-
Bug
-
Resolution: Unresolved
-
Normal
-
None
-
4.18.0
-
None
-
Moderate
-
None
-
MON Sprint 259
-
1
-
False
-
Prometheus HTTP API provides POST endpoints to fetch metrics: https://prometheus.io/docs/prometheus/latest/querying/api/#instant-queries
Those endpoints are used in the go client: https://github.com/prometheus/client_golang/blob/main/api/prometheus/v1/api.go#L1438
So a viewer-only program/user relying on the go client, or using these POST endpoints to fetch metrics, currently needs to create an additional Role+Binding in that purpose [1]
It would be much more convenient if that permission was directly included in the existing cluster-monitoring-view role, since it's actually used for reading.
[1]Role+Binding example
kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: metrics rules: - verbs: - create apiGroups: - metrics.k8s.io resources: - pods --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: metrics subjects: - kind: User apiGroup: rbac.authorization.k8s.io name: test roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: metrics
[internal] cf slack discussion here https://redhat-internal.slack.com/archives/C0VMT03S5/p1724684997333529?thread_ts=1715862728.898369&cid=C0VMT03S5
- is related to
-
NETOBSERV-1856 Add metrics reading permission to netobserv-reader role
- Closed
- links to
-
RHEA-2024:6122 OpenShift Container Platform 4.18.z bug fix update