, json; print json.load(sys.stdin)['hits']['total']")
+ }
+ ' | python -c "import sys, json; print json.load(sys.stdin)['hits']['total']")
if [ "$total_hits" -gt 0 ]; then
echo "PASS: Successful hits on test data query!"
else
diff --git a/elasticsearch/templates/bin/_register-repository.sh.tpl b/elasticsearch/templates/bin/_register-repository.sh.tpl
index 5c19083ff..76154ca6b 100644
--- a/elasticsearch/templates/bin/_register-repository.sh.tpl
+++ b/elasticsearch/templates/bin/_register-repository.sh.tpl
@@ -17,11 +17,13 @@ limitations under the License.
set -ex
-exec curl -X PUT "${ELASTICSEARCH_ENDPOINT}/_snapshot/${REPO_NAME}" -H 'Content-Type: application/json' -d'
-{
- "type": "'"$REPO_TYPE"'",
- "settings": {
- "location": "'"$REPO_LOCATION"'",
- "compress": true
- }
-}'
+exec curl -K- <<< "--user ${ELASTICSEARCH_USERNAME}:${ELASTICSEARCH_PASSWORD}" \
+ "${ELASTICSEARCH_ENDPOINT}/_snapshot/${REPO_NAME}" \
+ -H 'Content-Type: application/json' -d'
+ {
+ "type": "'"$REPO_TYPE"'",
+ "settings": {
+ "location": "'"$REPO_LOCATION"'",
+ "compress": true
+ }
+ }'
diff --git a/elasticsearch/templates/configmap-bin.yaml b/elasticsearch/templates/configmap-bin.yaml
index 6c7004708..d7db9a24e 100644
--- a/elasticsearch/templates/configmap-bin.yaml
+++ b/elasticsearch/templates/configmap-bin.yaml
@@ -22,6 +22,8 @@ kind: ConfigMap
metadata:
name: elasticsearch-bin
data:
+ apache.sh: |
+{{ tuple "bin/_apache.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
elasticsearch.sh: |
{{ tuple "bin/_elasticsearch.sh.tpl" . | include "helm-toolkit.utils.template" | indent 4 }}
helm-tests.sh: |
diff --git a/elasticsearch/templates/configmap-etc.yaml b/elasticsearch/templates/configmap-etc.yaml
index f77f99722..8bfcefc61 100644
--- a/elasticsearch/templates/configmap-etc.yaml
+++ b/elasticsearch/templates/configmap-etc.yaml
@@ -26,6 +26,10 @@ kind: ConfigMap
metadata:
name: elasticsearch-etc
data:
+ httpd.conf: |+
+{{- tuple .Values.conf.apache.httpd "etc/_httpd.conf.tpl" . | include "helm-toolkit.utils.configmap_templater" }}
+ elasticsearch-host.conf: |+
+{{- tuple .Values.conf.apache.host "etc/_elasticsearch-host.conf.tpl" . | include "helm-toolkit.utils.configmap_templater" }}
elasticsearch.yml: |+
{{ toYaml .Values.conf.elasticsearch.config | indent 4 }}
log4j2.properties: |+
diff --git a/elasticsearch/templates/deployment-client.yaml b/elasticsearch/templates/deployment-client.yaml
index b65010908..8aa1cae88 100644
--- a/elasticsearch/templates/deployment-client.yaml
+++ b/elasticsearch/templates/deployment-client.yaml
@@ -16,6 +16,7 @@ limitations under the License.
{{- if .Values.manifests.deployment_client }}
{{- $envAll := . }}
+{{- $esUserSecret := .Values.secrets.elasticsearch.user }}
{{- if .Values.images.local_registry.active -}}
{{- $_ := set .Values "pod_dependency" (merge .Values.dependencies.elasticsearch_client .Values.conditional_dependencies.local_image_registry) -}}
{{- else -}}
@@ -108,6 +109,43 @@ spec:
mountPath: {{ .Values.conf.elasticsearch.repository.location }}
{{ end }}
containers:
+ - name: apache-proxy
+{{ tuple $envAll "apache_proxy" | include "helm-toolkit.snippets.image" | indent 10 }}
+{{ tuple $envAll $envAll.Values.pod.resources.apache_proxy | include "helm-toolkit.snippets.kubernetes_resources" | indent 10 }}
+ command:
+ - /tmp/apache.sh
+ - start
+ ports:
+ - name: http
+ containerPort: 80
+ env:
+ - name: ELASTICSEARCH_PORT
+ value: {{ tuple "elasticsearch" "internal" "client" . | include "helm-toolkit.endpoints.endpoint_port_lookup" | quote }}
+ - name: ELASTICSEARCH_USERNAME
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_USERNAME
+ - name: ELASTICSEARCH_PASSWORD
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_PASSWORD
+ volumeMounts:
+ - name: elasticsearch-bin
+ mountPath: /tmp/apache.sh
+ subPath: apache.sh
+ readOnly: true
+ - name: elasticsearch-etc
+ mountPath: /usr/local/apache2/conf/httpd.conf
+ subPath: httpd.conf
+ readOnly: true
+ - name: pod-etc-apache
+ mountPath: /usr/local/apache2/conf/sites-enabled
+ - name: elasticsearch-etc
+ mountPath: /usr/local/apache2/conf/sites-enabled/elasticsearch-host.conf
+ subPath: elasticsearch-host.conf
+ readOnly: true
- name: elasticsearch-client
securityContext:
privileged: true
@@ -184,6 +222,8 @@ spec:
{{ end }}
{{ if $mounts_elasticsearch.volumeMounts }}{{ toYaml $mounts_elasticsearch.volumeMounts | indent 12 }}{{ end }}
volumes:
+ - name: pod-etc-apache
+ emptyDir: {}
- name: elasticsearch-logs
emptyDir: {}
- name: elasticsearch-bin
diff --git a/elasticsearch/templates/etc/_elasticsearch-host.conf.tpl b/elasticsearch/templates/etc/_elasticsearch-host.conf.tpl
new file mode 100644
index 000000000..d9ba7a3cf
--- /dev/null
+++ b/elasticsearch/templates/etc/_elasticsearch-host.conf.tpl
@@ -0,0 +1,28 @@
+{{/*
+Copyright 2017 The Openstack-Helm Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/}}
+
+
+
+ ProxyPass http://localhost:${ELASTICSEARCH_PORT}/
+ ProxyPassReverse http://localhost:${ELASTICSEARCH_PORT}/
+
+
+ AuthType Basic
+ AuthName "Authentication Required"
+ AuthUserFile {{.Values.conf.apache.htpasswd | quote}}
+ Require valid-user
+
+
diff --git a/elasticsearch/templates/etc/_httpd.conf.tpl b/elasticsearch/templates/etc/_httpd.conf.tpl
new file mode 100644
index 000000000..115048ee3
--- /dev/null
+++ b/elasticsearch/templates/etc/_httpd.conf.tpl
@@ -0,0 +1,186 @@
+#
+# This is the main Apache HTTP server configuration file. It contains the
+# configuration directives that give the server its instructions.
+# See for detailed information.
+# In particular, see
+#
+# for a discussion of each configuration directive.
+#
+# Do NOT simply read the instructions in here without understanding
+# what they do. They're here only as hints or reminders. If you are unsure
+# consult the online docs. You have been warned.
+#
+# Configuration and logfile names: If the filenames you specify for many
+# of the server's control files begin with "/" (or "drive:/" for Win32), the
+# server will use that explicit path. If the filenames do *not* begin
+# with "/", the value of ServerRoot is prepended -- so "logs/access_log"
+# with ServerRoot set to "/usr/local/apache2" will be interpreted by the
+# server as "/usr/local/apache2/logs/access_log", whereas "/logs/access_log"
+# will be interpreted as '/logs/access_log'.
+
+ServerRoot "/usr/local/apache2"
+
+#
+# Listen: Allows you to bind Apache to specific IP addresses and/or
+# ports, instead of the default. See also the
+# directive.
+#
+# Change this to Listen on specific IP addresses as shown below to
+# prevent Apache from glomming onto all bound IP addresses.
+#
+#Listen 12.34.56.78:80
+Listen 80
+
+#
+# Dynamic Shared Object (DSO) Support
+#
+# To be able to use the functionality of a module which was built as a DSO you
+# have to place corresponding `LoadModule' lines at this location so the
+# directives contained in it are actually available _before_ they are used.
+# Statically compiled modules (those listed by `httpd -l') do not need
+# to be loaded here.
+#
+# Example:
+# LoadModule foo_module modules/mod_foo.so
+#
+LoadModule authn_file_module modules/mod_authn_file.so
+LoadModule authn_core_module modules/mod_authn_core.so
+LoadModule authz_host_module modules/mod_authz_host.so
+LoadModule authz_groupfile_module modules/mod_authz_groupfile.so
+LoadModule authz_user_module modules/mod_authz_user.so
+LoadModule authz_core_module modules/mod_authz_core.so
+LoadModule access_compat_module modules/mod_access_compat.so
+LoadModule auth_basic_module modules/mod_auth_basic.so
+LoadModule reqtimeout_module modules/mod_reqtimeout.so
+LoadModule filter_module modules/mod_filter.so
+LoadModule proxy_html_module modules/mod_proxy_html.so
+LoadModule log_config_module modules/mod_log_config.so
+LoadModule env_module modules/mod_env.so
+LoadModule headers_module modules/mod_headers.so
+LoadModule setenvif_module modules/mod_setenvif.so
+LoadModule version_module modules/mod_version.so
+LoadModule proxy_module modules/mod_proxy.so
+LoadModule proxy_connect_module modules/mod_proxy_connect.so
+LoadModule proxy_http_module modules/mod_proxy_http.so
+LoadModule proxy_balancer_module modules/mod_proxy_balancer.so
+LoadModule slotmem_shm_module modules/mod_slotmem_shm.so
+LoadModule slotmem_plain_module modules/mod_slotmem_plain.so
+LoadModule unixd_module modules/mod_unixd.so
+LoadModule status_module modules/mod_status.so
+LoadModule autoindex_module modules/mod_autoindex.so
+
+
+#
+# If you wish httpd to run as a different user or group, you must run
+# httpd as root initially and it will switch.
+#
+# User/Group: The name (or #number) of the user/group to run httpd as.
+# It is usually good practice to create a dedicated user and group for
+# running httpd, as with most system services.
+#
+User daemon
+Group daemon
+
+
+
+# 'Main' server configuration
+#
+# The directives in this section set up the values used by the 'main'
+# server, which responds to any requests that aren't handled by a
+# definition. These values also provide defaults for
+# any containers you may define later in the file.
+#
+# All of these directives may appear inside containers,
+# in which case these default settings will be overridden for the
+# virtual host being defined.
+#
+
+#
+# Deny access to the entirety of your server's filesystem. You must
+# explicitly permit access to web content directories in other
+# blocks below.
+#
+
+ AllowOverride none
+ Require all denied
+
+
+#
+# The following lines prevent .htaccess and .htpasswd files from being
+# viewed by Web clients.
+#
+
+ Require all denied
+
+
+#
+# ErrorLog: The location of the error log file.
+# If you do not specify an ErrorLog directive within a
+# container, error messages relating to that virtual host will be
+# logged here. If you *do* define an error logfile for a
+# container, that host's errors will be logged there and not here.
+#
+ErrorLog /dev/stderr
+
+#
+# LogLevel: Control the number of messages logged to the error_log.
+# Possible values include: debug, info, notice, warn, error, crit,
+# alert, emerg.
+#
+LogLevel warn
+
+
+ #
+ # The following directives define some format nicknames for use with
+ # a CustomLog directive (see below).
+ #
+ LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
+ LogFormat "%h %l %u %t \"%r\" %>s %b" common
+
+
+ # You need to enable mod_logio.c to use %I and %O
+ LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
+
+
+ #
+ # The location and format of the access logfile (Common Logfile Format).
+ # If you do not define any access logfiles within a
+ # container, they will be logged here. Contrariwise, if you *do*
+ # define per- access logfiles, transactions will be
+ # logged therein and *not* in this file.
+ #
+ CustomLog /dev/stdout common
+
+ #
+ # If you prefer a logfile with access, agent, and referer information
+ # (Combined Logfile Format) you can use the following directive.
+ #
+ CustomLog /dev/stdout combined
+
+
+#
+# "/usr/local/apache2/cgi-bin" should be changed to whatever your ScriptAliased
+# CGI directory exists, if you have that configured.
+#
+
+ AllowOverride None
+ Options None
+ Require all granted
+
+
+
+ #
+ # Avoid passing HTTP_PROXY environment to CGI's on this or any proxied
+ # backend servers which have lingering "httpoxy" defects.
+ # 'Proxy' request header is undefined by the IETF, not listed by IANA
+ #
+ RequestHeader unset Proxy early
+
+
+# Virtual hosts
+Include conf/sites-enabled/*.conf
+
+# Configure mod_proxy_html to understand HTML4/XHTML1
+
+Include conf/extra/proxy-html.conf
+
diff --git a/elasticsearch/templates/job-register-snapshot-repository.yaml b/elasticsearch/templates/job-register-snapshot-repository.yaml
index ca7c5143b..e82554545 100644
--- a/elasticsearch/templates/job-register-snapshot-repository.yaml
+++ b/elasticsearch/templates/job-register-snapshot-repository.yaml
@@ -17,6 +17,7 @@ limitations under the License.
{{- if .Values.manifests.job_snapshot_repository }}
{{- if .Values.conf.elasticsearch.repository.enabled }}
{{- $envAll := . }}
+{{- $esUserSecret := .Values.secrets.elasticsearch.user }}
{{- $_ := set .Values "pod_dependency" .Values.dependencies.snapshot_repository -}}
{{- $serviceAccountName := "elasticsearch-register-snapshot-repository" }}
@@ -43,8 +44,18 @@ spec:
{{ tuple $envAll "snapshot_repository" | include "helm-toolkit.snippets.image" | indent 10 }}
{{ tuple $envAll $envAll.Values.pod.resources.jobs.snapshot_repository | include "helm-toolkit.snippets.kubernetes_resources" | indent 10 }}
env:
+ - name: ELASTICSEARCH_USERNAME
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_USERNAME
+ - name: ELASTICSEARCH_PASSWORD
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_PASSWORD
- name: ELASTICSEARCH_ENDPOINT
- value: {{ tuple "elasticsearch" "internal" "client" . | include "helm-toolkit.endpoints.host_and_port_endpoint_uri_lookup" }}
+ value: {{ tuple "elasticsearch" "internal" "http" . | include "helm-toolkit.endpoints.host_and_port_endpoint_uri_lookup" }}
- name: REPO_NAME
value: {{ .Values.conf.elasticsearch.repository.name | quote }}
- name: REPO_TYPE
diff --git a/elasticsearch/templates/pod-helm-tests.yaml b/elasticsearch/templates/pod-helm-tests.yaml
index 664bd7931..b6bd74bb0 100644
--- a/elasticsearch/templates/pod-helm-tests.yaml
+++ b/elasticsearch/templates/pod-helm-tests.yaml
@@ -16,6 +16,7 @@ limitations under the License.
{{- if .Values.manifests.helm_tests }}
{{- $envAll := . }}
+{{- $esUserSecret := .Values.secrets.elasticsearch.user }}
---
apiVersion: v1
kind: Pod
@@ -32,8 +33,18 @@ spec:
command:
- /tmp/helm-tests.sh
env:
+ - name: ELASTICSEARCH_USERNAME
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_USERNAME
+ - name: ELASTICSEARCH_PASSWORD
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_PASSWORD
- name: ELASTICSEARCH_ENDPOINT
- value: {{ tuple "elasticsearch" "internal" "client" . | include "helm-toolkit.endpoints.host_and_port_endpoint_uri_lookup" }}
+ value: {{ tuple "elasticsearch" "internal" "http" . | include "helm-toolkit.endpoints.host_and_port_endpoint_uri_lookup" }}
volumeMounts:
- name: elasticsearch-bin
mountPath: /tmp/helm-tests.sh
diff --git a/elasticsearch/templates/secret-admin-creds.yaml b/elasticsearch/templates/secret-admin-creds.yaml
new file mode 100644
index 000000000..a9c95c7e0
--- /dev/null
+++ b/elasticsearch/templates/secret-admin-creds.yaml
@@ -0,0 +1,29 @@
+{{/*
+Copyright 2017 The Openstack-Helm Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/}}
+
+{{- if .Values.manifests.secret_admin }}
+{{- $envAll := . }}
+{{- $secretName := index $envAll.Values.secrets.elasticsearch.user }}
+---
+apiVersion: v1
+kind: Secret
+metadata:
+ name: {{ $secretName }}
+type: Opaque
+data:
+ ELASTICSEARCH_USERNAME: {{ .Values.endpoints.elasticsearch.auth.admin.username | b64enc }}
+ ELASTICSEARCH_PASSWORD: {{ .Values.endpoints.elasticsearch.auth.admin.password | b64enc }}
+{{- end }}
diff --git a/elasticsearch/templates/service-logging.yaml b/elasticsearch/templates/service-logging.yaml
index 6048e818d..7b937e247 100644
--- a/elasticsearch/templates/service-logging.yaml
+++ b/elasticsearch/templates/service-logging.yaml
@@ -24,7 +24,7 @@ metadata:
spec:
ports:
- name: http
- port: {{ .Values.network.client.port }}
+ port: 80
{{- if .Values.network.client.node_port.enabled }}
nodePort: {{ .Values.network.client.node_port.port }}
{{- end }}
diff --git a/elasticsearch/values.yaml b/elasticsearch/values.yaml
index 85d7cbc64..bc77bc7f0 100644
--- a/elasticsearch/values.yaml
+++ b/elasticsearch/values.yaml
@@ -18,6 +18,7 @@
images:
tags:
+ apache_proxy: docker.io/httpd:2.4
memory_init: docker.io/kolla/ubuntu-source-heat-engine:3.0.3
curator: docker.io/bobrik/curator:5.2.0
elasticsearch: docker.io/elasticsearch:5.4.2
@@ -144,7 +145,14 @@ pod:
memory: "1024Mi"
cpu: "2000m"
+secrets:
+ elasticsearch:
+ user: elasticsearch-admin-creds
+
conf:
+ apache:
+ htpasswd: /usr/local/apache2/conf/.htpasswd
+ httpd:
init:
max_map_count: 262144
curator:
@@ -263,6 +271,10 @@ endpoints:
elasticsearch:
name: elasticsearch
namespace: null
+ auth:
+ admin:
+ username: admin
+ password: changeme
hosts:
data: elasticsearch-data
default: elasticsearch-logging
@@ -277,6 +289,8 @@ endpoints:
port:
client:
default: 9200
+ http:
+ default: 80
discovery:
default: 9300
@@ -326,6 +340,7 @@ manifests:
job_snapshot_repository: true
helm_tests: true
pvc_snapshots: true
+ secret_admin: true
service_data: true
service_discovery: true
service_logging: true
diff --git a/fluent-logging/templates/bin/_helm-tests.sh.tpl b/fluent-logging/templates/bin/_helm-tests.sh.tpl
index 304dee0de..deb717b43 100644
--- a/fluent-logging/templates/bin/_helm-tests.sh.tpl
+++ b/fluent-logging/templates/bin/_helm-tests.sh.tpl
@@ -21,7 +21,8 @@ set -ex
# Tests whether fluentd has successfully indexed data into Elasticsearch under
# the logstash-* index via the fluent-elasticsearch plugin
function check_logstash_index () {
- total_hits=$(curl -XGET "${ELASTICSEARCH_ENDPOINT}/logstash-*/fluentd/_search?pretty" -H 'Content-Type: application/json' \
+ total_hits=$(curl -K- <<< "--user ${ELASTICSEARCH_USERNAME}:${ELASTICSEARCH_PASSWORD}" \
+ -XGET "${ELASTICSEARCH_ENDPOINT}/logstash-*/fluentd/_search?pretty" -H 'Content-Type: application/json' \
| python -c "import sys, json; print json.load(sys.stdin)['hits']['total']")
if [ "$total_hits" -gt 0 ]; then
echo "PASS: Successful hits on logstash-* index, provided by fluentd!"
@@ -34,7 +35,8 @@ function check_logstash_index () {
# Tests whether fluentd has successfully tagged data with the kube.*
# prefix via the fluent-kubernetes plugin
function check_kubernetes_tag () {
- total_hits=$(curl -XGET "${ELASTICSEARCH_ENDPOINT}/logstash-*/fluentd/_search?q=tag:kube.*" -H 'Content-Type: application/json' \
+ total_hits=$(curl -K- <<< "--user ${ELASTICSEARCH_USERNAME}:${ELASTICSEARCH_PASSWORD}" \
+ -XGET "${ELASTICSEARCH_ENDPOINT}/logstash-*/fluentd/_search?q=tag:kube.*" -H 'Content-Type: application/json' \
| python -c "import sys, json; print json.load(sys.stdin)['hits']['total']")
if [ "$total_hits" -gt 0 ]; then
echo "PASS: Successful hits on logstash-* index, provided by fluentd!"
diff --git a/fluent-logging/templates/deployment-fluentd.yaml b/fluent-logging/templates/deployment-fluentd.yaml
index 60363ce4e..fcaa1790b 100644
--- a/fluent-logging/templates/deployment-fluentd.yaml
+++ b/fluent-logging/templates/deployment-fluentd.yaml
@@ -16,6 +16,7 @@ limitations under the License.
{{- if .Values.manifests.deployment_fluentd }}
{{- $envAll := . }}
+{{- $esUserSecret := .Values.secrets.elasticsearch.user }}
{{- if .Values.images.local_registry.active -}}
{{- $_ := set .Values "pod_dependency" (merge .Values.dependencies.fluentd .Values.conditional_dependencies.local_image_registry) -}}
{{- else -}}
@@ -117,6 +118,16 @@ spec:
value: {{ tuple "elasticsearch" "internal" . | include "helm-toolkit.endpoints.hostname_short_endpoint_lookup" | quote }}
- name: ELASTICSEARCH_PORT
value: {{ tuple "elasticsearch" "internal" "client" . | include "helm-toolkit.endpoints.endpoint_port_lookup" | quote }}
+ - name: ELASTICSEARCH_USERNAME
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_USERNAME
+ - name: ELASTICSEARCH_PASSWORD
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_PASSWORD
volumeMounts:
- name: pod-etc-fluentd
mountPath: /etc/td-agent
diff --git a/fluent-logging/templates/pod-helm-tests.yaml b/fluent-logging/templates/pod-helm-tests.yaml
index 98349f052..36b15230f 100644
--- a/fluent-logging/templates/pod-helm-tests.yaml
+++ b/fluent-logging/templates/pod-helm-tests.yaml
@@ -16,6 +16,7 @@ limitations under the License.
{{- if .Values.manifests.helm_tests }}
{{- $envAll := . }}
+{{- $esUserSecret := .Values.secrets.elasticsearch.user }}
---
apiVersion: v1
kind: Pod
@@ -31,6 +32,16 @@ spec:
command:
- /tmp/helm-tests.sh
env:
+ - name: ELASTICSEARCH_USERNAME
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_USERNAME
+ - name: ELASTICSEARCH_PASSWORD
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_PASSWORD
- name: ELASTICSEARCH_ENDPOINT
value: {{ tuple "elasticsearch" "internal" "client" . | include "helm-toolkit.endpoints.host_and_port_endpoint_uri_lookup" }}
volumeMounts:
diff --git a/fluent-logging/templates/secret-elasticsearch-creds.yaml b/fluent-logging/templates/secret-elasticsearch-creds.yaml
new file mode 100644
index 000000000..0ea91703f
--- /dev/null
+++ b/fluent-logging/templates/secret-elasticsearch-creds.yaml
@@ -0,0 +1,29 @@
+{{/*
+Copyright 2017 The Openstack-Helm Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/}}
+
+{{- if .Values.manifests.secret_elasticsearch }}
+{{- $envAll := . }}
+{{- $secretName := index $envAll.Values.secrets.elasticsearch.user }}
+---
+apiVersion: v1
+kind: Secret
+metadata:
+ name: {{ $secretName }}
+type: Opaque
+data:
+ ELASTICSEARCH_USERNAME: {{ .Values.endpoints.elasticsearch.auth.admin.username | b64enc }}
+ ELASTICSEARCH_PASSWORD: {{ .Values.endpoints.elasticsearch.auth.admin.password | b64enc }}
+{{- end }}
diff --git a/fluent-logging/values.yaml b/fluent-logging/values.yaml
index 459ff5bc8..a2421d958 100644
--- a/fluent-logging/values.yaml
+++ b/fluent-logging/values.yaml
@@ -40,6 +40,10 @@ images:
- dep_check
- image_repo_sync
+secrets:
+ elasticsearch:
+ user: fluentd-elasticsearch-user
+
dependencies:
image_repo_sync:
services:
@@ -122,6 +126,8 @@ conf:
- elasticsearch:
header: match
type: elasticsearch
+ user: "#{ENV['ELASTICSEARCH_USERNAME']}"
+ password: "#{ENV['ELASTICSEARCH_PASSWORD']}"
expression: "**"
include_tag_key: true
host: "#{ENV['ELASTICSEARCH_HOST']}"
@@ -134,12 +140,15 @@ conf:
disable_retry_limit: ""
num_threads: 8
-
endpoints:
cluster_domain_suffix: cluster.local
elasticsearch:
namespace: null
name: elasticsearch
+ auth:
+ admin:
+ username: admin
+ password: changeme
hosts:
data: elasticsearch-data
default: elasticsearch-logging
@@ -153,7 +162,7 @@ endpoints:
default: http
port:
client:
- default: 9200
+ default: 80
discovery:
default: 9300
kafka:
@@ -251,7 +260,6 @@ pod:
limits:
memory: '1024Mi'
cpu: '2000m'
-
mounts:
fluentd:
fluentd:
@@ -267,4 +275,5 @@ manifests:
daemonset_fluentbit: true
job_image_repo_sync: true
helm_tests: true
+ secret_elasticsearch: true
service_fluentd: true
diff --git a/kibana/templates/bin/_kibana.sh.tpl b/kibana/templates/bin/_kibana.sh.tpl
index 6e48ef158..7021ac0dd 100644
--- a/kibana/templates/bin/_kibana.sh.tpl
+++ b/kibana/templates/bin/_kibana.sh.tpl
@@ -19,7 +19,10 @@ set -ex
COMMAND="${@:-start}"
function start () {
- exec kibana --elasticsearch.url="${ELASTICSEARCH_URL}"
+ exec kibana \
+ --elasticsearch.url="$ELASTICSEARCH_URL" \
+ --elasticsearch.username="$ELASTICSEARCH_USERNAME" \
+ --elasticsearch.password="$ELASTICSEARCH_PASSWORD"
}
function stop () {
diff --git a/kibana/templates/deployment.yaml b/kibana/templates/deployment.yaml
index 89178abc1..e17186cc5 100644
--- a/kibana/templates/deployment.yaml
+++ b/kibana/templates/deployment.yaml
@@ -16,6 +16,7 @@ limitations under the License.
{{- if .Values.manifests.deployment }}
{{- $envAll := . }}
+{{- $esUserSecret := .Values.secrets.elasticsearch.user }}
{{- if .Values.images.local_registry.active -}}
{{- $_ := set .Values "pod_dependency" (merge .Values.dependencies.kibana .Values.conditional_dependencies.local_image_registry) -}}
{{- else -}}
@@ -60,6 +61,16 @@ spec:
env:
- name: ELASTICSEARCH_URL
value: {{ tuple "elasticsearch" "default" "client" . | include "helm-toolkit.endpoints.keystone_endpoint_uri_lookup" }}
+ - name: ELASTICSEARCH_USERNAME
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_USERNAME
+ - name: ELASTICSEARCH_PASSWORD
+ valueFrom:
+ secretKeyRef:
+ name: {{ $esUserSecret }}
+ key: ELASTICSEARCH_PASSWORD
volumeMounts:
- name: kibana-bin
mountPath: /tmp/kibana.sh
diff --git a/kibana/templates/secret-elasticsearch-creds.yaml b/kibana/templates/secret-elasticsearch-creds.yaml
new file mode 100644
index 000000000..0ea91703f
--- /dev/null
+++ b/kibana/templates/secret-elasticsearch-creds.yaml
@@ -0,0 +1,29 @@
+{{/*
+Copyright 2017 The Openstack-Helm Authors.
+
+Licensed under the Apache License, Version 2.0 (the "License");
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+*/}}
+
+{{- if .Values.manifests.secret_elasticsearch }}
+{{- $envAll := . }}
+{{- $secretName := index $envAll.Values.secrets.elasticsearch.user }}
+---
+apiVersion: v1
+kind: Secret
+metadata:
+ name: {{ $secretName }}
+type: Opaque
+data:
+ ELASTICSEARCH_USERNAME: {{ .Values.endpoints.elasticsearch.auth.admin.username | b64enc }}
+ ELASTICSEARCH_PASSWORD: {{ .Values.endpoints.elasticsearch.auth.admin.password | b64enc }}
+{{- end }}
diff --git a/kibana/values.yaml b/kibana/values.yaml
index 43e18ae98..7a2febce5 100644
--- a/kibana/values.yaml
+++ b/kibana/values.yaml
@@ -64,6 +64,10 @@ pod:
memory: "1024Mi"
cpu: "2000m"
+secrets:
+ elasticsearch:
+ user: kibana-elasticsearch-user
+
dependencies:
kibana:
services:
@@ -124,6 +128,10 @@ endpoints:
elasticsearch:
name: elasticsearch
namespace: null
+ auth:
+ admin:
+ username: admin
+ password: changeme
hosts:
default: elasticsearch-logging
public: elasticsearch
@@ -135,7 +143,7 @@ endpoints:
default: http
port:
client:
- default: 9200
+ default: 80
kibana:
name: kibana
namespace: null
@@ -168,5 +176,6 @@ manifests:
deployment: true
ingress_kibana: true
job_image_repo_sync: true
+ secret_elasticsearch: true
service: true
service_ingress_kibana: true