`istio.hardened.customAuthorizationPolicies` inputs are ignored due to missing template file
Bug
Description
As far as I can tell, no template exists to make use of istio.hardened.customAuthorizationPolicies in the elasticsearch-kibana package. As a result, any list supplied here by users is ignored and the policies are not created.
Based on the README, my expectation is that something akin to this example from the fluentbit chart would exist in this chart. eck-operator also has a file like this.
My use case is that I have an application that I would like to permit to write data into ES, but I have Istio hardening enabled so I need to add an AuthorizationPolicy to permit the traffic. When I attempted to use the values listed in the README to do so, no auth policy was created.