-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PoC: Metrics Access Control #1066
Comments
Update from 13th December Myself, @adam-cattermole and @R-Lawton were investigating some metrics access control to satisfy this use case |
Notes from some follow up work on 16th Dec I set up a couple users in a cluster, and a new gateway. curl -k --write-out '%{http_code}\n' --silent --output /dev/null https://testuser01.dm.hcpapps.net/cars
curl -k --write-out '%{http_code}\n' --silent --output /dev/null https://testuser02.dm.hcpapps.net/cars Few things I've noticed so far.
The label proxy replaces the namespace label on queries with whatever is set in the project dropdown. ... if you try set the namespace differently than the project selector, you get this error If we have a label proxy that enforces an exported_namespace label, metricRelabelings:
- sourceLabels: ["destination_service_namespace"]
targetLabel: "exported_namespace"
action: replace we might be able to get some sort of tenancy working. |
Use Case
As a platform administrator, I want to allow Team A to access only the metrics and views for their own APIs/HTTPRoutes.
Tools:
Approach:
prom-label-proxy between kube-rbac-proxy and Thanos to enforce label-based access control
The text was updated successfully, but these errors were encountered: