Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[TRACKING] Discuss access to falco namespace #5

Closed
incertum opened this issue Dec 19, 2023 · 9 comments
Closed

[TRACKING] Discuss access to falco namespace #5

incertum opened this issue Dec 19, 2023 · 9 comments
Labels

Comments

@incertum
Copy link
Contributor

Discuss options available to grant us access to our falco namespace.

For instance this would be needed to retrieve Falco's own native metrics (currently piped to a log rotated file under /tmp/stats/), but more importantly so that we can check if everything is fine.

We are open to discuss various options to achieve these goals. The access model could also evolve over time as more projects onboard and as Falco as the first project has reached a stable overall deployment config.

CC @nikimanoledaki

@incertum incertum added kind/feature New feature or request and removed needs-kind labels Dec 19, 2023
@poiana
Copy link

poiana commented Dec 19, 2023

There is not a label identifying the kind of this issue.
Please specify it either using /kind <group> or manually from the side menu.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@nikimanoledaki
Copy link
Contributor

We are creating a read/get/list-only Role / ServiceAccount / scoped kubeconfig as part of this issue: cncf-tags/green-reviews-tooling#18

WDYT?

@incertum
Copy link
Contributor Author

We could benefit from pods/exec resource and exec verb in order to kubectl cp the small files that contain our custom internal metrics. Open to any other approach.

@maxgio92 @leogr @LucaGuerra would you have other ideas?

@maxgio92
Copy link
Member

Hi all, are those files required @incertum?
I like the idea to keep minimum privileges @nikimanoledaki

@incertum
Copy link
Contributor Author

Without having access to the internal metrics we write to files, I am not sure how to check on the kernel event rates and other metrics. Perhaps down the road we can expose them in a better way, such as over Prometheus, but Falco does not have a Prometheus exporter quite yet.

One possibility could be to grant us such access until the CNCF testbed is more established and we have implemented a metrics Prometheus exporter? Or we defer inspecting the internal Falco metrics until we have everything in place -- equally valid.

@nikimanoledaki nikimanoledaki moved this from Backlog to In Progress in TAG-Environmental-Sustainability Jan 30, 2024
@rossf7
Copy link
Contributor

rossf7 commented Jan 30, 2024

Hi @incertum,
ideally we would query the metrics from Prometheus but until there is an exporter available we can get you access to these log files.

I'll create a separate kubeconfig and service account that also has the pods/exec resource and exec verb based on the readonly kubeconfig we already have.

https://github.com/cncf-tags/green-reviews-tooling/blob/main/docs/read-only-kubeconfig.md

and we'll provide access via 1Password once we have our account setup.

cncf-tags/green-reviews-tooling#37

cc @nikimanoledaki @AntonioDiTuri

@AntonioDiTuri
Copy link

Maybe to while waiting for the 1Password account we could share privately the new kubeconfig so that Melissa is able to check. What do you think?

@incertum
Copy link
Contributor Author

incertum commented Feb 7, 2024

Thank you @AntonioDiTuri confirming that I have received the interim kubeconfig and it is all working.

@incertum
Copy link
Contributor Author

incertum commented Feb 7, 2024

I think we can mark this issue as completed. Once we have all metrics exposed over Prometheus we will revoke my interim admin access and reduce the access scope as discussed above. We all agreed on the ideal end state.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

6 participants