The module does not have any mandatory parameters.
The module is enabled by default in the following bundles: Default
, Managed
.
The module is disabled by default in the Minimal
bundle.
The module is configured using the ModuleConfig custom resource named dashboard
(learn more about setting up Deckhouse…).
Example of the ModuleConfig/dashboard
resource for configuring the module:
apiVersion: deckhouse.io/v1alpha1
kind: ModuleConfig
metadata:
name: dashboard
spec:
version: 2
enabled: true
settings: # <-- Module parameters from the "Parameters" section below.
Parameters
Schema version: 2
- settings
- settings.accessLevel
The level of access to the dashboard if the
user-authn
module is disabled and noexternalAuthentication
is configured. See supported values in the user-authz documentation.By default,
User
level is used.Use
user-authz
module settings to configure access if theuser-authn
module is enabled orexternalAuthentication
is configured.Default:
"User"
Allowed values:
User
,PrivilegedUser
,Editor
,Admin
,ClusterEditor
,ClusterAdmin
,SuperAdmin
- settings.auth
Options related to authentication or authorization in the application.
- settings.auth.allowScale
Activate ability to scale Deployment and StatefulSet from the web interface.
This parameter has no effect if the
externalAuthentication
is enabled. - settings.auth.allowedUserGroups
An array of user groups that can access the dashboard.
This parameter is used if the
user-authn
module is enabled or theexternalAuthentication
parameter is set.Caution! Note that you must add those groups to the appropriate field in the DexProvider config if this module is used together with the user-authn one.
- settings.auth.externalAuthentication
Parameters to enable external authentication based on the NGINX Ingress external-auth mechanism that uses the Nginx auth_request module.
Note! External authentication is enabled automatically if the user-authn module is enabled.
- settings.auth.externalAuthentication.authSignInURL
The URL to redirect the user for authentication (if the authentication service returned a non-200 HTTP response code).
- settings.auth.externalAuthentication.authURL
The URL of the authentication service. If the user is authenticated, the service should return an HTTP 200 response code.
- settings.auth.externalAuthentication.useBearerTokens
The dashboard must use the user ID to work with the Kubernetes API (the authentication service must return the Authorization HTTP header that contains the bearer-token – the dashboard will use this token to make requests to the Kubernetes API server).
Default value is false.
Caution! For security reasons, this mode only works if
https.mode
(global or for a module) is not set toDisabled
;
- settings.auth.whitelistSourceRanges
The CIDR range for which authentication to access the dashboard is allowed.
Example:
whitelistSourceRanges: - 1.1.1.1/32
- settings.highAvailability
Manually enable the high availability mode.
By default, Deckhouse automatically decides whether to enable the HA mode. Click here to learn more about the HA mode for modules.
Example:
highAvailability: true
- settings.https
What certificate type to use with the dashboard.
This parameter completely overrides the
global.modules.https
settings.Examples:
https: mode: CustomCertificate customCertificate: secretName: foobar
https: mode: CertManager certManager: clusterIssuerName: letsencrypt
- settings.https.certManager
- settings.https.certManager.clusterIssuerName
What ClusterIssuer to use for the dashboard. Currently,
letsencrypt
,letsencrypt-staging
,selfsigned
are available; also, you can define your own.Default:
"letsencrypt"
- settings.https.customCertificate
- settings.https.customCertificate.secretName
The name of the Secret in the
d8-system
namespace to use with the dashboard (this Secret must have the kubernetes.io/tls format).Default:
"false"
- settings.https.mode
The HTTPS usage mode:
CertManager
— the dashboard will use HTTPS and get a certificate from the ClusterIssuer defined in thecertManager.clusterIssuerName
parameter.CustomCertificate
— the dashboard will use the certificate from thed8-system
namespace for HTTPS.Disabled
— in this mode, the dashboard works over HTTP only.OnlyInURI
— the dashboard will work over HTTP (thinking that there is an external HTTPS load balancer in front of it that terminates HTTPS traffic). All the links in the user-authn will be generated using the HTTPS scheme. Load balancer should provide a redirect from HTTP to HTTPS.
Allowed values:
Disabled
,CertManager
,CustomCertificate
,OnlyInURI
- settings.ingressClass
The class of the Ingress controller used for the dashboard.
By default, the
modules.ingressClass
global value is used.Pattern:
^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
- settings.nodeSelector
The same as in the Pods’
spec.nodeSelector
parameter in Kubernetes.If the parameter is omitted or
false
, it will be determined automatically. - settings.tolerations
The same as in the Pods’
spec.tolerations
parameter in Kubernetes.If the parameter is omitted or
false
, it will be determined automatically.- settings.tolerations.effect
- settings.tolerations.key
- settings.tolerations.operator
- settings.tolerations.tolerationSeconds
- settings.tolerations.value
Authentication
user-authn module provides authentication by default. Also, externalAuthentication can be configured (see below). If these options are disabled, the module will use basic auth with the auto-generated password.
Use kubectl to see password:
kubectl -n d8-system exec svc/deckhouse-leader -c deckhouse -- deckhouse-controller module values dashboard -o json | jq '.dashboard.internal.auth.password'
Delete the Secret to re-generate password:
kubectl -n d8-dashboard delete secret/basic-auth
Note! The
auth.password
parameter is deprecated.