Replies: 3 comments 2 replies
-
If the Also you can grab |
Beta Was this translation helpful? Give feedback.
-
I'm having the same issue trying to make talos work with keycloak. I think this is a valid use case for people relying on SSO and centralized user management. Custom Certificate Authorities documentation lacks information about this use-case. When we apply As the kubernetes configurations are also handled by talos, would be nice to also include in that page, how we can have Trusted Roots Certificate in the apiserver to be able to use OIDC. |
Beta Was this translation helpful? Give feedback.
-
@mlbiam I manage to make it work. I don't know why your apiserver pods aren't running, but it's working for me. @smira feel free to add it to the Custom Certificate Authorities documentation. machine:
files:
- path: /var/local/oidc/oidc-ca.crt
op: create
permissions: 0o644
content: |
[REDACTED]
cluster:
apiServer:
extraArgs:
oidc-ca-file: "/var/local/oidc/oidc-ca.crt"
oidc-issuer-url: "https://[REDACTED]/realms/clients"
oidc-client-id: kubernetes
oidc-groups-claim: groups
oidc-groups-prefix: "oidc:"
oidc-username-claim: username
oidc-username-prefix: "oidc:"
extraVolumes:
- hostPath: /var/local/oidc
mountPath: /var/local/oidc
readonly: true Describing kube-apiserver pods, I can see:
|
Beta Was this translation helpful? Give feedback.
-
I'm trying to get a CA cert available for supporting my IdP. I can't seem to get the cert available. I setup the following machine patch:
but the API server won't start and
talosctl logs -k kube-system/kube-apiserver-x
produces no logs.I previously tried adding
but that still got me TLS errors from oidc.
what am I missing?
Beta Was this translation helpful? Give feedback.
All reactions