You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Create a secret with the TLS certificate and key that will be used for TLS termination of the web application and
40
40
Keycloak:
41
41
42
-
```console
42
+
```shell
43
43
kubectl apply -f tls-secret.yaml
44
44
```
45
45
46
46
## Step 2 - Deploy a Web Application
47
47
48
48
Create the application deployment and service:
49
49
50
-
```console
50
+
```shell
51
51
kubectl apply -f webapp.yaml
52
52
```
53
53
54
54
## Step 3 - Deploy Keycloak
55
55
56
56
1. Create the Keycloak deployment and service:
57
57
58
-
```console
58
+
```shell
59
59
kubectl apply -f keycloak.yaml
60
60
```
61
61
62
62
2. Create a VirtualServer resource for Keycloak:
63
63
64
-
```console
64
+
```shell
65
65
kubectl apply -f virtual-server-idp.yaml
66
66
```
67
67
@@ -73,7 +73,7 @@ To set up Keycloak:
73
73
1. To connect to Keycloak, use `https://keycloak.example.com`.
74
74
2. Make sure to save the client secret for NGINX-Plus client to the `SECRET` shell variable:
75
75
76
-
```console
76
+
```shell
77
77
SECRET=value
78
78
```
79
79
@@ -86,15 +86,15 @@ in a broken deployment.
86
86
87
87
1. Encode the secret, obtained in the previous step:
88
88
89
-
```console
89
+
```shell
90
90
echo -n $SECRET | base64
91
91
```
92
92
93
93
2. Edit `client-secret.yaml`, replacing `<insert-secret-here>` with the encoded secret.
94
94
95
95
3. Create a secret with the name `oidc-secret` that will be used by the OIDC policy:
96
96
97
-
```console
97
+
```shell
98
98
kubectl apply -f client-secret.yaml
99
99
```
100
100
@@ -111,23 +111,23 @@ Steps:
111
111
112
112
1. Apply the ConfigMap `nginx-config.yaml`, which contains `zone-sync` configuration parameter that enable zone synchronization and the resolver using the kube-dns service.
113
113
114
-
```console
114
+
```shell
115
115
kubectl apply -f nginx-config.yaml
116
116
```
117
117
118
118
## Step 7 - Deploy the OIDC Policy
119
119
120
120
Create a policy with the name `oidc-policy` that references the secret from the previous step:
121
121
122
-
```console
122
+
```shell
123
123
kubectl apply -f oidc.yaml
124
124
```
125
125
126
126
## Step 8 - Configure Load Balancing
127
127
128
128
Create a VirtualServer resource for the web application:
0 commit comments