`istio.hardened.customAuthorizationPolicies` inputs are ignored due to missing template file
Bug
Description
As far as I can tell, no template exists to make use of istio.hardened.customAuthorizationPolicies
in the elasticsearch-kibana
package. As a result, any list supplied here by users is ignored and the policies are not created.
Based on the README, my expectation is that something akin to this example from the fluentbit
chart would exist in this chart. eck-operator
also has a file like this.
My use case is that I have an application that I would like to permit to write data into ES, but I have Istio hardening enabled so I need to add an AuthorizationPolicy to permit the traffic. When I attempted to use the values listed in the README to do so, no auth policy was created.