Uploaded image for project: 'Observability Documentation'
  1. Observability Documentation
  2. OBSDOCS-617

Avoid endorsing the use of UWM Prometheus ServicAccount to access metrics

XMLWordPrintable

    • 5
    • False
    • Hide

      None

      Show
      None
    • False

      rhn-support-sreber found that in https://docs.openshift.com/container-platform/4.13/monitoring/enabling-monitoring-for-user-defined-projects.html#accessing-metrics-from-outside-cluster_enabling-monitoring-for-user-defined-projects we encourage the use of the UWM Prometheus ServicAccount token to access thanos-querier web's port (access metrics of all namespaces).

       

      Doing so:

      • Encourages user impersonation
      • Makes use of a powerful token (Prometheus ServicAccount can do anything on secrets cluster wide e.g.)
      • Makes use of a permanent token

      After some digging, it turned out, that section was extracted from a KCS https://github.com/openshift/openshift-docs/pull/31500 and wasn't revisited since then.

      Given the config of the proxy, a token with the cluster-monitoring-view permission will be able to query that API (tests confirmed that), so why no ask for a human role that will have that permission.

      Maybe we can move that section into https://docs.openshift.com/container-platform/4.13/monitoring/accessing-third-party-monitoring-apis.html

      And talk also about the tenancy port in there, for now there is a KCS for that https://access.redhat.com/solutions/7002863

      for context: https://redhat-internal.slack.com/archives/C0VMT03S5/p1697450846786499

       

              rhn-support-bburt Brian Burt
              rh-ee-amrini Ayoub Mrini
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: