Uploaded image for project: 'OpenShift Monitoring'
  1. OpenShift Monitoring
  2. MON-3700

Replace oauth-proxy container with kube-rbac-proxy in ThanosRuler


    • Icon: Task Task
    • Resolution: Done
    • Icon: Critical Critical
    • None
    • None
    • Thanos
    • None
    • MON Sprint 251
    • 0

      In CMO, ThanosRuler pods have an Oauth-proxy on port 9091 for web access on all paths.

      We are going to replace it with kube-rbac-proxy and constraint the access to /api/v1 paths. 

      The current behavior is to allow access to the ThanosRuler web server for any user having "get" access to "namespace" resources. We do not have to keep the same logic but have to make sure no regression happen. We may need use a stub custom resource to authorize both "post" and "get" HTTP requests from certain users.


            spasquie@redhat.com Simon Pasquier
            hasun@redhat.com Haoyu Sun
            0 Vote for this issue
            2 Start watching this issue