services/keycloak
Keycloak is deployed via raw manifests and backed by the shared Postgres (postgres-service.postgres.svc.cluster.local:5432). Create these secrets before applying:
# DB creds (per-service DB/user in shared Postgres)
kubectl -n sso create secret generic keycloak-db \
--from-literal=username=keycloak \
--from-literal=password='<DB_PASSWORD>' \
--from-literal=database=keycloak
# Admin console creds (maps to KC admin user)
kubectl -n sso create secret generic keycloak-admin \
--from-literal=username=brad@bstein.dev \
--from-literal=password='<ADMIN_PASSWORD>'
Apply:
kubectl apply -k services/keycloak
Notes
- Service:
keycloak.sso.svc:80(Ingresssso.bstein.dev, TLS via cert-manager). - Uses Postgres schema
public; DB/user should be provisioned in the shared Postgres instance. - Health endpoints on :9000 are wired for probes.