Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PoC: Metrics Access Control #1066

Open
david-martin opened this issue Dec 3, 2024 · 0 comments
Open

PoC: Metrics Access Control #1066

david-martin opened this issue Dec 3, 2024 · 0 comments

Comments

@david-martin
Copy link
Member

Use Case

As a platform administrator, I want to allow Team A to access only the metrics and views for their own APIs/HTTPRoutes.

  • Enables secure App/API Developer dashboards and visualizations
  • Will likely be a component that encompasses/manages the kube-rbac-proxy and prom-label-proxy components. It would be configured with the location of metrics & permissions to read all metrics.

Tools:

Approach:

  • kube-rbac-proxy in front of Thanos Query to handle authentication and authorization
    prom-label-proxy between kube-rbac-proxy and Thanos to enforce label-based access control
  • Add namespace labels to metrics emitted by shared components (Istio Gateway, Kuadrant) to identify the originating namespace.
  • In istio metrics, this would be the destination_service_namepsace label on istio_requests_total metric
  • Verify that we can expose a Prometheus data source that filters shared Istio metrics based on user permissions
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: No status
Development

No branches or pull requests

1 participant