Skip to content

Configure the PLOSSYS Administrator Environment


  1. In the configuration of the seal-plossysadmin service, specify the following keys:

    • AUTH_CLIENT_ID: Client name configured in the OIDC identity provider for the seal-plossyadmin client, by default seal-plossysadmin

    • AUTH_CLIENT_SECRET: Client secret generated in the OIDC identity provider for the seal-plossysadmin client

    Example - setting keys via PLOSSYS CLI

    plossys config set AUTH_CLIENT_ID seal-plossysadmin --service plossysadmin --insecure
    
    plossys config set AUTH_CLIENT_SECRET <client_secret_plossysadmin> --service plossysadmin --insecure
    

    Hint - FQDN and lower case letters

    Use the fully-qualified domain name (FQDN) of the OIDC identity provider server in lower case letters!

  2. If you have installed PLOSSYS Output Engine with a separate management server, specify the following keys:

    • KIBANA_LINK: URL under which the Kibana app is available, that means http://<management_server>:5601/app/kibana

    • ELASTICSEARCH_REST_URL: URL of the Elasticsearch server, that means http://<management_server>:9200

    Example - setting keys via PLOSSYS CLI

    plossys config set KIBANA_LINK http://<management_server>:5601/app/kibana --service plossysadmin --insecure
    
    plossys config set ELASTICSEARCH_REST_URL http://<management_server>:9200 --service rest --insecure
    
  3. If you use a customized index pattern in Kibana, specify the following key for the seal-plossysadmin service:

    Example - setting KIBANA_INDEX_PATTERN_LOG via PLOSSYS CLI

    plossys config set KIBANA_INDEX_PATTERN_LOG <custom_index_name> --service plossysadmin --insecure
    
  4. If self-signed certificates are used with PLOSSYS Output Engine, the following key has to be set to 0 for the seal-plossysadmin service:

    Example - setting key via PLOSSYS CLI

    plossys config set NODE_TLS_REJECT_UNAUTHORIZED 0 --service plossysadmin --insecure
    

Back to top