
The latest release of Kyma now utilizes SAP Identity Authentication Service IAS for authentication and Kubernetes Role Based Access Control (RBAC) to manage authorizations within the runtime. Kubernetes provides a number of resources, such as deployments, config maps, etc, that users interact with via the Kubernetes API. The API itself can also be extended to provide additional functionality, this is how Kyma API Rules are provided. RBAC provides a mechanism to control the access of the resources of the Kubernetes API by providing verbs, read, create delete, that control user access to these resources.
Unfortunately Grafana is not part of or an extension of the Kuberenetes API, so it does not support the RBAC methodology. For this reason Grafana by default is not exposed externally, but there are a few options to do so. Most effortlessly, after setting up kubectl, you can use the port-forward feature of kubectl to access Grafana locally. You also have the option to configure your own custom SAP IAS tenant to manage the access using the provided Oauth2 Proxy. You can find the configuration steps for both of these methods within the help documentation. The Oauth2 Proxy also supports a number of other providers, such as Github, which can be used to manage access. The next sections will walk through this procedure.
GITHUB OAUTH
Start by creating a new OAuth Application and providing the values. You can find the cluster domain URL of your Kyma runtime on the main dashboard, listed under API Server Address, replace api with Grafana.
Application Name: Grafana
Homepage URL: https://grafana.<your cluster domain>.kyma.ondemand.com
Authorization callback URL: https://grafana.<your cluster domain>.kyma.ondemand.com/oauth2/callback
On the next screen choose the option to generate a new client secret
kubectl -n kyma-system create secret generic monitoring-auth-proxy-grafana-user \
--from-literal="OAUTH2_PROXY_CLIENT_ID=<your client id>" \
--from-literal="OAUTH2_PROXY_CLIENT_SECRET=<your client secret>" \
--from-literal="OAUTH2_PROXY_PROVIDER=github" \
--from-literal="OAUTH2_PROXY_GITHUB_USER=<your email address>" \
--from-literal="OAUTH2_PROXY_SKIP_PROVIDER_BUTTON=true"
kubectl -n kyma-system rollout restart deployment monitoring-auth-proxy-grafana
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
15 | |
14 | |
13 | |
10 | |
9 | |
9 | |
8 | |
7 | |
7 | |
7 |