Skip to content

Commit 72e6edd

Browse files
authored
Merge pull request #8199 from ovh/YC-fixes-20250722
IAM for LDP - fixes
2 parents f3ba9ee + dfd4f05 commit 72e6edd

File tree

8 files changed

+73
-47
lines changed

8 files changed

+73
-47
lines changed

pages/manage_and_operate/observability/logs_data_platform/iam_access_management/guide.en-gb.md

Lines changed: 71 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,21 @@ excerpt: A comprehensive guide to managing access rights for Logs Data Platform
44
updated: 2025-07-22
55
---
66

7-
> ![primary]
7+
<style>
8+
details>summary {
9+
color:rgb(33, 153, 232) !important;
10+
cursor: pointer;
11+
}
12+
details>summary::before {
13+
content:'\25B6';
14+
padding-right:1ch;
15+
}
16+
details[open]>summary::before {
17+
content:'\25BC';
18+
}
19+
</style>
20+
21+
> [!primary]
822
> IAM for Logs Data Platform will be available starting **17th September 2025**.
923
> The content of this documentation will be valid from this date.
1024
>
@@ -17,7 +31,7 @@ This guide provides instructions for configuring access rights on OVHcloud IAM t
1731

1832
- An [OVHcloud account](/pages/account_and_service_management/account_information/ovhcloud-account-creation)
1933
- Access to the [OVHcloud Control Panel](/links/manager)
20-
- A Logs Data Platform Account With [IAM enabled](/pages/manage_and_operate/observability/logs_data_platform/iam_presentation_faq).
34+
- A Logs Data Platform Account With [IAM enabled](/pages/manage_and_operate/observability/logs_data_platform/iam_presentation_faq)
2135

2236
## Policies and identities
2337

@@ -31,9 +45,9 @@ This section details how to configure local user/identity groups and policies to
3145

3246
### Create a group for local users
3347

34-
By default, the least privileged group available for local users is read-only over all the products of your account. If you would like to have an even more restricted account able to read only shared data from your Logs Data Platform, we advise you to create a group with the role **None** and attach your local users to it. In the OVHcloud Control Panel, navigate to `IAM`{.action} {.action} > `Identities`{.action} > `User groups` to create such a group.
48+
By default, the least privileged group available for local users is read-only over all the products of your account. If you would like to have an even more restricted account able to read only shared data from your Logs Data Platform, we advise you to create a group with the role **None** and attach your local users to it. In the OVHcloud Control Panel, navigate to `IAM`{.action} {.action} > `Identities`{.action} > `User groups`{.action} to create such a group.
3549

36-
![Create a group](images/create_group.png){.thumbnail}
50+
![Create a group](images/create_group01.png){.thumbnail}
3751

3852
You can then create a policy with the basic rights to access the OVHcloud Control Panel and attach it to the group. All your local users will be able to connect to the OVHcloud Control Panel. Navigate to `IAM`{.action} > `Policies`{.action} > `My Policies`{.action} to create this policy and attach it to the user group.
3953

@@ -88,7 +102,7 @@ One of the new feature available thanks to IAM is the ability to group sub-resou
88102
89103
To create a resource group, navigate to `IAM`{.action} > `Policies`{.action} > `Resource Groups`{.action}.
90104

91-
![Create Resource Group](images/create_rg.png){.thumbnail}
105+
![Create Resource Group](images/create_rg01.png){.thumbnail}
92106

93107
You need to select the product type (Dashboards, Streams, Alias, Index, OpenSearch Dashboards) and then select the specific resource you want to share.
94108

@@ -100,55 +114,67 @@ Similarly to the previous policy, you need to add your local user and you need t
100114

101115
![Create sub resource policy](images/policy_sub_product_types.png){.thumbnail}
102116

103-
> ![warning]
117+
> [!warning]
104118
> Do not add a Logs Data Platform service to this policy. If you do so it will transitively give access to all sub-resources of this service (ie all LDP items) to the local users/identities or groups attached to the policy. The previous service policy has been created to prevent this behaviour.
105119

106120
You can mix Resource Groups and specific resources in the same policy. All actions attached to the policy will be then be attached to all related sub-resources.
107121
You have several actions for each sub-resource type. For brevity, this guide will not detail all the actions available for all the items.
108122

109123
Here are some use cases of several rights which can all be together in one policy showcasing the complexity enabled by IAM policies. Actions starting with **ldp:apiovh** are actions related to OVHcloud APIs (thus the control panel UI). The other actions are related to their specific backend: Graylog or OpenSearch.
110124

111-
- These actions give an access in read-only to one or several indices:
112-
```yaml
113-
- ldp:apiovh:output/opensearch/index/get
114-
- ldp:apiovh:output/opensearch/index/url/get
115-
- ldp:opensearch:index/read
116-
```
117-
118-
![policy sub resource 2](images/carousel_policy_sub_2.png){.thumbnail}
119-
120-
- These actions allow to read and modify a Graylog Dashboard:
121-
```yaml
122-
- ldp:graylog:dashboard/update
123-
- ldp:apiovh:output/graylog/dashboard/get
124-
- ldp:apiovh:output/graylog/dashboard/url/get
125-
- ldp:graylog:dashboard/read
126-
```
127-
128-
![policy sub resource 1](images/carousel_policy_sub_1.png){.thumbnail}
129-
130-
- These actions allow to consult and create visualizations in one or several OpenSearch Dashboard instances:
131-
```yaml
132-
- ldp:opensearch:osd/update
133-
- ldp:apiovh:output/opensearch/osd/get
134-
- ldp:apiovh:output/opensearch/osd/url/get
135-
- ldp:opensearch:osd/get
136-
```
137-
138-
![policy sub resource 3](images/carousel_policy_sub_3.png){.thumbnail}
139-
140-
- These actions give a read-only access in both Graylog and the control panel to one or several streams:
141-
```yaml
142-
- ldp:apiovh:output/graylog/stream/get
143-
- ldp:apiovh:output/graylog/stream/url/get
144-
- ldp:graylog:stream/read
145-
```
146-
147-
![policy sub resource 4](images/carousel_policy_sub_4.png){.thumbnail}
125+
/// details | These actions give an access in read-only to one or several indices:
126+
127+
```yaml
128+
- ldp:apiovh:output/opensearch/index/get
129+
- ldp:apiovh:output/opensearch/index/url/get
130+
- ldp:opensearch:index/read
131+
```
132+
133+
![policy sub resource 0](images/carousel_policy_sub_0.png){.thumbnail}
134+
135+
///
136+
137+
/// details | These actions allow to read and modify a Graylog Dashboard:
138+
139+
```yaml
140+
- ldp:graylog:dashboard/update
141+
- ldp:apiovh:output/graylog/dashboard/get
142+
- ldp:apiovh:output/graylog/dashboard/url/get
143+
- ldp:graylog:dashboard/read
144+
```
145+
146+
![policy sub resource 1](images/carousel_policy_sub_1.png){.thumbnail}
147+
148+
///
149+
150+
/// details | These actions allow to consult and create visualizations in one or several OpenSearch Dashboard instances:
151+
152+
```yaml
153+
- ldp:opensearch:osd/update
154+
- ldp:apiovh:output/opensearch/osd/get
155+
- ldp:apiovh:output/opensearch/osd/url/get
156+
- ldp:opensearch:osd/get
157+
```
158+
159+
![policy sub resource 3](images/carousel_policy_sub_3.png){.thumbnail}
160+
161+
///
162+
163+
/// details | These actions give a read-only access in both Graylog and the control panel to one or several streams:
164+
165+
```yaml
166+
- ldp:apiovh:output/graylog/stream/get
167+
- ldp:apiovh:output/graylog/stream/url/get
168+
- ldp:graylog:stream/read
169+
```
170+
171+
![policy sub resource 4](images/carousel_policy_sub_4.png){.thumbnail}
172+
173+
///
148174

149175
Once the policy is created, the local user/identity will only see the related sub resource of the policy in its own control panel.
150176

151-
![local user control panel](images/local_user_control_panel.png){.thumbnail}
177+
![local user control panel](images/local_user_control_panel01.png){.thumbnail}
152178

153179
### Analyse your policy results
154180

@@ -167,7 +193,7 @@ Thanks to OVHcloud IAM, you can then delegates the creation rights of sub-resour
167193

168194
The actions related to create items are part of the service actions. You will need to add them to a policy to allow a user to create items with their PAT.
169195

170-
> ![info]
196+
> [!primary]
171197
> You don't need to allow any OVHcloud APIs action to allow a local user to interact with the Logs Data Platform backends (OpenSearch, Graylog, OpenSearch Dashboards) APIs.
172198
> Local users allow you to generate tokens which can only interact with the backend similarly to legacy Logs Data Platform tokens.
173199

Loading

pages/manage_and_operate/observability/logs_data_platform/iam_migration_to_iam/guide.en-gb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ If you use the role and permission system, we strongly recommend [migrating to I
4747

4848
The Graylog Web UI will now display an Identity Provider selector. You can find the username/password authenticator by selecting **Legacy username/password**. You can also try the OVHcloud IAM authenticator by selecting the appropriate provider (EU or CA).
4949

50-
![Legacy username/password](images/graylog_legacy.png){.thumbnail}
50+
![Legacy username - password](images/graylog-legacy.png){.thumbnail}
5151

5252
### Deprecated Features
5353

pages/manage_and_operate/observability/logs_data_platform/iam_presentation_faq/guide.en-gb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If you have an existing service, follow these steps:
4646

4747
Once IAM is activated, a new **IAM Policies** section will replace the previous **Roles** section.
4848

49-
[!Activated IAM](images/activated_iam.png){.thumbnail}
49+
![Activated IAM](images/activated_iam.png){.thumbnail}
5050

5151
### How to enable OVHcloud IAM on a new service?
5252

0 commit comments

Comments
 (0)