Common Config And Secrets
LogZilla documentation for Common Config And Secrets
ConfigMaps and Secrets
The following manifests define shared ConfigMaps and Secrets required by multiple LogZilla components. Replace placeholder values before applying.
yaml---
apiVersion: v1
kind: ConfigMap
metadata:
name: django-multimap
data:
LICENSE_SERVER_BASE_URL: https://license.logzilla.net/
CUSTOMER_INFO: k8s_customer
INTERNAL_CUSTOMER: "1"
EULA_ACCEPTED: '1'
SYSTEM_METRICS_ENABLED: "0"
QUERYMODULE_API_URL: http://querymodule:81/
---
apiVersion: v1
kind: ConfigMap
metadata:
name: log-multimap
data:
LOG_LEVEL: INFO
IE_LOG_LEVEL: WARNING
IC_LOG_LEVEL: DEBUG
LOG_THREAD_INFO: "1"
IE_TARGET_URL: http://storage-0.storage:81/internal-events
PYTHONASYNCIODEBUG_LOG_LEVEL: DISABLED
PYTHONASYNCIODEBUG_SLOW_CALLBACK_DURATION: "0.5"
---
apiVersion: v1
kind: ConfigMap
metadata:
name: module-multimap
data:
MODULE_WAIT_FOR_API_TIMEOUT: '60'
MODULE_DOWNLOAD_LICENSE: '1'
IA_BASE_URL: http://api/api/
LOG_API_TIMERS: "0"
PYTHONOPTIMIZE: "1"
---
apiVersion: v1
kind: Secret
metadata:
name: django-secret
type: Opaque
stringData:
DJANGO_SECRET_KEY: <set-strong-random-value>
---
apiVersion: v1
kind: Secret
metadata:
name: internal-api-secret
type: Opaque
stringData:
INTERNAL_API_TOKEN: <set-strong-random-value>
---
apiVersion: v1
kind: Secret
metadata:
name: http-ingest-token-secret
type: Opaque
stringData:
HTTP_INGEST_TOKEN: <set-strong-random-token>
LZ_TOKENS: <comma-separated-or-json-token-list>
Notes
- Examples use
stringData
for readability. Kubernetes will encode to base64 on apply. If you preferdata:
, base64‑encode values first. Example:
bashprintf '%s' 'your_token_here' | base64
- Review URLs in
django-multimap
andmodule-multimap
for environment specifics.
Security note
- Treat
DJANGO_SECRET_KEY
,INTERNAL_API_TOKEN
,HTTP_INGEST_TOKEN
, andLZ_TOKENS
as sensitive credentials. Generate strong, random values and do not reuse across environments. Rotate regularly per security policy.