-
Task
-
Resolution: Done
-
Critical
-
None
-
None
-
None
-
3
-
False
-
None
-
False
-
NEW
-
NEW
-
-
-
MON Sprint 246, MON Sprint 249
In CMO, Prometheus pods have an Oauth-proxy on port 9091 for web access on all paths.
We are going to replace it with kube-rbac-proxy and constraint the access to /api/v1 paths.
The current behavior is to allow access to the Prometheus web server for any user having "get" access to "namespace" resources. We do not have to keep the same logic but have to make sure no regression happen. We may need use a stub custom resource to authorize both "post" and "get" HTTP requests from certain users.
The insight component is using this port, figure out how to keep its access after replacing the Oauth proxy https://github.com/openshift/insights-operator/blob/master/pkg/controller/const.go
Its service account "gather" and "operator" should use the prometheus endpoint. https://redhat-internal.slack.com/archives/CLABA9CHY/p1701345127689009
- is depended on by
-
MON-3701 Clean up oauth-proxy references from CMO code base
- Closed
- links to
1.
|
Pre-merge Testing | Closed | Tai Gao | ||
2.
|
E2E Automation | Closed | Tai Gao | ||
3.
|
CI Integration | Closed | Tai Gao |