Skip to content

Commit 5ee2a7e

Browse files
[bitnami/kibana] Set usePasswordFiles=true by default (#32636)
* [bitnami/kibana] Set `usePasswordFiles=true` by default Signed-off-by: Miguel Ruiz <[email protected]> * Update CHANGELOG.md Signed-off-by: Bitnami Bot <[email protected]> * Update README.md with readme-generator-for-helm Signed-off-by: Bitnami Bot <[email protected]> * Update conditionals Signed-off-by: Miguel Ruiz <[email protected]> * Update CHANGELOG.md Signed-off-by: Bitnami Bot <[email protected]> * Fix indent Signed-off-by: Miguel Ruiz <[email protected]> --------- Signed-off-by: Miguel Ruiz <[email protected]> Signed-off-by: Bitnami Bot <[email protected]> Co-authored-by: Bitnami Bot <[email protected]>
1 parent c9033c6 commit 5ee2a7e

File tree

5 files changed

+65
-4
lines changed

5 files changed

+65
-4
lines changed

bitnami/kibana/CHANGELOG.md

+7-2
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
# Changelog
22

3-
## 11.5.3 (2025-03-25)
3+
## 11.6.0 (2025-04-04)
44

5-
* [bitnami/kibana] Release 11.5.3 ([#32604](https://github.com/bitnami/charts/pull/32604))
5+
* [bitnami/kibana] Set `usePasswordFiles=true` by default ([#32636](https://github.com/bitnami/charts/pull/32636))
6+
7+
## <small>11.5.3 (2025-03-25)</small>
8+
9+
* [bitnami/*] Add tanzuCategory annotation (#32409) ([a8fba5c](https://github.com/bitnami/charts/commit/a8fba5cb01f6f4464ca7f69c50b0fbe97d837a95)), closes [#32409](https://github.com/bitnami/charts/issues/32409)
10+
* [bitnami/kibana] Release 11.5.3 (#32604) ([2bc41c9](https://github.com/bitnami/charts/commit/2bc41c9aa9ff2014a0c89cd626e0039a0108b29d)), closes [#32604](https://github.com/bitnami/charts/issues/32604)
611

712
## <small>11.5.2 (2025-03-04)</small>
813

bitnami/kibana/Chart.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,4 +33,4 @@ maintainers:
3333
name: kibana
3434
sources:
3535
- https://github.com/bitnami/charts/tree/main/bitnami/kibana
36-
version: 11.5.3
36+
version: 11.6.0

bitnami/kibana/README.md

+1
Original file line numberDiff line numberDiff line change
@@ -283,6 +283,7 @@ You can enable this initContainer by setting `volumePermissions.enabled` to `tru
283283
| `commonLabels` | Labels to add to all deployed objects | `{}` |
284284
| `extraDeploy` | A list of extra kubernetes resources to be deployed | `[]` |
285285
| `clusterDomain` | Kubernetes cluster domain name | `cluster.local` |
286+
| `usePasswordFiles` | Mount credentials as files instead of using environment variables | `true` |
286287
| `diagnosticMode.enabled` | Enable diagnostic mode (all probes will be disabled and the command will be overridden) | `false` |
287288
| `diagnosticMode.command` | Command to override all containers in the the deployment(s)/statefulset(s) | `["sleep"]` |
288289
| `diagnosticMode.args` | Args to override all containers in the the deployment(s)/statefulset(s) | `["infinity"]` |

bitnami/kibana/templates/deployment.yaml

+52
Original file line numberDiff line numberDiff line change
@@ -166,32 +166,52 @@ spec:
166166
value: "true"
167167
{{- end }}
168168
{{- if and .Values.tls.enabled .Values.tls.usePemCerts (or .Values.tls.keyPassword .Values.tls.passwordsSecret) }}
169+
{{- if .Values.usePasswordFiles }}
170+
- name: KIBANA_SERVER_KEY_PASSWORD_FILE
171+
value: "/opt/bitnami/kibana/secrets/kibana-key-password"
172+
{{- else }}
169173
- name: KIBANA_SERVER_KEY_PASSWORD
170174
valueFrom:
171175
secretKeyRef:
172176
name: {{ include "kibana.tls.secretName" . }}
173177
key: kibana-key-password
174178
{{- end }}
179+
{{- end }}
175180
{{- if and .Values.tls.enabled (not .Values.tls.usePemCerts) (or .Values.tls.keystorePassword .Values.tls.passwordsSecret) }}
181+
{{- if .Values.usePasswordFiles }}
182+
- name: KIBANA_SERVER_KEYSTORE_PASSWORD_FILE
183+
value: "/opt/bitnami/kibana/secrets/kibana-keystore-password"
184+
{{- else }}
176185
- name: KIBANA_SERVER_KEYSTORE_PASSWORD
177186
valueFrom:
178187
secretKeyRef:
179188
name: {{ include "kibana.tls.secretName" . }}
180189
key: kibana-keystore-password
181190
{{- end }}
191+
{{- end }}
182192
{{- if .Values.elasticsearch.security.auth.enabled }}
193+
{{- if .Values.usePasswordFiles }}
194+
- name: KIBANA_PASSWORD_FILE
195+
value: "/opt/bitnami/kibana/secrets/kibana-password"
196+
{{- else }}
183197
- name: KIBANA_PASSWORD
184198
valueFrom:
185199
secretKeyRef:
186200
name: {{ include "kibana.elasticsearch.auth.secretName" . }}
187201
key: kibana-password
188202
{{- end }}
203+
{{- end }}
189204
{{- if and .Values.elasticsearch.security.auth.enabled .Values.elasticsearch.security.auth.createSystemUser }}
205+
{{- if .Values.usePasswordFiles }}
206+
- name: KIBANA_ELASTICSEARCH_PASSWORD_FILE
207+
value: "/opt/bitnami/kibana/secrets/elasticsearch-password"
208+
{{- else }}
190209
- name: KIBANA_ELASTICSEARCH_PASSWORD
191210
valueFrom:
192211
secretKeyRef:
193212
name: {{ tpl .Values.elasticsearch.security.auth.elasticsearchPasswordSecret . }}
194213
key: elasticsearch-password
214+
{{- end }}
195215
- name: KIBANA_CREATE_USER
196216
value: "true"
197217
{{- end }}
@@ -202,12 +222,17 @@ spec:
202222
- name: KIBANA_ELASTICSEARCH_TLS_VERIFICATION_MODE
203223
value: {{ .Values.elasticsearch.security.tls.verificationMode | quote }}
204224
{{- if and .Values.elasticsearch.security.tls.enabled (not .Values.elasticsearch.security.tls.usePemCerts) (or .Values.elasticsearch.security.tls.truststorePassword .Values.elasticsearch.security.tls.passwordsSecret) }}
225+
{{- if .Values.usePasswordFiles }}
226+
- name: KIBANA_ELASTICSEARCH_TRUSTSTORE_PASSWORD_FILE
227+
value: "/opt/bitnami/kibana/secrets/elasticsearch-truststore-password"
228+
{{- else }}
205229
- name: KIBANA_ELASTICSEARCH_TRUSTSTORE_PASSWORD
206230
valueFrom:
207231
secretKeyRef:
208232
name: {{ include "kibana.elasticsearch.tls.secretName" . }}
209233
key: elasticsearch-truststore-password
210234
{{- end }}
235+
{{- end }}
211236
{{- if .Values.extraEnvVars }}
212237
{{- include "common.tplvalues.render" (dict "value" .Values.extraEnvVars "context" $) | nindent 12 }}
213238
{{- end }}
@@ -274,6 +299,10 @@ spec:
274299
mountPath: /bitnami/kibana
275300
- name: kibana-config
276301
mountPath: /bitnami/kibana/conf
302+
{{- if and .Values.usePasswordFiles (or .Values.elasticsearch.security.auth.enabled (and .Values.tls.enabled (or .Values.tls.passwordsSecret (ternary .Values.tls.keyPassword .Values.tls.keystorePassword .Values.tls.usePemCerts)))) }}
303+
- name: kibana-secrets
304+
mountPath: /opt/bitnami/kibana/secrets
305+
{{- end }}
277306
{{- if .Values.tls.enabled }}
278307
- name: kibana-certificates
279308
mountPath: /opt/bitnami/kibana/config/certs/server
@@ -313,6 +342,29 @@ spec:
313342
volumes:
314343
- name: empty-dir
315344
emptyDir: {}
345+
{{- if and .Values.usePasswordFiles (or .Values.elasticsearch.security.auth.enabled
346+
(and .Values.elasticsearch.security.tls.enabled (not .Values.elasticsearch.security.tls.usePemCerts) (or .Values.elasticsearch.security.tls.truststorePassword .Values.elasticsearch.security.tls.passwordsSecret))
347+
(and .Values.tls.enabled (or .Values.tls.passwordsSecret (ternary .Values.tls.keyPassword .Values.tls.keystorePassword .Values.tls.usePemCerts)))) }}
348+
- name: kibana-secrets
349+
projected:
350+
sources:
351+
{{- if and .Values.tls.enabled (or .Values.tls.passwordsSecret (ternary .Values.tls.keyPassword .Values.tls.keystorePassword .Values.tls.usePemCerts)) }}
352+
- secret:
353+
name: {{ include "kibana.tls.secretName" . }}
354+
{{- end }}
355+
{{- if .Values.elasticsearch.security.auth.enabled }}
356+
- secret:
357+
name: {{ include "kibana.elasticsearch.auth.secretName" . }}
358+
{{- end }}
359+
{{- if and .Values.elasticsearch.security.auth.enabled .Values.elasticsearch.security.auth.createSystemUser }}
360+
- secret:
361+
name: {{ tpl .Values.elasticsearch.security.auth.elasticsearchPasswordSecret . }}
362+
{{- end }}
363+
{{- if and .Values.elasticsearch.security.tls.enabled (not .Values.elasticsearch.security.tls.usePemCerts) (or .Values.elasticsearch.security.tls.truststorePassword .Values.elasticsearch.security.tls.passwordsSecret) }}
364+
- secret:
365+
name: {{ include "kibana.elasticsearch.tls.secretName" . }}
366+
{{- end }}
367+
{{- end }}
316368
- name: kibana-data
317369
{{- if .Values.persistence.enabled }}
318370
persistentVolumeClaim:

bitnami/kibana/values.yaml

+4-1
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,9 @@ extraDeploy: []
5757
## @param clusterDomain Kubernetes cluster domain name
5858
##
5959
clusterDomain: cluster.local
60+
## @param usePasswordFiles Mount credentials as files instead of using environment variables
61+
##
62+
usePasswordFiles: true
6063
## Enable diagnostic mode in the deployment(s)/statefulset(s)
6164
##
6265
diagnosticMode:
@@ -510,7 +513,7 @@ ingress:
510513
## path: /
511514
##
512515
extraHosts: []
513-
## @param ingress.extraPaths Additional arbitrary path/backend objects. Evaluated as a template.
516+
## @param ingress.extraPaths Additional arbitrary path/backend objects. Evaluated as a template.
514517
## For example: The ALB ingress controller requires a special rule for handling SSL redirection.
515518
## extraPaths:
516519
## - path: /*

0 commit comments

Comments
 (0)