You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight-aks/trino/configure-ingress.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,20 +23,20 @@ This article describes how to expose Apache Superset to the Internet.
23
23
24
24
## Setup ingress
25
25
26
-
The following instructions add a second layer of authentication in the form of an Oauth authorization proxy using Oauth2Proxy. This layer means that no unauthorized clients reach the Superset application.
26
+
The following instructions add a second layer of authentication in the form of an OAuth authorization proxy using Oauth2Proxy. This layer means that no unauthorized clients reach the Superset application.
27
27
28
28
1. Add the following secrets to your Key Vault.
29
29
30
30
|Secret Name|Description|
31
31
|-|-|
32
-
|client-id|Your Azure service principal client ID. Oauth proxy requires this ID to be a secret.|
33
-
|oauth2proxy-redis-password|Proxy cache password. The password used by the Oauth proxy to access the back end Redis deployment instance on Kubernetes. Generate a strong password.|
32
+
|client-id|Your Azure service principal client ID. OAuth proxy requires this ID to be a secret.|
33
+
|oauth2proxy-redis-password|Proxy cache password. The password used by the OAuth proxy to access the back end Redis deployment instance on Kubernetes. Generate a strong password.|
34
34
|oauth2proxy-cookie-secret|32 character cookie secret, used to encrypt the cookie data. This secret must be 32 characters long.|
35
35
36
36
1. Add these callbacks in your Superset Azure AD application configuration.
@@ -157,7 +157,7 @@ The following instructions add a second layer of authentication in the form of a
157
157
objectName: oauth2proxy-redis-password
158
158
```
159
159
160
-
1. Create configuration for the Oauth Proxy.
160
+
1. Create configuration for the OAuth Proxy.
161
161
162
162
Update in the following yaml:
163
163
*`{{superset_hostname}}` - the internet facing hostname chosen in [hostname selection](#hostname-selection)
@@ -173,7 +173,7 @@ The following instructions add a second layer of authentication in the form of a
173
173
# due to the fact that it doesn't query an actual cluster
174
174
kubeVersion:
175
175
176
-
#Oauth client configuration specifics
176
+
#OAuth client configuration specifics
177
177
config:
178
178
# OAuth client secret
179
179
existingSecret: oauth2-secret
@@ -252,7 +252,7 @@ The following instructions add a second layer of authentication in the form of a
252
252
checkDeprecation: true
253
253
```
254
254
255
-
1. Deploy Oauth proxy resources.
255
+
1. Deploy OAuth proxy resources.
256
256
257
257
```bash
258
258
kubectl apply -f oauth2-secretprovider.yaml
@@ -283,14 +283,14 @@ The following instructions add a second layer of authentication in the form of a
283
283
284
284
1. Enter the DNS name label with the `<superset-instance-name>` defined in [hostname selection](#hostname-selection).
285
285
286
-
1. Verify that your ingress forOauth is configured.
286
+
1. Verify that your ingress forOAuth is configured.
287
287
288
288
Run `kubectl get ingress` to see the two ingresses created `azure-trino-superset` and `oauth2-oauth2-proxy`. The IP address matches the Public IP from the previous step.
289
289
290
290
Likewise, when running `kubectl get services` you should see that `ingress-nginx-controller` has been assigned an `EXTERNAL-IP`.
291
291
292
292
> [!TIP]
293
-
> You can open `http://{{superset_hostname}}/oauth2` to test that the Oauth path is working.
293
+
> You can open `http://{{superset_hostname}}/oauth2` to test that the OAuth path is working.
294
294
295
295
1. Define an ingress to provide access to Superset, but redirect all unauthorized calls to `/oauth`.
0 commit comments