Code Monkey home page Code Monkey logo

openunison / openunison-k8s-login-github Goto Github PK

View Code? Open in Web Editor NEW
8.0 3.0 3.0 1.92 MB

Kubernetes login portal for both kubectl and the dashboard using GitHub. Use organizations and teams in RBAC policies to control access to your cluster. Supports impersonation and OpenID Connect integration with your API server.

Home Page: https://www.tremolosecurity.com/kubernetes/

License: Apache License 2.0

Shell 0.48% Java 9.50% JavaScript 23.43% Python 0.30% CSS 4.08% HTML 0.31% Less 31.20% SCSS 30.69%
kubernetes orchestra orchestra-login-portal kubernetes-dashboard github kubernetes-rbac

openunison-k8s-login-github's Introduction

Orchestra Login Portal for GitHub

⚠️

Please go to https://openunison.github.io/ to integrate your cluster with OpenUnison. This repo is no longer supported and will no longer get updated builds

⚠️

Alt text

Short video of logging into Kubernetes and using kubectl using GitHub

Orchestra Login Portal provides a login portal for Kubernetes that allows you to authenticate with GitHub, use GitHub teams and organizations for RBAC authorizations and provides integration for both kubectl and the Kubernetes Dashboard (https://github.com/kubernetes/dashboard). The portal runs inside of Kubernetes, leveraging Kubernetes for scalability, secret management and deployment.

Orchestra Login Portal Architecture

When a user accesses Kubernetes using Orchestra, they'll access both the login portal and the dashboard through OpenUnison (instead of directly via an ingress). OpenUnison will inject the user's identity into each request, allowing the dashboard to act on their behalf. The login portal has no external dependencies outside of GitHub and Kubernetes. All objects for session state are stored as CRDs.

Deployment

Watch a Video

This 7 minute video shows the entire deployment and user onboarding process

Alt text

What You Need To Start

Prior to deploying Orchestra you will need:

  1. Kubernetes 1.10 or higher
  2. The Nginx Ingress Controller deployed (https://kubernetes.github.io/ingress-nginx/deploy/)
  3. Client id and secret from a GitHub OAuth2 Application
  4. Deploy the dashboard to your cluster
  5. helm 3.0+

When creating your GitHub OAuth2 application, the callback URL is https://host_name/auth/github where host_name is the host you want to use for your login portal.

The deployment is a four step process:

  1. Add Tremolo Security's Helm repo to your own
  2. Deploy the OpenUnison Operator
  3. Create a secret for your Active Directory password
  4. Deploy OpenUnison

Add Tremolo Security's Helm Repo

helm repo add tremolo https://nexus.tremolo.io/repository/helm/
helm repo update

Deploy The OpenUnison Operator

Create your namespace

kubectl create ns openunison

Deploy the operator

helm install openunison tremolo/openunison-operator --namespace openunison

Wait for the operator pod to be available

watch kubectl get pods -n openunison

Create A Secret For Your Active Directory Password

Create a secret in the openunison namespace:

apiVersion: v1
type: Opaque
metadata:
  name: orchestra-secrets-source
  namespace: openunison
data:
  GITHUB_SECRET_ID: aW0gYSBzZWNyZXQ=
  K8S_DB_SECRET: aW0gYSBzZWNyZXQ=
  unisonKeystorePassword: aW0gYSBzZWNyZXQ=
kind: Secret
Property Description
GITHUB_SECRET_ID The secret from your GitHub OAuth2 application
unisonKeystorePassword The password for OpenUnison's keystore, should NOT contain an ampersand (&)
K8S_DB_SECRET A random string of characters used to secure the SSO process with the dashboard. This should be long and random, with no ampersands (&)

Deploy OpenUnison

Copy values.yaml (https://raw.githubusercontent.com/OpenUnison/helm-charts/master/openunison-k8s-login-github/values.yaml) and update as appropriate:

Property Description
network.openunison_host The host name for OpenUnison. This is what user's will put into their browser to login to Kubernetes
network.dashboard_host The host name for the dashboard. This is what users will put into the browser to access to the dashboard. NOTE: network.openunison_host and network.dashboard_host Both network.openunison_host and network.dashboard_host MUST point to OpenUnison
network.api_server_host The host name to use for the api server reverse proxy. This is what kubectl will interact with to access your cluster. NOTE: network.openunison_host and network.dashboard_host
network.k8s_url The URL for the Kubernetes API server
network.session_inactivity_timeout_seconds The number of seconds of inactivity before the session is terminated, also the length of the refresh token's session
network.createIngressCertificate If true (default), the operator will create a self signed Ingress certificate. Set to false if using an existing certificate or LetsEncrypt
network.force_redirect_to_tls If true, all traffic that reaches OpenUnison over http will be redirected to https. Defaults to true. Set to false when using an external TLS termination point, such as an istio sidecar proxy
network.ingress_type The type of Ingress object to create. nginx and istio is supported
network.ingress_annotations Annotations to add to the Ingress object
network.ingress_certificate The certificate that the Ingress object should reference
network.istio.selectors Labels that the istio Gateway object will be applied to. Default is istio: ingressgateway
cert_template.ou The OU attribute for the forward facing certificate
cert_template.o The O attribute for the forward facing certificate
cert_template.l The L attribute for the forward facing certificate
cert_template.st The ST attribute for the forward facing certificate
cert_template.c The C attribute for the forward facing certificate
certs.use_k8s_cm Tells the deployment system if you should use k8s' built in certificate manager. If your distribution doesn't support this (such as Canonical and Rancher), set this to false
myvd_config_path The path to the MyVD configuration file, unless being customized, use WEB-INF/myvd.conf
dashboard.namespace The namespace for the dashboard. For the 1.x dashboard this is kube-system, for the 2.x dashboard this is kubernetes-dashboard
dashboard.cert_name The name of the secret in the dashboard's namespace that stores the certificate for the dashboard
dashboard.label The label of the dashboard pod, this is used to delete the pod once new certificates are generated
dashboard.service_name The name of the service object for the dashboard
k8s_cluster_name The name of the cluster to use in the ./kube-config. Defaults to kubernetes
image The name of the image to use
enable_impersonation If true, OpenUnison will run in impersonation mode. Instead of OpenUnison being integrated with Kubernetes via OIDC, OpenUnison will be a reverse proxy and impersonate users. This is useful with cloud deployments where oidc is not an option
monitoring.prometheus_service_account The prometheus service account to authorize access to the /monitoring endpoint
github.client_id The client id from your OAuth2 application configuration
github.teams A comma separated list of authorized teams and organizations. An organization is listed in the format OrgName/ and a team in the formate OrgName/TeamName
network_policies.enabled If true, creates a deny-all network policy and additional policies based on below configurations
network_policies.ingress.enabled if true, a policy will be created that allows access from the Namespace identified by the labels
network_policies.ingress.labels Labels for the Namespace hosting the Ingress
network_policies.monitoring.enabled if true, a policy will be created that allows access from the Namespace identified by the labels to support monitoring
network_policies.monitoring.labels Labels for the Namespace hosting monitoring
network_policies.apiserver.enabled if true, a policy will be created that allows access from the kube-ns Namespace identified by the labels
network_policies.apiserver.labels Labels for the Namespace hosting the api server
services.enable_tokenrequest If true, the OpenUnison Deployment will use the TokenRequest API instead of static ServiceAccount tokens. *** NOT AVAILABLE UNTIL OPENUNISON 1.0.21 ***
services.token_request_audience The audience expected by the API server *** NOT AVAILABLE UNTIL OPENUNISON 1.0.21 ***
services.token_request_expiration_seconds The number of seconds TokenRequest tokens should be valid for, minimum 600 seconds *** NOT AVAILABLE UNTIL OPENUNISON 1.0.21 ***
services.node_selectors annotations to use when choosing nodes to run OpenUnison, maps to the Deployment nodeSelector
services.pullSecret The name of the Secret that stores the pull secret for pulling the OpenUnison image
services.resources.requests.memory Memory requested by OpenUnison
services.resources.requests.cpu CPU requested by OpenUnison
services.resources.limits.memory Maximum memory allocated to OpenUnison
services.resources.limits.cpu Maximum CPU allocated to OpenUnison
openunison.replicas The number of OpenUnison replicas to run, defaults to 1
openunison.non_secret_data Add additional non-secret configuration options, added to the non_secret_data secrtion of the OpenUnison object
openunison.secrets Add additional keys from the orchestra-secrets-source Secret
impersonation.use_jetstack if true, the operator will deploy an instance of JetStack's OIDC Proxy (https://github.com/jetstack/kube-oidc-proxy). Default is false
impersonation.jetstack_oidc_proxy_image The name of the image to use
impersonation.explicit_certificate_trust If true, oidc-proxy will explicitly trust the tls.crt key of the Secret named in impersonation.ca_secret_name. Defaults to true
impersonation.ca_secret_name If impersonation.explicit_certificate_trust is true, the name of the tls Secret that stores the certificate for OpenUnison that the oidc proxy needs to trust. Defaults to ou-tls-secret
impersonation.resources.requests.memory Memory requested by oidc proxy
impersonation.resources.requests.cpu CPU requested by oidc proxy
impersonation.resources.limits.memory Maximum memory allocated to oidc proxy
impersonation.resources.limits.cpu Maximum CPU allocated to oidc proxy

Additionally, you can add your identity provider's TLS base64 encoded PEM certificate to your values under trusted_certs for pem_b64. This will allow OpenUnison to talk to your identity provider using TLS if it doesn't use a commercially signed certificate. If you don't need a certificate to talk to your identity provider, replace the trusted_certs section with trusted_certs: [].

Finally, run the helm chart:

helm install orchestra tremolo/openunison-k8s-login-github --namespace openunison -f /path/to/values.yaml

Complete SSO Integration with Kubernetes

Run kubectl describe configmap api-server-config -n openunison to get the SSO integration artifacts. The output will give you both the API server flags that need to be configured on your API servers. The certificate that needs to be trusted is in the ou-tls-certificate secret in the openunison namespace.

First Login

To login, open your browser and go to the host you specified for OU_HOST in your input.props. For instance if OU_HOST is k8sou.tremolo.lan then navigate to https://k8sou.tremolo.lan. You'll be prompted for your github username and password. Once authenticated you'll be able login to the portal and generate your .kube/config from the Tokens screen.

CLI Login

You can bypass manually launching a browser with the oulogin kubectl plugin - https://github.com/TremoloSecurity/kubectl-login. This plugin will launch a browser for you, authenticate you then configure your kubectl configuration without any pre-configuration on your clients.

Enabling JetStack OIDC Proxy for Impersonation

OpenUnison's built in reverse proxy doesn't support the SPDY protocol which kubectl, and the client-go sdk, uses for exec, cp, and port-forward. If you require these options, and are using impersonation, you can now enable the JetStack OIDC proxy (https://github.com/jetstack/kube-oidc-proxy) instead of using OpenUnison's built in reverse proxy. To enable it, add the impersonation options from the helm chart configuration to your chart. NOTE when using the oidc-proxy services.enable_tokenrequest must be false. The Deployment created for the oidc proxy will inherrit the ServiceAccount from OpenUnison, as well as the services.pullSecret and services.node_selectors configuration in your helm chart. Resource requests and limits should be set specifically for the OIDC proxy under the impersonation section. The proxy is run as a non-privileged unix user as well. An example configuration when deploying with Let's Encrypt:

impersonation:
  use_jetstack: true
  jetstack_oidc_proxy_image: quay.io/jetstack/kube-oidc-proxy:v0.3.0
  explicit_certificate_trust: false

Authorizing Access via RBAC

On first login, if you haven't authorized access to any Kubernetes roles you won't be able to do anything. There are two approaches you can take:

Organization / Team Driven Membership

Kubernetes will see your user's organizations and teams as groups. To authorize users based on these groups, list them in your RBAC policies as groups with organizations being in the format OrgName/ and teams being the format OrgName/TeamName. To authorize members of team TremnoloSecurity/Ownsers to be cluster administrators, we create a ClusterRoleBinding:

kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: github-cluster-admins
subjects:
- kind: Group
  name: TremoloSecurity/Owners
roleRef:
  kind: ClusterRole
  name: cluster-admin
  apiGroup: rbac.authorization.k8s.io

User Driven Membership

If you are not able to use teams or organizations in GitHub, you can directly add users to role bindings. Kubernetes requires that you identify openid connect users with the prefix of the url of the identity provider. So if your OU_HOST is k8sou.tremolo.lan and your user's login is mmosley your username to Kubernetes would be https://k8sou.tremolo.lan/auth/idp/k8sIdp#mmosley. To create a cluster role binding to give cluster-admin access to a specific user:

kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
  name: github-cluster-admins
subjects:
- kind: User
  name: https://k8sou.tremolo.lan/auth/idp/k8sIdp#mmosley
roleRef:
  kind: ClusterRole
  name: cluster-admin
  apiGroup: rbac.authorization.k8s.io

NOTE: There are multiple reasons this is a bad idea:

  1. Hard to audit - There is no easy way to say "what role bindings is mmosley a member of?
  2. Difficult to remove access - Same reason as #1, you need to figure out every role binding a user is a member of to remove
  3. Easy to get wrong - If you mistype a user's login id Kubernetes won't tell you

If you can't use github orgnization and teams, take a look at the OpenUnison Identity Manager for Kubernetes - https://github.com/TremoloSecurity/openunison-qs-kubernetes/tree/activedirectory. This tool adds on to the login capabilities with the ability to manage access to the cluster and namespaces, along with providing a self service way for users to request new namespaces and manage access.

Adding Applications and Clusters for Authentication

OpenUnison can support more applications for SSO then just Kubernetes and the dashboard. You can add other clusters and applications that support OpenID Connect by adding some custom resources to your openunison namespace.

Add a Trust

The Trust tells your OpenID Connect enabled application it can trust authentication requests from your OpenUnison. To start you'll need:

  1. Callback URL - This URL is where OpenUnison redirects the user after authenticating.
  2. Client Secret - Web applications, like GitLab, will need a secret that is shared between the two systems. Applications with CLI components, like ArgoCD, don't need a client secret.
  3. Client ID - This is how you identify your application to OpenUnison.

OpenUnison will provide the following claims for your application to consume:

Claim Description
sub Unique identifier as supplied from authentication
name Combination of first name and last name
preferred_username A username supplied from authentication
email The user's email address
groups The list of groups provided by the authentication source

Once you have everything you need to get started, create the Trust object.

Create a Secret

If you're application is using a client secret, a Secret needs to be created to hold it. This can either be a new Secret or it can be a new one. Which ever Secret you add it to, keep a note of the name of the Secret and the key in the data section used to store it.

If your application doesn't have a client secret, skip this step.

Create the Trust

Create a Trust object in the openunison namespace. Here's one for GitLab you can use as an example:

apiVersion: openunison.tremolo.io/v1
kind: Trust
metadata:
  name: gitlab
  namespace: openunison
spec:
  accessTokenSkewMillis: 120000
  accessTokenTimeToLive: 60000
  authChainName: LoginService
  clientId: gitlab
  clientSecret:
    keyName: gitlab
    secretName: orchestra-secrets-source
  codeLastMileKeyName: lastmile-oidc
  codeTokenSkewMilis: 60000
  publicEndpoint: false
  redirectURI:
  - https://gitlab.local.tremolo.dev/users/auth/openid_connect/callback
  signedUserInfo: false
  verifyRedirect: true

Here are the details for each option:

Option Desription
accessTokenSkewMillis Milliseconds milliseconds added to account for clock skew
accessTokenTimeToLive Time an access token should live in milliseconds
authChainName The authentication chain to use for login, do not change
clientId The client id shared by your application
clientSecret.scretName If using a client secret, the name of the Secret storing the client secret
clientSecret.keyName The key in the data section of the Secret storing the client secret
codeLastMileKeyName The name of the key used to encrypt the code token, do not change
codeTokenSkewMilis Milliseconds to add to code token lifetime to account for clock skew
publicEndpoint If true, a client secret is required. If false, no client secret is needed
redirectURI List of URLs that are authorized for callback. If a URL is provided by your application that isn't in this list SSO will fail
signedUserInfo if true, the userinfo endpoint will return a signed JSON Web Token. If false it will return plain JSON
verifyRedirect If true, the redirect URL provided by the client MUST be listed in the redirectURI section. Should ALLWAYS be true if not in a development environment

Once the Trust is added to the namespace, OpenUnison will pick it up automatically. You can test by trying to login to your application.

Add a "Badge" to Your Portal

When you login to the Orchestra portal, there are badges for your tokens and for the dashboard. You can dynamically add a badge for your application too. Here's an example PortalUrl object for ArgoCD:

apiVersion: openunison.tremolo.io/v1
kind: PortalUrl
metadata:
  name: argocs
  namespace: openunison
spec:
  label: ArgoCD
  org: B158BD40-0C1B-11E3-8FFD-0800200C9A66
  url: https://ArgoCD.apps.192-168-2-140.nip.io
  icon: iVBORw0KGgoAAAANSUhEUgAAANIAAADwCAYAAAB1/Tp/AAAfQ3pUWHRSYXcgcHJvZ...
  azRules:
  - constraint: o=Tremolo
    scope: dn
Option Descriptoin
label The label shown on badge in the portal
org If using orgnaizations to organize badges, the uuid of the org. If not using organizations, leave as is
url The URL the badge should send the user to
icon A base64 encoded icon with a width of 210 pixels and a height of 240 pixels
azRules Who is authorized to see this badge? See https://portal.apps.tremolo.io/docs/tremolosecurity-docs/1.0.19/openunison/openunison-manual.html#_applications_applications for an explination of the authorization rules

Once created, the badge will appear in the Orchestra portal! No need to restart the containers.

Organizing Badges

If you're adding multiple badges or clusters, you may find that the number of badges on your front page become difficult to manage. In that case you can enable orgnaizations in OpenUnison and organize your badges using an orgnaization tree.

Enable Organizations on your Portal Page

Edit the orchestra object in the openunison namespace (kubectl edit openunison orchestra -n openunison). Look for the non_secret_data section and add the following:

- name: SHOW_PORTAL_ORGS
  value: "true"

Once you save, OpenUnison will restart and when you login there will now be a tree that describes your organizations.

Orchestra with Organizations

Creating Organizations

Add an Org object to the openunison namespace. Here's an example Org:

apiVersion: openunison.tremolo.io/v1
kind: Org
metadata:
  name: cluster2
  namespace: openunison
spec:
  description: "My second cluster"
  uuid: 04901973-5f4c-46d9-9e22-55e88e168776
  parent: B158BD40-0C1B-11E3-8FFD-0800200C9A66
  showInPortal: true
  showInRequestAccess: false
  showInReports: false
  azRules:
  - scope: dn
    constraint: o=Tremolo
Option Description
description What appears in the blue box describing the organization
uuid A unique ID, recommend using Type 4 UUIDs
parent The unique id of the parent. B158BD40-0C1B-11E3-8FFD-0800200C9A66 is the root organization
showInPortal Should be true
showInRequestAccess N/A
showInReports N/A
azRules Who is authorized to see this badge? See https://portal.apps.tremolo.io/docs/tremolosecurity-docs/1.0.19/openunison/openunison-manual.html#_applications_applications for an explination of the authorization rules

Once added, the new organizations will be loaded dynamiclly by OpenUnison. Change the org in your PortalUrl object to match the uuid of the Org you want it to appear in.

Using Your Own Certificates

If you want to integrate your own certificates see our wiki entry - https://github.com/TremoloSecurity/OpenUnison/wiki/troubleshooting#how-do-i-change-openunisons-certificates

Monitoring OpenUnison

This deployment comes with a /metrics endpoint for monitoring. For details on how to integrate it into a Prometheus stack - https://github.com/TremoloSecurity/OpenUnison/wiki/troubleshooting#how-do-i-monitor-openunison-with-prometheus.

Trouble Shooting Help

Please take a look at https://github.com/TremoloSecurity/OpenUnison/wiki/troubleshooting if you're running into issues. If there isn't an entry there that takes care of your issue, please open an issue on this repo.

Whats next?

Now you can begin mapping OpenUnison's capabilities to your business and compliance needs. For instance you can add multi-factor authentication with TOTP or U2F, Create privileged workflows for onboarding, scheduled workflows that will deprovision users, etc.

Customizing Orchestra

To customize Orchestra - https://github.com/TremoloSecurity/OpenUnison/wiki/troubleshooting#customizing-orchestra

Examples

Using GitHub To Login to Kubernetes - https://www.tremolosecurity.com/post/using-github-to-access-kubernetes

openunison-k8s-login-github's People

Contributors

mlbiam avatar sharmavijay86 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

openunison-k8s-login-github's Issues

possibility for dynamic link for id token and refesh token.

Hello Marc,
Just checking th possibility if we can get id token and refresh token on the fly as from url.
So far my testing.
I am doing login and for every time while login i have to copy kubeconfig context file from login portal and then to run it and use it.
I am checking the possibility of having id token and refresh token url use in kubeconfig file instead of hard mention in file.
Benefit i am looking is this-
User on first login gets kubeconfig copied from portal and then use it.
Once the user logged out and login back both the refresh token and id token config file gets from referenced url.
In sort it will help me, in not to overwrite config file everytime i am doing login and log out, if i am working on multiple cluster contexts at the same time.

how to use github enterprise

Hello Marc
Just exploring the use of enterprise github. It needs a seperate gitup url and github api url definition to make it working.
Any idea on this ?

AKS k8s giving authorization error ERROR K8sWatcher - Could not get authentication token

I am configuring openunison-k8s-login-github with aks cluster.
error which i am getting is after github auth it gives

Not Authorized
You are not authorized for failed authentication. If you feel you received this message in error, please contact your system administrator or help desk.

logs shows --

[2021-04-20 04:44:10,461][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo -
         [127.0.0.1] - [f173d7ea04088bb727f70089ead2064aa549784ff]
[2021-04-20 04:44:11,546][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [fffbc01d38681028c78aa4ded8de22c36e6255bf4]
[2021-04-20 04:44:20,472][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo -
         [127.0.0.1] - [f9bd32b7868b1a1cb2233cba9093d66d9a8577e9a]
[2021-04-20 04:44:21,545][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [fba23bb85afb34a4f463381000deba902547ba7a1]
[2021-04-20 04:44:30,461][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo -
         [127.0.0.1] - [ffa59609315ef90944e6b99e76acfebeb040db16f]
[2021-04-20 04:44:31,548][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [f752edc680f8a8c20fcc02c97e0088f0b636925e6]
[2021-04-20 04:44:36,582][Thread-9] ERROR K8sWatcher - Could not get authentication token
javax.net.ssl.SSLException: Connection reset
        at sun.security.ssl.Alert.createSSLException(Alert.java:127) ~[?:?]
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:349) ~[?:?]
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:292) ~[?:?]
        at sun.security.ssl.TransportContext.fatal(TransportContext.java:287) ~[?:?]
        at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1581) ~[?:?]
        at sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:979) ~[?:?]
        at org.apache.http.impl.io.SessionInputBufferImpl.streamRead(SessionInputBufferImpl.java:137) ~[httpcore-4.4.14.jar:4.4.14]
        at org.apache.http.impl.io.SessionInputBufferImpl.fillBuffer(SessionInputBufferImpl.java:153) ~[httpcore-4.4.14.jar:4.4.14]
        at org.apache.http.impl.io.SessionInputBufferImpl.readLine(SessionInputBufferImpl.java:280) ~[httpcore-4.4.14.jar:4.4.14]
        at org.apache.http.impl.io.ChunkedInputStream.getChunkSize(ChunkedInputStream.java:261) ~[httpcore-4.4.14.jar:4.4.14]
        at org.apache.http.impl.io.ChunkedInputStream.nextChunk(ChunkedInputStream.java:222) ~[httpcore-4.4.14.jar:4.4.14]
        at org.apache.http.impl.io.ChunkedInputStream.read(ChunkedInputStream.java:183) ~[httpcore-4.4.14.jar:4.4.14]
        at org.apache.http.conn.EofSensorInputStream.read(EofSensorInputStream.java:135) ~[httpclient-4.5.9.jar:4.5.9]
        at sun.nio.cs.StreamDecoder.readBytes(StreamDecoder.java:284) ~[?:?]
        at sun.nio.cs.StreamDecoder.implRead(StreamDecoder.java:326) ~[?:?]
        at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:178) ~[?:?]
        at java.io.InputStreamReader.read(InputStreamReader.java:181) ~[?:?]
        at java.io.BufferedReader.fill(BufferedReader.java:161) ~[?:?]
        at java.io.BufferedReader.readLine(BufferedReader.java:326) ~[?:?]
        at java.io.BufferedReader.readLine(BufferedReader.java:392) ~[?:?]
        at com.tremolosecurity.k8s.watch.K8sWatcher.run(K8sWatcher.java:205) [unison-applications-k8s-1.0.22.jar:?]
        at java.lang.Thread.run(Thread.java:834) [?:?]
        Suppressed: java.net.SocketException: Broken pipe (Write failed)
                at java.net.SocketOutputStream.socketWrite0(Native Method) ~[?:?]
                at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:110) ~[?:?]
                at java.net.SocketOutputStream.write(SocketOutputStream.java:150) ~[?:?]
                at sun.security.ssl.SSLSocketOutputRecord.encodeAlert(SSLSocketOutputRecord.java:81) ~[?:?]
                at sun.security.ssl.TransportContext.fatal(TransportContext.java:380) ~[?:?]
                at sun.security.ssl.TransportContext.fatal(TransportContext.java:292) ~[?:?]
                at sun.security.ssl.TransportContext.fatal(TransportContext.java:287) ~[?:?]
                at sun.security.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1581) ~[?:?]
                at sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:979) ~[?:?]
                at org.apache.http.impl.io.SessionInputBufferImpl.streamRead(SessionInputBufferImpl.java:137) ~[httpcore-4.4.14.jar:4.4.14]
                at org.apache.http.impl.io.SessionInputBufferImpl.fillBuffer(SessionInputBufferImpl.java:153) ~[httpcore-4.4.14.jar:4.4.14]
                at org.apache.http.impl.io.SessionInputBufferImpl.readLine(SessionInputBufferImpl.java:280) ~[httpcore-4.4.14.jar:4.4.14]
                at org.apache.http.impl.io.ChunkedInputStream.getChunkSize(ChunkedInputStream.java:261) ~[httpcore-4.4.14.jar:4.4.14]
                at org.apache.http.impl.io.ChunkedInputStream.nextChunk(ChunkedInputStream.java:222) ~[httpcore-4.4.14.jar:4.4.14]
                at org.apache.http.impl.io.ChunkedInputStream.read(ChunkedInputStream.java:183) ~[httpcore-4.4.14.jar:4.4.14]
                at org.apache.http.conn.EofSensorInputStream.read(EofSensorInputStream.java:135) ~[httpclient-4.5.9.jar:4.5.9]
                at sun.nio.cs.StreamDecoder.readBytes(StreamDecoder.java:284) ~[?:?]
                at sun.nio.cs.StreamDecoder.implRead(StreamDecoder.java:326) ~[?:?]
                at sun.nio.cs.StreamDecoder.read(StreamDecoder.java:178) ~[?:?]
                at java.io.InputStreamReader.read(InputStreamReader.java:181) ~[?:?]
                at java.io.BufferedReader.fill(BufferedReader.java:161) ~[?:?]
                at java.io.BufferedReader.readLine(BufferedReader.java:326) ~[?:?]
                at java.io.BufferedReader.readLine(BufferedReader.java:392) ~[?:?]
                at com.tremolosecurity.k8s.watch.K8sWatcher.run(K8sWatcher.java:205) [unison-applications-k8s-1.0.22.jar:?]
                at java.lang.Thread.run(Thread.java:834) [?:?]
Caused by: java.net.SocketException: Connection reset
        at java.net.SocketInputStream.read(SocketInputStream.java:186) ~[?:?]
        at java.net.SocketInputStream.read(SocketInputStream.java:140) ~[?:?]
        at sun.security.ssl.SSLSocketInputRecord.read(SSLSocketInputRecord.java:478) ~[?:?]
        at sun.security.ssl.SSLSocketInputRecord.readHeader(SSLSocketInputRecord.java:472) ~[?:?]
        at sun.security.ssl.SSLSocketInputRecord.bytesInCompletePacket(SSLSocketInputRecord.java:70) ~[?:?]
        at sun.security.ssl.SSLSocketImpl.readApplicationRecord(SSLSocketImpl.java:1354) ~[?:?]
        at sun.security.ssl.SSLSocketImpl$AppInputStream.read(SSLSocketImpl.java:963) ~[?:?]
        ... 16 more
[2021-04-20 04:44:40,462][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo -
         [127.0.0.1] - [ff6fccab3484cb5d06689c5b5758a98c9dc26ab1c]
[2021-04-20 04:44:41,539][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [f9edb5aeda6319fd9d5356341763e0d67b811939f]
[2021-04-20 04:44:48,633][XNIO-1 task-2] INFO  GithubAuthMech - login type - 'java.lang.String'
[2021-04-20 04:44:48,633][XNIO-1 task-2] INFO  GithubAuthMech - id type - 'java.lang.Long'
[2021-04-20 04:44:48,634][XNIO-1 task-2] INFO  GithubAuthMech - node_id type - 'java.lang.String'
[2021-04-20 04:44:48,635][XNIO-1 task-2] INFO  GithubAuthMech - avatar_url type - 'java.lang.String'
[2021-04-20 04:44:48,635][XNIO-1 task-2] INFO  GithubAuthMech - gravatar_id type - 'java.lang.String'
[2021-04-20 04:44:48,635][XNIO-1 task-2] INFO  GithubAuthMech - url type - 'java.lang.String'
[2021-04-20 04:44:48,637][XNIO-1 task-2] INFO  GithubAuthMech - html_url type - 'java.lang.String'
[2021-04-20 04:44:48,637][XNIO-1 task-2] INFO  GithubAuthMech - followers_url type - 'java.lang.String'
[2021-04-20 04:44:48,643][XNIO-1 task-2] INFO  GithubAuthMech - following_url type - 'java.lang.String'
[2021-04-20 04:44:48,644][XNIO-1 task-2] INFO  GithubAuthMech - gists_url type - 'java.lang.String'
[2021-04-20 04:44:48,647][XNIO-1 task-2] INFO  GithubAuthMech - starred_url type - 'java.lang.String'
[2021-04-20 04:44:48,649][XNIO-1 task-2] INFO  GithubAuthMech - subscriptions_url type - 'java.lang.String'
[2021-04-20 04:44:48,649][XNIO-1 task-2] INFO  GithubAuthMech - organizations_url type - 'java.lang.String'
[2021-04-20 04:44:48,649][XNIO-1 task-2] INFO  GithubAuthMech - repos_url type - 'java.lang.String'
[2021-04-20 04:44:48,649][XNIO-1 task-2] INFO  GithubAuthMech - events_url type - 'java.lang.String'
[2021-04-20 04:44:48,651][XNIO-1 task-2] INFO  GithubAuthMech - received_events_url type - 'java.lang.String'
[2021-04-20 04:44:48,651][XNIO-1 task-2] INFO  GithubAuthMech - type type - 'java.lang.String'
[2021-04-20 04:44:48,653][XNIO-1 task-2] INFO  GithubAuthMech - site_admin type - 'java.lang.Boolean'
[2021-04-20 04:44:48,653][XNIO-1 task-2] INFO  GithubAuthMech - name type - 'java.lang.String'
[2021-04-20 04:44:48,653][XNIO-1 task-2] INFO  GithubAuthMech - company type - 'java.lang.String'
[2021-04-20 04:44:48,654][XNIO-1 task-2] INFO  GithubAuthMech - blog type - 'java.lang.String'
[2021-04-20 04:44:48,655][XNIO-1 task-2] INFO  GithubAuthMech - location type - 'java.lang.String'
[2021-04-20 04:44:48,655][XNIO-1 task-2] INFO  GithubAuthMech - email type - 'java.lang.String'
[2021-04-20 04:44:48,656][XNIO-1 task-2] INFO  GithubAuthMech - hireable type - 'java.lang.Boolean'
[2021-04-20 04:44:48,657][XNIO-1 task-2] INFO  GithubAuthMech - bio type - 'java.lang.String'
[2021-04-20 04:44:48,657][XNIO-1 task-2] INFO  GithubAuthMech - public_repos type - 'java.lang.Long'
[2021-04-20 04:44:48,658][XNIO-1 task-2] INFO  GithubAuthMech - public_gists type - 'java.lang.Long'
[2021-04-20 04:44:48,658][XNIO-1 task-2] INFO  GithubAuthMech - followers type - 'java.lang.Long'
[2021-04-20 04:44:48,659][XNIO-1 task-2] INFO  GithubAuthMech - following type - 'java.lang.Long'
[2021-04-20 04:44:48,659][XNIO-1 task-2] INFO  GithubAuthMech - created_at type - 'java.lang.String'
[2021-04-20 04:44:48,659][XNIO-1 task-2] INFO  GithubAuthMech - updated_at type - 'java.lang.String'
[2021-04-20 04:44:48,660][XNIO-1 task-2] INFO  GithubAuthMech - mail type - 'java.lang.String'
[2021-04-20 04:44:48,986][XNIO-1 task-2] INFO  AccessLog - [AuFail] - scale - https://k8sou.aks.mevijay.site/auth/github - cn=none - enterprise_idp [10.244.1.9] - [f1887cca5b9b1024b6370237a638205e005dca60e]
[2021-04-20 04:44:50,251][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - anonfiles - https://k8sou.aks.mevijay.site/favicon.ico - uid=Anonymous,o=Tremolo -
         [10.244.1.9] - [f05c035239c45d34a429c22367b898acc84ebdf16]
[2021-04-20 04:44:50,455][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo -
         [127.0.0.1] - [fd4e46ba4aa9d0ebf3291d8953b9f093cc656ffc9]
[2021-04-20 04:44:51,535][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [f748850f949865a6c7eab0ed36437a5a9759196e7]
[2021-04-20 04:45:00,103][Thread-10] WARN  SessionManagerImpl - Clearing 0 sessions
[2021-04-20 04:45:00,459][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo -
         [127.0.0.1] - [ffb6b7326ca278deb203fa3cabe1096e4e124dae4]
[2021-04-20 04:45:01,554][XNIO-1 task-2] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [fb3bfe9d319c8b05cf38cb7e6b9c9bd130231a223]```


This error is common in AKS + EKS + onprem kubernetes vanilla as well.
pls find new logs of orchestra pod here -


`[2021-04-20 10:08:46,972][Thread-10] WARN  SessionManagerImpl - Clearing 0 sessions
[2021-04-20 10:08:47,249][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo - 
         [127.0.0.1] - [ff3a68c3549a24a528c2fd8ff0e57743fa0a7e5ac]
[2021-04-20 10:08:47,441][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [fb8bb11980c102cb83457017a3a584b44eb9c1bc6]
[2021-04-20 10:08:57,253][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo - 
         [127.0.0.1] - [fd624e6850777693d931a949cad1a93cb9fd4620f]
[2021-04-20 10:08:57,440][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [f742c5150023d20f6e90a98c8940a919324f892d7]
[2021-04-20 10:09:07,246][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo - 
         [127.0.0.1] - [f72b4076e4ab4eab40459f01971dd5e326d9b6a31]
[2021-04-20 10:09:07,408][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [f59affab355a94d5f3af1512f18afffba12493f5b]
[2021-04-20 10:09:17,249][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo - 
         [127.0.0.1] - [f93eecb0c3253957b09c7f6b4db90bbf90cb1bb14]
[2021-04-20 10:09:17,412][XNIO-1 task-1] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [f50a7624012cfc4ace9ffb9d7ce4dd0f80ec50836]
[2021-04-20 10:09:24,652][XNIO-1 task-1] INFO  GithubAuthMech - login type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - id type - 'java.lang.Long'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - node_id type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - avatar_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - gravatar_id type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - html_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - followers_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - following_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - gists_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - starred_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - subscriptions_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - organizations_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - repos_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - events_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - received_events_url type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - type type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - site_admin type - 'java.lang.Boolean'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - name type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - company type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - blog type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - location type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - email type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - hireable type - 'java.lang.Boolean'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - bio type - 'java.lang.String'
[2021-04-20 10:09:24,653][XNIO-1 task-1] INFO  GithubAuthMech - public_repos type - 'java.lang.Long'
[2021-04-20 10:09:24,654][XNIO-1 task-1] INFO  GithubAuthMech - public_gists type - 'java.lang.Long'
[2021-04-20 10:09:24,654][XNIO-1 task-1] INFO  GithubAuthMech - followers type - 'java.lang.Long'
[2021-04-20 10:09:24,654][XNIO-1 task-1] INFO  GithubAuthMech - following type - 'java.lang.Long'
[2021-04-20 10:09:24,654][XNIO-1 task-1] INFO  GithubAuthMech - created_at type - 'java.lang.String'
[2021-04-20 10:09:24,654][XNIO-1 task-1] INFO  GithubAuthMech - updated_at type - 'java.lang.String'
[2021-04-20 10:09:24,654][XNIO-1 task-1] INFO  GithubAuthMech - mail type - 'java.lang.String'
[2021-04-20 10:09:25,578][XNIO-1 task-1] INFO  AccessLog - [AuFail] - scale - https://k8sou.k8s.mylab.local/auth/github - cn=none - enterprise_idp [10.46.0.10] - [f097ee9e1796de03b03aa128d091c5de4abe899c6]
[2021-04-20 10:09:26,036][XNIO-1 task-3] INFO  AccessLog - [AzSuccess] - anonfiles - https://k8sou.k8s.mylab.local/favicon.ico - uid=Anonymous,o=Tremolo - 
         [10.46.0.10] - [f096a2a4e85cb0f38d1ad88aa941dc5b7173e74cb]
[2021-04-20 10:09:27,265][XNIO-1 task-3] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo - 
         [127.0.0.1] - [fa7c9e58dfd32fc07380400897f5f2d4ac464f5dc]
[2021-04-20 10:09:27,432][XNIO-1 task-3] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [ff6824f6b24e6cdc2f81f7364e6f145582fdc7c8f]
[2021-04-20 10:09:37,291][XNIO-1 task-3] INFO  AccessLog - [AzSuccess] - CheckAlive - https://127.0.0.1:8443/check_alive - uid=Anonymous,o=Tremolo - 
         [127.0.0.1] - [f87af5ae5e52115df5d6d9ba4d66767e747974986]
[2021-04-20 10:09:37,456][XNIO-1 task-3] INFO  AccessLog - [AzSuccess] - k8sIdp - https://127.0.0.1:8443/auth/idp/k8sIdp/.well-known/openid-configuration - uid=Anonymous,o=Tremolo - NONE [127.0.0.1] - [f1738bc734ff6174f7793a5defef5e5ed9c5745b9]
`


This section may need attention - 

INFO AccessLog - [AuFail] - scale - https://k8sou.k8s.mylab.local/auth/github - cn=none - enterprise_idp [10.46.0.10] - [f097ee9e1796de03b03aa128d091c5de4abe899c6] [2021-04-20 10:09:26,036][XNIO-1 task-3]

possible bug in values.yaml new version.

Hi i was just testing this in my sandbox.
Helm deployment is giving error.

 $ helm install orchestra tremolo/openunison-k8s-login-github --namespace openunison -f values-k8s-github.yaml 
Error: OpenUnison.openunison.tremolo.io "orchestra" is invalid: spec.myvd_configmap: Invalid value: "null": spec.myvd_configmap in body must be of type string: "null"

I tried with removed line of spec.myvd_configmap but no luck i have given

If i am giving any random value then it tries to mount cm . stucked in setup.

19s         Warning   FailedMount            pod/openunison-orchestra-cc4c5985f-khrwd      MountVolume.SetUp failed for volume "myvd-volume" : configmap "myvd" not found
24s         Warning   FailedMount            pod/openunison-orchestra-cc4c5985f-khrwd      Unable to attach or mount volumes: unmounted volumes=[myvd-volume], unattached volumes=[secret-volume myvd-volume openunison-orchestra-token-48pkj]: timed out waiting for the condition

Bellow is my values.yaml

network:
  openunison_host: "k8sou.apps.192-168-2-3.nip.io"
  dashboard_host: "k8sdb.apps.192-168-2-3.nip.io"
  api_server_host: "k8sapi.apps.192-168-2-3.nip.io"
  session_inactivity_timeout_seconds: 900
  k8s_url: https://192.168.1.15:6443
  createIngressCertificate: false
  ingress_type: nginx
  ingress_annotations:
    kubernetes.io/ingress.class: nginx
    cert-manager.io/cluster-issuer: "mylab"
  force_redirect_to_tls: true
  istio:
    selectors:
      istio: ingressgateway
  ingress_certificate: ou-tls-certificate

cert_template:
  ou: "Kubernetes"
  o: "MyOrg"
  l: "My Cluster"
  st: "State of Cluster"
  c: "MyCountry"

image: "docker.io/tremolosecurity/openunison-k8s-login-github:latest"
myvd_config_path: "WEB-INF/myvd.conf"
k8s_cluster_name: kubernetes
enable_impersonation: true
myvd_configmap: ""


dashboard:
  namespace: "kubernetes-dashboard"
  cert_name: "kubernetes-dashboard-certs"
  label: "k8s-app=kubernetes-dashboard"
  service_name: kubernetes-dashboard
certs:
  use_k8s_cm: false

trusted_certs: []

monitoring:
  prometheus_service_account: system:serviceaccount:monitoring:prometheus-k8s
github:
  client_id: 4fdxxxxxxxxxxxx2361
  teams: crazytechindia/admin


impersonation:
  use_jetstack: false
  jetstack_oidc_proxy_image: quay.io/jetstack/kube-oidc-proxy:v0.3.0
  explicit_certificate_trust: true
  ca_secret_name: ou-tls-certificate

network_policies:
  enabled: false
  ingress:
    enabled: true
    labels:
      app.kubernetes.io/name: ingress-nginx
  monitoring:
    enabled: true
    labels:
      app.kubernetes.io/name: monitoring
  apiserver:
    enabled: false
    labels:
      app.kubernetes.io/name: kube-system

services:
  enable_tokenrequest: false
  token_request_audience: api
  token_request_expiration_seconds: 600
  node_selectors: []
  pullSecret: ""

openunison:
  replicas: 1
  non_secret_data: {}
  secrets: []

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.