Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MON-3379: Replace the oauth-proxy before thanos-querier with kube-rbac-proxy #2136

Merged
merged 1 commit into from Dec 7, 2023

Conversation

raptorsun
Copy link
Contributor

@raptorsun raptorsun commented Oct 26, 2023

Ready to review and merge 🥳

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount autoapprover kcli-infra
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Oct 26, 2023
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Oct 26, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Work In Progress, Do not merge.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 26, 2023
@raptorsun raptorsun force-pushed the MON-3379 branch 2 times, most recently from bd85d0f to edbe951 Compare November 5, 2023 17:39
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 6, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Work In Progress, Do not merge.

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@raptorsun raptorsun force-pushed the MON-3379 branch 3 times, most recently from f0dc752 to 6b96382 Compare November 7, 2023 22:28
@raptorsun raptorsun changed the title MON-3379: Replace the oauth-proxy before thanos-querier with kube-rbac-proxy [WIP] MON-3379: Replace the oauth-proxy before thanos-querier with kube-rbac-proxy Nov 8, 2023
@raptorsun raptorsun changed the title MON-3379: Replace the oauth-proxy before thanos-querier with kube-rbac-proxy [WIP] MON-3379: Replace the oauth-proxy before thanos-querier with kube-rbac-proxy Nov 8, 2023
@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label Nov 8, 2023
@raptorsun raptorsun force-pushed the MON-3379 branch 4 times, most recently from ec9abfe to d1072dc Compare November 9, 2023 08:32
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 9, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Work In Progress, Do not merge.

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 9, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Work In Progress, Do not merge.

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount autoapprover kcli-infra
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 9, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Work In Progress, Do not merge.

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount autoapprover kcli-infra
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@raptorsun raptorsun force-pushed the MON-3379 branch 2 times, most recently from 5d85669 to 943a085 Compare November 9, 2023 16:09
@slashpai
Copy link
Member

/retest

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 10, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Work In Progress, Do not merge.

Liveness and readiness probe of thanos querier is back to use shell commands. kube-rbac-proxy does not allow using --allow-path and --ignore-path arguments at the same time.

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount autoapprover kcli-infra
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 10, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Work In Progress, Do not merge.

Liveness and readiness probe of thanos querier is back to use shell commands. kube-rbac-proxy does not allow using --allow-path and --ignore-path arguments at the same time.
Asking whether we can have them simultanously: brancz/kube-rbac-proxy#269

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount autoapprover kcli-infra
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@raptorsun
Copy link
Contributor Author

The failing e2e-aws-ovn test requires this fix openshift/origin#28393

- --tls-private-key-file=/etc/tls/private/tls.key
- --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
- --allow-paths=/api/v1/query,/api/v1/query_range,/api/v1/format_query,/api/v1/series,/api/v1/labels,/api/v1/label/*/values,/api/v1/query_exemplars,/api/v1/targets,/api/v1/rules,/api/v1/alerts,/api/v1/targets/metadata,/api/v1/metadata,/api/v1/alertmanagers,/api/v1/status/*
- -v=10
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

remove this before merging.

@Tai-RedHat
Copy link

@raptorsun is this PR ready for test?

@raptorsun raptorsun force-pushed the MON-3379 branch 3 times, most recently from 48b9230 to be7c141 Compare November 30, 2023 08:06
@raptorsun
Copy link
Contributor Author

Using dedicated service account for each access test in TestMonitoringApiRoles works well :D
Thank you very much @simonpasquier
The verbose output from kube-rbac-proxy is removed.
Ready to review and merge now.

@raptorsun
Copy link
Contributor Author

/test e2e-agnostic-operator

t.Cleanup(func() {
err := cf()
if err != nil {
t.Fatal(err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would rather log because the last run failed on this line

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yup, will add a log here.
Last run failed due to a connection reset issue. It may takes too long to delete the namespace.

@simonpasquier
Copy link
Contributor

@simonpasquier
Copy link
Contributor

/test e2e-agnostic-operator

@raptorsun
Copy link
Contributor Author

https://github.com/project-koku/koku-metrics-operator/ is also impacted

(see https://github.com/project-koku/koku-metrics-operator/blob/3b413d32ca4311cfb497e2cdbb495a9c50e782dc/controllers/prometheus.go#L130)

I have submitted a PR to update the koku-metrics-operator, hoping it can help avoid interrupting the operator's function with our change in CMO.
project-koku/koku-metrics-operator#240

@raptorsun
Copy link
Contributor Author

project-koku/koku-metrics-operator#240 has been merged. koku operator will not be interrupted after the proxy replacement.

@jan--f
Copy link
Contributor

jan--f commented Dec 7, 2023

Pending Simons last comments, this looks good to me.
/label docs-approved
/label px-approved
/label qe-approved
Adding labels for an internal change that should not impact users.

@openshift-ci openshift-ci bot added docs-approved Signifies that Docs has signed off on this PR px-approved Signifies that Product Support has signed off on this PR qe-approved Signifies that QE has signed off on this PR labels Dec 7, 2023
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Dec 7, 2023

@raptorsun: This pull request references MON-3379 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "4.15.0" version, but no target version was set.

In response to this:

Ready to review and merge 🥳

✅ Service accounts able to access Thanos Querier web port:

Type Name Namespace
Group system:cluster-admins
Group system:masters
ServiceAccount authentication-operator openshift-authentication-operator
ServiceAccount autoapprover kcli-infra
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-storage-operator openshift-cluster-storage-operator
ServiceAccount default openshift-cluster-version
ServiceAccount default openshift-network-operator
ServiceAccount etcd-operator openshift-etcd-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount installer-sa openshift-kube-apiserver
ServiceAccount installer-sa openshift-kube-controller-manager
ServiceAccount installer-sa openshift-kube-scheduler
ServiceAccount kube-apiserver-operator openshift-kube-apiserver-operator
ServiceAccount kube-controller-manager-operator openshift-kube-controller-manager-operator
ServiceAccount kube-storage-version-migrator-operator openshift-kube-storage-version-migrator-operator
ServiceAccount kube-storage-version-migrator-sa openshift-kube-storage-version-migrator
ServiceAccount localhost-recovery-client openshift-kube-apiserver
ServiceAccount localhost-recovery-client openshift-kube-controller-manager
ServiceAccount localhost-recovery-client openshift-kube-scheduler
ServiceAccount machine-config-operator openshift-machine-config-operator
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount oauth-openshift openshift-authentication
ServiceAccount olm-operator-serviceaccount openshift-operator-lifecycle-manager
ServiceAccount openshift-apiserver-operator openshift-apiserver-operator
ServiceAccount openshift-apiserver-sa openshift-apiserver
ServiceAccount openshift-config-operator openshift-config-operator
ServiceAccount openshift-controller-manager-operator openshift-controller-manager-operator
ServiceAccount openshift-kube-scheduler-operator openshift-kube-scheduler-operator
ServiceAccount prometheus-adapter openshift-monitoring
ServiceAccount prometheus-k8s openshift-monitoring
ServiceAccount prometheus-operator openshift-monitoring
ServiceAccount prometheus-operator openshift-user-workload-monitoring
ServiceAccount service-ca-operator openshift-service-ca-operator
ServiceAccount thanos-ruler openshift-user-workload-monitoring
User system:admin

⛔ Service accounts that used to be able to access Thanos Querier web port but no longer accessible now:

Type Name Namespace
Group system:cluster-readers
Group system:multus
Group system:nodes
Group system:ovn-nodes
ServiceAccount aws-ebs-csi-driver-operator openshift-cluster-csi-drivers
ServiceAccount build-controller openshift-infra
ServiceAccount cloud-credential-operator openshift-cloud-credential-operator
ServiceAccount cluster-autoscaler openshift-machine-api
ServiceAccount cluster-cloud-controller-manager openshift-cloud-controller-manager-operator
ServiceAccount cluster-image-registry-operator openshift-image-registry
ServiceAccount cluster-monitoring-operator openshift-monitoring
ServiceAccount cluster-samples-operator openshift-cluster-samples-operator
ServiceAccount default-rolebindings-controller openshift-infra
ServiceAccount dns-operator openshift-dns-operator
ServiceAccount gather openshift-insights
ServiceAccount generic-garbage-collector kube-system
ServiceAccount ingress-operator openshift-ingress-operator
ServiceAccount installer-sa openshift-etcd
ServiceAccount multus openshift-multus
ServiceAccount multus-ancillary-tools openshift-multus
ServiceAccount namespace-controller kube-system
ServiceAccount namespace-security-allocation-controller openshift-infra
ServiceAccount network-diagnostics openshift-network-diagnostics
ServiceAccount oauth-apiserver-sa openshift-oauth-apiserver
ServiceAccount openshift-controller-manager-sa openshift-controller-manager
ServiceAccount openshift-kube-scheduler-sa openshift-kube-scheduler
ServiceAccount operator openshift-insights
ServiceAccount origin-namespace-controller openshift-infra
ServiceAccount ovn-kubernetes-controller openshift-ovn-kubernetes
ServiceAccount podsecurity-admission-label-syncer-controller openshift-infra
ServiceAccount privileged-namespaces-psa-label-syncer openshift-infra
ServiceAccount prometheus-user-workload openshift-user-workload-monitoring
ServiceAccount template-instance-controller openshift-infra
ServiceAccount template-instance-finalizer-controller openshift-infra
User system:kube-controller-manager
User system:kube-scheduler

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@raptorsun
Copy link
Contributor Author

raptorsun commented Dec 7, 2023

Thank you very much for reviewing @simonpasquier @jan--f
both comments have been addressed. please have a look again =)

Copy link
Contributor

@simonpasquier simonpasquier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Dec 7, 2023
Copy link
Contributor

openshift-ci bot commented Dec 7, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: raptorsun, simonpasquier

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [raptorsun,simonpasquier]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@raptorsun
Copy link
Contributor Author

@raptorsun is this PR ready for test?

This PR is ready to test now :)

@openshift-merge-bot openshift-merge-bot bot merged commit 8b657e3 into openshift:master Dec 7, 2023
16 of 17 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. docs-approved Signifies that Docs has signed off on this PR jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. px-approved Signifies that Product Support has signed off on this PR qe-approved Signifies that QE has signed off on this PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants