1
0
Fork 0

authelia: Point to external PostgreSQL server

If there is an issue with the in-cluster database server, accessing the
Kubernetes API becomes impossible by normal means.  This is because the
Kubernetes API uses Authelia for authentication and authorization, and
Authelia relies on the in-cluster database server.  To solve this
chicken-and-egg scenario, I've set up a dedicated PostgreSQL database
server on a virtual machine, totally external to the Kubernetes cluster.

With this commit, I have changed the Authelia configuration to point at
this new database server.  The contents of the new database server were
restored from a backup from the in-cluster server, so of Authelia's
state was migrated automatically.  Thus, updating the configuration is
all that is necessary to switch to using it.

The new server uses certificate-based authentication.  In order for
Authelia to access it, it needs a certificate issued by the
_postgresql-ca_ ClusterIssuer, managed by _cert-manager_.  Although the
environment variables for pointing to the certificate and private key
are not listed explicitly in the Authelia documentation, their names
can be inferred from the configuration document schema and work as
expected.
etcd
Dustin 2024-07-01 08:22:59 -05:00
parent a8ef4c7a80
commit 92497004be
3 changed files with 24 additions and 18 deletions

View File

@ -157,9 +157,10 @@ server:
storage: storage:
postgres: postgres:
host: default.postgresql host: postgresql.pyrocufflink.blue
database: authelia database: authelia
username: authelia.authelia username: authelia
password: unused
tls: tls:
skip_verify: false skip_verify: false

View File

@ -13,6 +13,7 @@ resources:
- redis.yaml - redis.yaml
- authelia.yaml - authelia.yaml
- oidc-cluster-admin.yaml - oidc-cluster-admin.yaml
- postgres-cert.yaml
replicas: replicas:
- name: authelia - name: authelia
@ -23,10 +24,6 @@ configMapGenerator:
namespace: authelia namespace: authelia
files: files:
- configuration.yml - configuration.yml
- name: postgresql-ca
namespace: authelia
files:
- postgresql-ca.crt
patches: patches:
- patch: |- - patch: |-
@ -41,24 +38,20 @@ patches:
containers: containers:
- name: authelia - name: authelia
env: env:
- name: AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE - name: AUTHELIA_STORAGE_POSTGRES_TLS_CERTIFICATE_CHAIN_FILE
value: /run/authelia/secrets/postgresql/password value: /run/authelia/certs/postgresql/tls.crt
- name: AUTHELIA_STORAGE_POSTGRES_TLS_PRIVATE_KEY_FILE
value: /run/authelia/certs/postgresql/tls.key
volumeMounts: volumeMounts:
- mountPath: /run/authelia/certs/postgresql-ca.crt
name: postgresql-ca
subPath: postgresql-ca.crt
- mountPath: /run/authelia/certs/dch-root-ca.crt - mountPath: /run/authelia/certs/dch-root-ca.crt
name: dch-root-ca name: dch-root-ca
subPath: dch-root-ca.crt subPath: dch-root-ca.crt
- mountPath: /run/authelia/secrets/postgresql - mountPath: /run/authelia/certs/postgresql
name: postgresql-auth name: postgresql-cert
volumes: volumes:
- name: postgresql-auth - name: postgresql-cert
secret: secret:
secretName: authelia.authelia.default.credentials.postgresql.acid.zalan.do secretName: postgres-client-cert
- name: postgresql-ca
configMap:
name: postgresql-ca
- name: dch-root-ca - name: dch-root-ca
configMap: configMap:
name: dch-root-ca name: dch-root-ca

View File

@ -0,0 +1,12 @@
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: postgres-client-cert
spec:
commonName: authelia
privateKey:
algorithm: ECDSA
secretName: postgres-client-cert
issuerRef:
name: postgresql-ca
kind: ClusterIssuer