Hi I’m trying to install Camunda8.8-alpha4.1 (Yes I’ve been trying since that was the latest alpha. Yes I am questioning my lifechoices). I’m using the helm chart deploying to our kubernetes cluster.
Keycloak, postgresql, identity runs fine now but I have an issue with camunda-platform-zeebe pods not being able to connect to elasticsearch.
early in the logs I get a warning:
[main] WARN
io.camunda.search.connect.es.ElasticsearchConnector - Username and/or password for are empty. Basic authentication for elasticsearch is not used.
Based on your configuration and the generated configmap, I can see that the username is being correctly propagated to both the ElasticsearchExporter and CamundaExporter, but the password is missing from the authentication configuration. This appears to be an issue with the Camunda 8.8-alpha4.1 Helm chart.
Classification: Problem
Your configuration looks correct according to the documentation. The issue is that while the username (zeebe-elast) is appearing in the generated configmap, the password is not being included in the authentication args for either exporter.
Potential Solutions:
1. Try Using a Kubernetes Secret (Recommended)
Instead of putting the password directly in the values file, try using a Kubernetes secret:
I started with using secret (existingSecret, existingSecretKey) and got the same error, from that I started using password instead just incase there was some error with the secret.
looking at the configmap.yaml template password doesnt exist in the configmap:
# zeebe.broker.exporters
exporters:
{{- if and (not .Values.global.elasticsearch.disableExporter) .Values.global.elasticsearch.enabled }}
elasticsearch:
className: "io.camunda.zeebe.exporter.ElasticsearchExporter"
args:
{{- if .Values.global.elasticsearch.external }}
authentication:
username: {{ .Values.global.elasticsearch.auth.username | quote }}
{{- end }}
url: {{ include "camundaPlatform.elasticsearchURL" . | quote }}
index:
prefix: {{ .Values.global.elasticsearch.prefix | quote }}
{{- if .Values.core.history.retention.enabled }}
retention:
enabled: true
minimumAge: {{ .Values.core.history.retention.minimumAge | quote }}
policyName: {{ .Values.core.history.retention.policyName | quote }}
{{- end }}
I do not want to do option 2. Our goal is to have the password in a secret