13.2.2 Creating a Kubernetes Secret for ELK

  1. Create a Kubernetes secret for Elasticsearch using the API Key or Password:
    1. If ELK uses an API Key for authentication:
      kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_APIKEY>
                           
      For example:
      kubectl create secret generic elasticsearch-pw-elastic -n oigns --from-literal password=<ELK_APIKEY>
                           
      The output will look similar to the following:
      secret/elasticsearch-pw-elastic created
    2. If ELK uses a password for authentication:
      kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_PASSWORD>
                           
      For example:
      kubectl create secret generic elasticsearch-pw-elastic -n oigns --from-literal password=<ELK_PASSWORD>
                           
      The output will look similar to the following:
      secret/elasticsearch-pw-elastic created

    Note:

    It is recommended that the ELK Stack is created with authentication enabled. If no authentication is enabled you may create a secret using the values above.
  2. Create a Kubernetes secret to access the required images on hub.docker.com:

    Note:

    Before executing the command below, you must first have a user account on hub.docker.com.
    kubectl create secret docker-registry "dockercred" --docker-server="https://index.docker.io/v1/" \
    --docker-username="<DOCKER_USER_NAME>" \
    --docker-password=<DOCKER_PASSWORD> --docker-email=<DOCKER_EMAIL_ID> \
    --namespace=<domain_namespace>
    For example:
    kubectl create secret docker-registry "dockercred" --docker-server="https://index.docker.io/v1/" \
    --docker-username="user@example.com" \
    --docker-password=password --docker-email=user@example.com \
    --namespace=oigns
    
    The output will look similar to the following:
    secret/dockercred created