Unable to login on page post setting basic auth roles and groups #2173
Unanswered
sameergithub5
asked this question in
Q&A
Replies: 1 comment
-
|
Can you please post again your configuration using code blocks (https://docs.github.com/en/get-started/writing-on-github/working-with-advanced-formatting/creating-and-highlighting-code-blocks) + some logs + a screenshot of the browser console to see which request fall into 404 ? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello Team,
Hello Team,
We have configured AKHQ using below config, we put username and password on login page and it does not do anything. I checked the network tab in debug mode and it says 404. Am I missing something or its config issue ??
image:
repository: tchiotludo/akhq
tag: "" # uses Chart.AppVersion by default
revisionHistoryLimit: 10
annotations: {}
#prometheus.io/scrape: 'true'
#prometheus.io/port: '8080'
#prometheus.io/path: '/prometheus'
podAnnotations: {}
configmapAnnotations: {}
vault.security.banzaicloud.io/vault-role: akhq
vault.security.banzaicloud.io/vault-serviceaccount: akhq
labels: {}
custom.label: 'true'
podLabels: {}
extraEnv:
value: |
micronaut:
security:
enabled: true
token:
jwt:
signatures:
secret:
generator:
secret: "secreto"
value: |
akhq:
connections:
docker-kafka-server:
properties:
bootstrap.servers: "kafka:9092"
security:
roles:
node-read:
- resources: [ "NODE" ]
actions: [ "READ", "READ_CONFIG" ]
node-admin:
- resources: [ "NODE" ]
actions: [ "READ", "READ_CONFIG", "ALTER_CONFIG" ]
topic-read:
- resources: [ "TOPIC", "TOPIC_DATA" ]
actions: [ "READ" ]
- resources: [ "TOPIC" ]
actions: [ "READ_CONFIG" ]
topic-admin:
- resources: [ "TOPIC", "TOPIC_DATA" ]
actions: [ "READ", "CREATE", "DELETE" ]
- resources: [ "TOPIC" ]
actions: [ "UPDATE", "READ_CONFIG", "ALTER_CONFIG" ]
connect-rw:
- resources: [ "CONNECTOR" ]
actions: [ "READ", "CREATE", "UPDATE_STATE" ]
connect-admin:
- resources: [ "CONNECTOR" ]
actions: [ "READ", "CREATE", "UPDATE_STATE", "DELETE" ]
registry-read:
- resources: [ "SCHEMA" ]
actions: [ "READ" ]
registry-admin:
- resources: [ "SCHEMA" ]
actions: [ "READ", "CREATE", "UPDATE", "DELETE", "DELETE_VERSION" ]
group-read:
- resources: [ "CONSUMER_GROUP" ]
actions: [ "READ" ]
connect-cluster-read:
- resources: [ "CONNECT_CLUSTER" ]
actions: [ "READ" ]
ksqldb-admin:
- resources: [ "KSQLDB" ]
actions: [ "READ", "EXECUTE" ]
default-group: topic-read # Default groups for all the user even unlogged user
# Groups definition
groups:
admin:
- role: node-admin
- role: topic-admin
- role: connect-admin
- role: registry-admin
- role: group-read
- role: connect-cluster-read
- role: ksqldb-admin
topic-reader:
- role: topic-read
- role: registry-admin
topic-reader-dev:
- role: topic-read
clusters: ["dev"]
- role: registry-admin
clusters: ["dev"]
topic-reader-project-prod:
- role: topic-read
patterns: ["project."]
clusters: ["prod."]
- role: registry-admin
patterns: ["project."]
clusters: ["prod."]
# Basic auth configuration
basic-auth:
- username: admin
password: "fc8252c8dc55839967c58b9ad755a59b61b67c13227ddae4bd3f78a38bf394f7"
groups:
- topic-read
- username: reader
password: "fc8252c8dc55839967c58b9ad755a59b61b67c13227ddae4bd3f78a38bf394f7"
groups:
- reader
existingSecrets: ""
secrets: {}
kafkaSecrets: {}
extraVolumes: []
extraVolumeMounts: []
serviceAccountName: null
serviceAccount:
create: false
#annotations:
eks.amazonaws.com/role-arn: arn:aws:iam::123456789000:role/iam-role-name-here
initContainers: {}
securityContext: {}
runAsNonRoot: true
runAsUser: 1000
containerSecurityContext: {}
allowPrivilegeEscalation: false
privileged: false
capabilities:
drop:
- ALL
runAsNonRoot: true
runAsUser: 1001
readOnlyRootFilesystem: true
service:
enabled: true
type: ClusterIP
port: 80
managementPort: 28081
#httpNodePort: 32551
#managementNodePort: 32552
labels: {}
loadBalancerIP: ""
annotations:
# cloud.google.com/load-balancer-type: "Internal"
readinessProbe:
enabled: true
prefix: "" # set same as
micronaut.server.context-pathpath: /health
port: management
initialDelaySeconds: 5
periodSeconds: 10
timeoutSeconds: 5
successThreshold: 1
failureThreshold: 3
httpGetExtra: {}
livenessProbe:
enabled: true
prefix: "" # set same as
micronaut.server.context-pathpath: /health
port: management
initialDelaySeconds: 5
periodSeconds: 10
timeoutSeconds: 5
successThreshold: 1
failureThreshold: 3
httpGetExtra: {}
resources:
limits:
cpu: 300m
memory: 700Mi
requests:
cpu: 200m
memory: 512Mi
nodeSelector: {}
tolerations:
key: dedicated
operator: Equal
value: kafka
affinity:
key: Pool
operator: In
values: kafka
networkPolicy:
enabled: true
labels: {}
Beta Was this translation helpful? Give feedback.
All reactions