deploy-templates/grafana/templates/configmap.yaml (55 lines of code) (raw):

{{ $secret := (lookup "v1" "Secret" "user-management" "grafana-keycloakclient-secret").data }} {{ $oauthclientSecret := randAlphaNum 16 }} --- kind: Secret apiVersion: v1 metadata: name: grafana-keycloakclient-secret namespace: user-management data: clientSecret: {{ if $secret }}{{ $secret.clientSecret }}{{ else }}{{ b64enc $oauthclientSecret }}{{ end }} type: Opaque --- apiVersion: v1 kind: ConfigMap metadata: name: {{ include "common.names.fullname" . }}-envvars namespace: {{ .Release.Namespace }} labels: {{- include "common.labels.standard" . | nindent 4 }} app.kubernetes.io/component: grafana data: GF_SECURITY_ADMIN_USER: {{ .Values.admin.user | quote }} {{- if .Values.imageRenderer.enabled }} {{- $domain := .Values.clusterDomain }} {{- $namespace := .Release.Namespace }} GF_RENDERING_SERVER_URL: "http://{{ include "common.names.fullname" . }}-image-renderer.{{ $namespace }}.svc.{{ $domain }}:{{ .Values.imageRenderer.service.port }}/render" GF_RENDERING_CALLBACK_URL: "http://{{ include "common.names.fullname" . }}.{{ $namespace }}.svc.{{ $domain }}:{{ .Values.service.port }}/" {{- end }} {{- if .Values.plugins }} GF_INSTALL_PLUGINS: {{ .Values.plugins | quote }} {{- else }} GF_INSTALL_PLUGINS: "" {{- end }} GF_PATHS_PLUGINS: "/opt/bitnami/grafana/data/plugins" GF_AUTH_ANONYMOUS_ENABLED: 'false' GF_AUTH_LDAP_ENABLED: 'false' GF_AUTH_LDAP_CONFIG_FILE: "/opt/bitnami/grafana/conf/ldap.toml" GF_AUTH_LDAP_ALLOW_SIGN_UP: 'false' GF_PATHS_PROVISIONING: "/opt/bitnami/grafana/conf/provisioning" GF_PATHS_CONFIG: "/opt/bitnami/grafana/conf/grafana.ini" GF_PATHS_DATA: "/opt/bitnami/grafana/data" GF_PATHS_LOGS: "/opt/bitnami/grafana/logs" GF_RENDERING_SERVER_URL: "http://grafana-image-renderer.grafana-monitoring.svc.cluster.local:8080/render" GF_RENDERING_CALLBACK_URL: 'http://grafana.grafana-monitoring.svc.cluster.local:3000/' GF_SERVER_ROOT_URL: https://grafana-grafana-monitoring.{{ .Values.dnsWildcard }}/ GF_AUTH_BASIC_ENABLED: 'false' GF_AUTH_GENERIC_OAUTH_ENABLED: 'true' GF_AUTH_GENERIC_OAUTH_CLIENT_ID: "grafana" GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET: {{ if $secret }}{{ b64dec $secret.clientSecret }}{{ else }}{{ $oauthclientSecret }}{{ end }} GF_AUTH_GENERIC_OAUTH_SCOPES: "openid email profile roles" GF_AUTH_GENERIC_OAUTH_AUTH_URL: "https://platform-keycloak.{{ .Values.dnsWildcard }}/auth/realms/openshift/protocol/openid-connect/auth" GF_AUTH_GENERIC_OAUTH_TOKEN_URL: "https://platform-keycloak.{{ .Values.dnsWildcard }}/auth/realms/openshift/protocol/openid-connect/token" GF_AUTH_GENERIC_OAUTH_API_URL: "https://platform-keycloak.{{ .Values.dnsWildcard }}/auth/realms/openshift/protocol/openid-connect/userinfo" GF_AUTH_GENERIC_OAUTH_ROLE_ATTRIBUTE_PATH: "contains(realm_access.roles[*], 'grafana-admin') && 'Admin' || contains(realm_access.roles[*], 'grafana-viewer') && 'Viewer'" GF_SECURITY_ADMIN_USER: admin GF_LOG_LEVEL: debug