-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[TRACKING] Discuss access to falco
namespace
#5
Comments
There is not a label identifying the kind of this issue. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
We are creating a read/get/list-only Role / ServiceAccount / scoped kubeconfig as part of this issue: cncf-tags/green-reviews-tooling#18 WDYT? |
We could benefit from @maxgio92 @leogr @LucaGuerra would you have other ideas? |
Hi all, are those files required @incertum? |
Without having access to the internal One possibility could be to grant us such access until the CNCF testbed is more established and we have implemented a metrics Prometheus exporter? Or we defer inspecting the internal Falco metrics until we have everything in place -- equally valid. |
Hi @incertum, I'll create a separate kubeconfig and service account that also has the https://github.com/cncf-tags/green-reviews-tooling/blob/main/docs/read-only-kubeconfig.md and we'll provide access via 1Password once we have our account setup. |
Maybe to while waiting for the 1Password account we could share privately the new kubeconfig so that Melissa is able to check. What do you think? |
Thank you @AntonioDiTuri confirming that I have received the interim kubeconfig and it is all working. |
I think we can mark this issue as completed. Once we have all metrics exposed over Prometheus we will revoke my interim admin access and reduce the access scope as discussed above. We all agreed on the ideal end state. |
Discuss options available to grant us access to our
falco
namespace.For instance this would be needed to retrieve Falco's own native metrics (currently piped to a log rotated file under
/tmp/stats/
), but more importantly so that we can check if everything is fine.We are open to discuss various options to achieve these goals. The access model could also evolve over time as more projects onboard and as Falco as the first project has reached a stable overall deployment config.
CC @nikimanoledaki
The text was updated successfully, but these errors were encountered: