Skip to content

Commit

Permalink
Merge pull request #6 from brancz/extend-readme
Browse files Browse the repository at this point in the history
Extend readme
  • Loading branch information
openshift-merge-robot committed Feb 19, 2019
2 parents 25cad3e + 8bf56ba commit 46423f9
Show file tree
Hide file tree
Showing 3 changed files with 35 additions and 17 deletions.
42 changes: 30 additions & 12 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,19 +2,37 @@

The prom-label-proxy enforces a given label in a given PromQL proxy.

This proxy does not perform authentication or authorization, this has to happen
before the request reaches this proxy. The
[kube-rbac-proxy](https://github.com/brancz/kube-rbac-proxy) is an example for
such an additional building block.

This proxy does not perform authentication or authorization, this has to happen before the request reaches this proxy. The [kube-rbac-proxy](https://github.com/brancz/kube-rbac-proxy) is an example for such an additional building block.

Risks outside the scope of this project:

- If a tenant controls its scrape target configuration the tenant can set
arbitrary labels via its relabelling configuration, thereby being able to
pollute other tenant's metrics.
- If a tenant controls its scrape target configuration the tenant can set arbitrary labels via its relabelling configuration, thereby being able to pollute other tenant's metrics.

- If the ingestion configuration [honor_labels](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#scrape_config) is set for a tenant's target, that target can pollute other tenant's metrics as Prometheus respects any labels exposed by the target.

## How does this project work?

What this proxy does is it proxies the `/federate`, `/api/v1/query`, `/api/v1/query_range` prometheus endpoints and ensures that a particular label is enforced in the particular query.

In the case of the federate endpoint, it ensures that all selectors passed as matchers to the federate endpoint _must_ contain that exact match of the particular label (and throws away all other matchers for the label). For the two query endpoints, it parses the PromQL expression and modifies all selectors in the same way. The label-key is configured as a flag on the binary and label-value is passed as a query parameter.

For example, if requesting the PromQL query

```
http_requests_total{namespace=~"a.*"}
```

and specifying the namespace label must be enforced to `b`, then the query will be re-written to


```
http_requests_total{namespace="b"}
```

This is enforced for any case, whether a label matcher is specified in the original query or not.

Once again for clarity: this project only enforces a particular label in the respective calls to Prometheus, it in itself does not authenticate or authorize the requesting entity in any way, this has to be built around this project.

## Example use

- If the ingestion configuration
[honor_labels](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#scrape_config)
is set for a tenant's target, that target can pollute other tenant's metrics
as Prometheus respects any labels exposed by the target.
The concrete setup being shipped in OpenShift starting with 4.0: the proxy is configured to work with the label-key: namespace. In order to ensure that this is secure is it paired with the [kube-rbac-proxy](https://github.com/brancz/kube-rbac-proxy) and its URL rewrite functionality, meaning first ServiceAccount token authentication is performed, and then the kube-rbac-proxy authorization to see whether the requesting entity is allowed to retrieve the metrics for the requested namespace. The RBAC role we chose to authorize against is the same as the Kubernetes Resource Metrics API, the reasoning being, if an entity can `kubectl top pod` in a namespace, it can see cAdvisor metrics (container_memory_rss, container_cpu_usage_seconds_total, etc.).
6 changes: 3 additions & 3 deletions examples/deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -55,9 +55,9 @@ data:
byQueryParameter:
name: "namespace"
resourceAttributes:
apiVersion: v1
resource: node
subresource: metrics
apiVersion: v1beta1
apiGroup: metrics.k8s.io
resource: pods
namespace: "{{ .Value }}"
---
apiVersion: extensions/v1beta1
Expand Down
4 changes: 2 additions & 2 deletions examples/rbac.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,8 @@ kind: Role
metadata:
name: prom-label-proxy-client
rules:
- apiGroups: [""]
resources: ["node/metrics"]
- apiGroups: ["metrics.k8s.io/v1beta1"]
resources: ["pods"]
verbs: ["get"]
---
apiVersion: rbac.authorization.k8s.io/v1beta1
Expand Down

0 comments on commit 46423f9

Please sign in to comment.