Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-8321

Introduce Configuration Toggle to Enable or Disable Unauthenticated Access to Cluster-Version-Operator Metrics Port

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Major Major
    • None
    • openshift-4.19
    • updates
    • None
    • None
    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      1. Proposed title of this feature request:

      Introduce Configuration Toggle to Enable or Disable Unauthenticated Access to Cluster-Version-Operator Metrics Port

      2. What is the nature and description of the request:

      Introduce Configuration Toggle to Enable or Disable Unauthenticated Access to Cluster-Version-Operator Metrics Port
      https://access.redhat.com/solutions/7125964
      https://issues.redhat.com/browse/OCPBUGS-57585

      While certain users require the Cluster Version Operator metrics port to be secured with authorization for enhanced security, others need it to remain accessible without authentication to support external monitoring stacks. Introducing a configuration toggle would provide flexibility to accommodate both use cases, allowing administrators to enable or disable authorization as per their operational and security needs.

      3. Why does the customer need this? (List the business requirements here)

      When we exposed the master node on port 9099/metrics, it shows all the metrics details without authorization and this allows unauthenticated external access. BUG https://issues.redhat.com/browse/OCPBUGS-57585 is worked up to Disable Unauthenticated Access

      But for some users the update introduced in PR #1215 adds authorization to the /metrics endpoint of the Cluster Version Operator. Authorization is currently implemented by enforcing that the username must `match system:serviceaccount:openshift-monitoring:prometheus-k8s`.This implementation is highly restrictive, as it prevents other service accounts from accessing the endpoint. In environments where access to /metrics is required by additional service accounts such as grafana-agent, which is part of the existing metrics collection infrastructure this restriction results in a compatibility issue.The change introduces a breaking impact when upgrading from OpenShift 4.18 to 4.19, affecting deployments that depend on alternate service accounts for metrics scraping.

       

              rh-ee-smodeel Subin M
              rhn-support-anisal Apurva Nisal
              None
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                None
                None