-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Log-Receiver: Implementation #3568
Comments
Coming from the investigation here #3567 the implementation now is to:
Regarding security, after some discussions with Zach at the onsite, considering that we cannot have workload identity now, we could make sure the ingress uses OIDC with the customer's SSO so they would have to make sure their app as the permission to write to our endpoint :) @giantswarm/team-atlas this is a lot easier than the original implementation and also more secure than API keys. Are you fine with it so we can start the implementation? |
Waiting for initial PRs to be approved: |
Pushing to collection manually because architect is broken: giantswarm/architect-orb#555 |
Well, collections do not allow us to deploy an app with a different name https://gigantic.slack.com/archives/C02GDJJ68Q1/p1726752552645969 |
Blocked by #3682 |
Let's unblock us with this hack for now https://github.com/giantswarm/alloy-gateway-app This application actually deploys an App Cr named observability-gateway which is actually an instance of Alloy the same way alloy-rules is deployed in prometheus-rules |
Well, i'm blocked again https://gigantic.slack.com/archives/C02GDJJ68Q1/p1727272307578759 :D |
Current configuration PR is here https://github.com/giantswarm/shared-configs/pull/158 This is being tested on grizzly but the This does not really prevents us from enabling the gateway if we set a random tenant like external for all external logs using the following stage:
|
Alright so I managed to make this work by using I don't know how many hacks :D Gateway configuration
Oauth2-proxyIt needs to be redeployed ... Config (I'm not sure what all those fields even do though)
DexDex configuration needs to have a new redirect URI configured for hte gateway, this will require some changes in mc-bootstrap and in configs to change the secret value ... A little hack to be able to generate a token with dex https://mac-blog.org.ua/dex-between-services/ (edit the dex secret in the giantswarm namespace) AlloyUpstream PR has been merged but we will need to wait for the helm chart to be released upstream before we can really provide it. Useful link: https://developer.okta.com/blog/2022/07/14/add-auth-to-any-app-with-oauth2-proxy |
Great Job! That was a beast of a story, huh? |
I'm bringing this up this morning because I have doubts about oauth 😅
Le mar. 8 oct. 2024, 08:28, Dominik Kress ***@***.***> a
écrit :
… Great Job! That was a beast of a story, huh?
Are we happy with the result, even when it's a bit hacky, or should we
discuss if this actually meets our quality gate and if it's leading to lots
of maintaining pain in the future?
—
Reply to this email directly, view it on GitHub
<#3568 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAVIRXEWE3UX7VYWKXJJCJDZ2N3RJAVCNFSM6AAAAABKU7G672VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGOJYHE2TQNZWHE>
.
You are receiving this because you were assigned.Message ID:
***@***.***>
|
Current wip:
We are waiting on customer feedback to know if they would be able to support oauth. If they are, we will need to change the oauth2-proxy config towards the customer's OIDC provider @Rotfuks any news on this? |
Alloy released upstream and in the gateway giantswarm/alloy-gateway-app#12 (review) |
Motivation
In order to enable customers to receive logs also from outside the installations we have to get our hands dirty and implement the thing we created a concept for in the investigation story.
Todo
Outcome
The text was updated successfully, but these errors were encountered: