10.2.2 Creating a Kubernetes Secret for ELK
- Create a Kubernetes secret for Elasticsearch using the API Key or Password:
- If ELK uses an API Key for
authentication:
For example:kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_APIKEY>
The output will look similar to the following:kubectl create secret generic elasticsearch-pw-elastic -n oudsmns --from-literal password=<ELK_APIKEY>
secret/elasticsearch-pw-elastic created
- If ELK uses a password for
authentication:
For example:kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_PASSWORD>
The output will look similar to the following:kubectl create secret generic elasticsearch-pw-elastic -n oudsmns --from-literal password=<ELK_PASSWORD>
secret/elasticsearch-pw-elastic created
Note:
It is recommended that the ELK Stack is created with authentication enabled. If no authentication is enabled you may create a secret using the values above. - If ELK uses an API Key for
authentication:
- Create a Kubernetes secret to access the required images on hub.docker.com:
Note:
You must first have a user account on hub.docker.com
For example:kubectl create secret docker-registry "dockercred" \ --docker-server="https://index.docker.io/v1/" \ --docker-username="<docker_username>" \ --docker-password=<password> \ --docker-email=<docker_email_credentials> \ --namespace=<domain_namespace>
The output will look similar to the following:kubectl create secret docker-registry "dockercred" \ --docker-server="https://index.docker.io/v1/" \ --docker-username="username" \ --docker-password=<password> \ --docker-email=user@example.com \ --namespace=oudsmns
secret/dockercred created