Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Query RBAC #4534

Open
pavolloffay opened this issue Jan 9, 2025 · 2 comments
Open

Query RBAC #4534

pavolloffay opened this issue Jan 9, 2025 · 2 comments

Comments

@pavolloffay
Copy link
Contributor

Is your feature request related to a problem? Please describe.

I would like to define fine grained query RBAC - e.g. show only spans/traces from Kubernetes namespaces which user can access.

Describe the solution you'd like

Enable RBAC on Tempo backend.

Describe alternatives you've considered

Implement a proxy that would enforce RBAC.

Additional context

@joe-elliott
Copy link
Member

Can you share any more details to help us work on this feature? i.e. Is it important that this feature works on span and resource level? Are you expecting a mapping of tenants to allowed labels? How would you expect the data returned from the various APIs to be impacted by the configuration?

@pavolloffay
Copy link
Contributor Author

A couple of thoughts

  • both span and resource attributes should be masked if a user should not have access to that data
  • on kubernetes we would like to use a single tenant on Tempo, but then mask data if a specific cluster user does not have access to a particular namespace where a span was creted
  • the returned trace should have the original structure, e.g. spans should not be removed only span/resource attributes
  • by default all attributes should be removed which could be overridden by whitelist configuration (e.g. keep service name or errors)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants