-
Task
-
Resolution: Done
-
Undefined
-
Logging 5.9.0
-
None
-
8
-
False
-
None
-
False
-
NEW
-
OBSDA-527 - Enable Grafana support for cloud providers in Loki
-
VERIFIED
-
Release Note Not Required
-
-
-
Log Storage - Sprint 248, Log Storage - Sprint 249, Log Storage - Sprint 250
Description
As a LokiStack administrator I want to configure LokiStack object storage secret to using Azure Workload Identity Federation service to control access to object storage.
Acceptance Criteria
- The LokiStack administrator can configure the required parameters (client_id, subscription_id, tenant_id, federated_token_file) for WIF in the Azure object storage secret.
- The LokiStack adminitrator is required to provide a value for federated_token_file to be mounted as credential_source.file in the Loki containers.
Developer Notes
- Expand the LokiStack Azure Object Storage Secret Docs to explain on how to use Azure WIF.
- According Loki's AzureBlobStorageClient implementation the values imported through the Azure Object Storage secret need to be inject to Loki via environment variables because it supports Azure WIF only via a boolean flag use_federated_token set to true:
- The field client_id from the Azure Object Storage secret needs to be injected into Loki containers as AZURE_CLIENT_ID
- The field tenant_id from the Azure Object Storage secret needs to be injected into Loki containers as AZURE_TENANT_ID
- The field federated_token_file from the Azure Object Storage secret needs to be injected into Loki containers as AZURE_FEDERATED_TOKEN_FILE
- The value of federated_token_file is required to be mounted as projected volume from the object storage secret.