If you’re using SUNK, you may want to manage user accounts using an external directory service. This guide will show you how to connect SUNK to a directory service for seamless user management.Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisite: Set up a Kubernetes Secret
Google Secure LDAP users should skip this step and follow the instructions in that section to create the Secret using a TLS certificate instead.
Create a Kubernetes Secret
First, create a Kubernetes Secret that contains the configuration for your directory service. The Secret must meet the following criteria:- The key name in the Secret must end with
.conf. - The Secret’s data should include a full and correct SSSD configuration snippet. This snippet must include the domain and
ldap_default_authtokparameter. This is not a user password.
YourCredentialsHere with the actual credentials for your directory service.
In the example above, the name of the Secret is bind-user-sssd-config.
We also added a secret key with the ldap-password.conf parameter and inserted the SSSD configuration snippet within.
Reference the Secret in values.yaml
Next, you’ll need to update Slurm’s values.yaml file to reference the Secret you just created.
Add the name of your Secret to the existingSecret field.
Add the secret key to the existingSecretFileName field.
Ensure that the values in these fields match your created Secret exactly.
The following example uses the Secret name and secret key that we created in the previous step:
Create a Secret for Google Secure LDAP
If you want to use Google Secure LDAP, follow Google’s instructions to add a new LDAP client. You’ll need to generate certificates and download them as part of the setup. Then, run the following command to create a Kubernetes Secret of typetls using the certificate files you downloaded:
[YOUR-CERTIFICATE].crt and [YOUR-PRIVATE-KEY].key with your downloaded certificate and key.
Modify values.yaml to include the Google Secure LDAP configuration in the directoryService section:
Enable SSH with Google Secure LDAP (Optional)
To let users sign in using an SSH key, you’ll need to add a multi-value attribute to your Google directory. Follow the Google guide to create a custom attribute namedsshPublicKey.
For each user, enter their SSH public key into the sshPublicKey attribute field.
Google’s custom attribute values have a 500-character limit, so using a shorter key type like
ssh-ed25519 is recommended.Example: Active Directory
Example: OpenLDAP
Example: Authentik
General Directory Service configuration
For general configuration, see these keys in thedirectoryService section of values.yaml.
Directory Service-specific configuration
Each named directory service has its own configuration section. See these keys in thedirectoryService.directories[*] section of values.yaml.