Configure the PLOSSYS Administrator Environment¶
-
In the configuration of the
seal-plossysadmin
service, specify the following keys:-
AUTH_CLIENT_ID
: Client name configured in the OIDC identity provider for theseal-plossyadmin
client, by defaultseal-plossysadmin
-
AUTH_CLIENT_SECRET
: Client secret generated in the OIDC identity provider for theseal-plossysadmin
client
Example - setting keys via PLOSSYS CLI
plossys config set AUTH_CLIENT_ID seal-plossysadmin --service plossysadmin --insecure
plossys config set AUTH_CLIENT_SECRET <client_secret_plossysadmin> --service plossysadmin --insecure
Hint - FQDN and lower case letters
Use the fully-qualified domain name (FQDN) of the OIDC identity provider server in lower case letters!
-
-
If you have installed PLOSSYS Output Engine with a separate management server, specify the following keys:
-
KIBANA_LINK
: URL under which the Kibana app is available, that meanshttp://<management_server>:5601/app/kibana
-
ELASTICSEARCH_REST_URL
: URL of the Elasticsearch server, that meanshttp://<management_server>:9200
Example - setting keys via PLOSSYS CLI
plossys config set KIBANA_LINK http://<management_server>:5601/app/kibana --service plossysadmin --insecure
plossys config set ELASTICSEARCH_REST_URL http://<management_server>:9200 --service rest --insecure
-
-
If you use a customized index pattern in Kibana, specify the following key for the
seal-plossysadmin
service:KIBANA_INDEX_PATTERN_LOG
: Index pattern in Kibana used for the messages of PLOSSYS Administrator
Example - setting
KIBANA_INDEX_PATTERN_LOG
via PLOSSYS CLIplossys config set KIBANA_INDEX_PATTERN_LOG <custom_index_name> --service plossysadmin --insecure
-
If self-signed certificates are used with PLOSSYS Output Engine, the following key has to be set to
0
for theseal-plossysadmin
service:NODE_TLS_REJECT_UNAUTHORIZED
: Flag if self-signed certificates are allowed
Example - setting key via PLOSSYS CLI
plossys config set NODE_TLS_REJECT_UNAUTHORIZED 0 --service plossysadmin --insecure