10.2.2 Creating a Kubernetes Secret for ELK

  1. Create a Kubernetes secret for Elasticsearch using the API Key or Password:
    1. If ELK uses an API Key for authentication:
      kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_APIKEY>
      For example:
      kubectl create secret generic elasticsearch-pw-elastic -n oudns --from-literal password=<ELK_APIKEY>
      The output will look similar to the following:
      secret/elasticsearch-pw-elastic created
    2. If ELK uses a password for authentication:
      kubectl create secret generic elasticsearch-pw-elastic -n <domain_namespace> --from-literal password=<ELK_PASSWORD>
      For example:
      kubectl create secret generic elasticsearch-pw-elastic -n oudns --from-literal password=<ELK_PASSWORD>
      The output will look similar to the following:
      secret/elasticsearch-pw-elastic created

    Note:

    It is recommended that the ELK Stack is created with authentication enabled. If no authentication is enabled you may create a secret using the values above.
  2. Check that the dockercred secret that was created previously in Create a Kubernetes Secret for Cronjob Images exists:
    kubectl get secret -n <domain_namespace> | grep dockercred
    For example:
    kubectl get secret -n oudns | grep dockercred
    The output will look similar to the following:
    dockercred                        kubernetes.io/dockerconfigjson        1      149m
    If the secret does not exist, create it as per Create a Kubernetes Secret for Cronjob Images.