10.2.2 Creating a Kubernetes Secret for ELK

  1. Create a Kubernetes secret for Elasticsearch using the API Key or Password:
    1. If ELK uses an API Key for authentication:
      kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_APIKEY>
      For example:
      kubectl create secret generic elasticsearch-pw-elastic -n oudsmns --from-literal password=<ELK_APIKEY>
      The output will look similar to the following:
      secret/elasticsearch-pw-elastic created
    2. If ELK uses a password for authentication:
      kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_PASSWORD>
      For example:
      kubectl create secret generic elasticsearch-pw-elastic -n oudsmns --from-literal password=<ELK_PASSWORD>
      The output will look similar to the following:
      secret/elasticsearch-pw-elastic created

    Note:

    It is recommended that the ELK Stack is created with authentication enabled. If no authentication is enabled you may create a secret using the values above.
  2. Create a Kubernetes secret to access the required images on hub.docker.com:

    Note:

    You must first have a user account on hub.docker.com
    kubectl create secret docker-registry "dockercred" \
    --docker-server="https://index.docker.io/v1/" \
    --docker-username="<docker_username>" \
    --docker-password=<password> \
    --docker-email=<docker_email_credentials> \
    --namespace=<domain_namespace>
    
    For example:
    kubectl create secret docker-registry "dockercred" \
    --docker-server="https://index.docker.io/v1/" \
    --docker-username="username" \
    --docker-password=<password> \
    --docker-email=user@example.com \
    --namespace=oudsmns
    
    
    The output will look similar to the following:
    secret/dockercred created