Uploaded image for project: 'Network Observability'
  1. Network Observability
  2. NETOBSERV-166

Multitenancy support in Network Observability for project admins

    • Multitenancy support in Network Observability
    • False
    • False
    • To Do
    • OCPSTRAT-386 - Multitenancy support in Network Observability for project admins
    • OCPSTRAT-386Multitenancy support in Network Observability for project admins
    • 0% To Do, 0% In Progress, 100% Done
    • XL

      • Provide NetFlow table, networking dashboard and other UI features by tenant
      • A user of a tenant can only see their data by way of RBAC and role binding
      • Multi-tenancy is achieved via namespaces segregation. A user having access to namespace X can get flows where source or destination (or both) are from that namespace. Thus, it also includes flows coming from another namespace, or going to another namespace, as long as the allowed namespace is involved.

      Multi-tenancy in this context does only target project admins, ie. users having access to the Admin perspective of the Console but who are restricted in the namespaces they can see.

      Implementing netobserv for the developer perspective is the purpose of a follow-up epic: NETOBSERV-163 Network Observability for Developer as the means of restricting access is through projects (namespaces).

        1.
        Docs Tracker Sub-task Closed Undefined Unassigned
        2.
        QE Tracker Sub-task Closed Undefined Unassigned
        3.
        TE Tracker Sub-task Closed Undefined Unassigned

            jtakvori Joel Takvorian
            stlee@redhat.com Steven Lee
            Amogh Rameshappa Devapura Amogh Rameshappa Devapura
            Sara Thomas Sara Thomas
            Votes:
            0 Vote for this issue
            Watchers:
            7 Start watching this issue

              Created:
              Updated:
              Resolved: