-
Notifications
You must be signed in to change notification settings - Fork 18
Api key deprecation #184
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: staging
Are you sure you want to change the base?
Api key deprecation #184
Conversation
✅ Deploy Preview for suse-obs ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
|
|
||
| Don't add a `update-scoped-permissions` permission, that will not work for a token that is used from multiple clusters. | ||
|
|
||
| Now re-deploy your agents and Open Telemetry collectors by following the instructions available in the UI for the Kubernetes StackPack and the xref:setup/otel/getting-started/getting-started-k8s.adoc[Open Telemetry collector documentation]. Use the generated Service Token as the API key by following. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The last sentence reads like there should be more to it? Use the generated Service Token as the API key by following.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1 to this.
| ---- | ||
|
|
||
| ➡️ xref:/setup/cli/cli-sts.adoc#_authentication[Learn more about the SUSE Observability APIs] | ||
| Use the xref:use/security/k8s-service-tokens.adoc[Service Tokens] to authenticate authenticate to SUSE Observability without having an associated a user account. Service tokens are the preferred way to authenticate from CI/CD, or when sending telemetry data from agents or Open Telemetry. How to create and use service tokens is described in the xref:use/security/k8s-service-tokens.adoc[Service Tokens documentation]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's a floating article (a) in the first sentence - having an associated a user account
|
|
||
| Ingestion API Keys were used by external tools to ingest data (such as metrics, events and traces) to the SUSE Observability cluster. | ||
| These tools include the STS Agent or/and OTel Collector. The recommended authentication mechanism is through xref:/use/security/k8s-service-tokens.adoc#_authenticate_using_service_tokens_for_data_ingestion[Service Tokens]. | ||
| These tools include the STS Agent or/and OTel Collector. Service tokens have the same, and more, capabilities. Follow the same steps as for the API key (in the previous setion) to migrate to <<_migrate_to_a_service_token_per_cluster, a service token per cluster>> or <<_migrate_to_a_single_service_token, a single service token>>. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor: there's not enough content between the headings and these anchors for them to work as expected.
|
|
||
| [NOTE] | ||
| ==== | ||
| *Note:* |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor: the *Note:* is redundant in the rendered output (the note block already has a Note heading) - there's a double note.
| * The first run of the helm upgrade command will result in pods restarting, which may cause a short interruption of availability. | ||
| * Include `authentication.yaml` on every `helm upgrade` run. | ||
| * The authentication configuration is stored as a Kubernetes secret. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there any housekeeping that needs to be done when the TTL on the bootstrap service token expires?
| update-metrics | system | ||
| ---- | ||
|
|
||
| Don't add a `update-scoped-permissions` permission, that will not work for a token that is used from multiple clusters. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Don't add a `update-scoped-permissions` permission, that will not work for a token that is used from multiple clusters. | |
| Do not add a `update-scoped-permissions` permission as it will not work for a token that is used from multiple clusters. |
|
|
||
| Don't add a `update-scoped-permissions` permission, that will not work for a token that is used from multiple clusters. | ||
|
|
||
| Now re-deploy your agents and Open Telemetry collectors by following the instructions available in the UI for the Kubernetes StackPack and the xref:setup/otel/getting-started/getting-started-k8s.adoc[Open Telemetry collector documentation]. Use the generated Service Token as the API key by following. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Now re-deploy your agents and Open Telemetry collectors by following the instructions available in the UI for the Kubernetes StackPack and the xref:setup/otel/getting-started/getting-started-k8s.adoc[Open Telemetry collector documentation]. Use the generated Service Token as the API key by following. | |
| Re-deploy your agents and Open Telemetry collectors by following the instructions available in the UI for the Kubernetes StackPack and the xref:setup/otel/getting-started/getting-started-k8s.adoc[Open Telemetry collector documentation]. Use the generated Service Token as the API key by following. |
| Use "sts service-token [command] --help" for more information about a command. | ||
| ---- | ||
|
|
||
| It's also possible to <<_set_up_a_bootstrap_service_token,set up a bootstrap service token>> when installing SUSE Observability. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| It's also possible to <<_set_up_a_bootstrap_service_token,set up a bootstrap service token>> when installing SUSE Observability. | |
| It's also possible to <<_set_up_a_bootstrap_service_token,set up a bootstrap service token>> when installing {stackstate-product-name}. |
| ==== | ||
|
|
||
| To create a service token in your instance of SUSE Observability, you can use the `sts` CLI. | ||
| To create a service token for SUSE Observability, you can use the `sts` CLI. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| To create a service token for SUSE Observability, you can use the `sts` CLI. | |
| To create a service token for {stackstate-product-name}, you can use the `sts` CLI. |
|
|
||
| === Set up a bootstrap service token | ||
|
|
||
| When installing SUSE Observability, it's possible to bootstrap it with a (temporary) service token. This allows for using the CLI without first interacting with SUSE Observability and obtaining an API token from the UI. In order to set this up, you can add the following snippet to the SUSE Observability configuration file: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| When installing SUSE Observability, it's possible to bootstrap it with a (temporary) service token. This allows for using the CLI without first interacting with SUSE Observability and obtaining an API token from the UI. In order to set this up, you can add the following snippet to the SUSE Observability configuration file: | |
| When installing {stackstate-product-name}, it's possible to bootstrap it with a (temporary) service token. This allows using the CLI without first interacting with {stackstate-product-name} and obtaining an API token from the UI. In order to set this up, add the following snippet to the {stackstate-product-name} configuration file: |
|
|
||
| When installing SUSE Observability, it's possible to bootstrap it with a (temporary) service token. This allows for using the CLI without first interacting with SUSE Observability and obtaining an API token from the UI. In order to set this up, you can add the following snippet to the SUSE Observability configuration file: | ||
|
|
||
| To configure SUSE Observability to create a bootstrap service token on Kubernetes, The following values need to be added to the file `authentication.yaml`. For example |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| To configure SUSE Observability to create a bootstrap service token on Kubernetes, The following values need to be added to the file `authentication.yaml`. For example | |
| To configure {stackstate-product-name} to create a bootstrap service token on Kubernetes, the following values need to be added to the file `authentication.yaml`. For example: |
| ttl: 24h | ||
| ---- | ||
|
|
||
| Follow the steps below to configure SUSE Observability to create a bootstrap service token: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Follow the steps below to configure SUSE Observability to create a bootstrap service token: | |
| Follow the steps below to configure {stackstate-product-name} to create a bootstrap service token: |
| ** *token* - The token that will be created on (initial) start of SUSE Observability. | ||
| ** *roles* - An array of roles that will be assigned to the bootstrap token. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ** *token* - The token that will be created on (initial) start of SUSE Observability. | |
| ** *roles* - An array of roles that will be assigned to the bootstrap token. | |
| ** *token* - The token that is created at the (initial) start of {stackstate-product-name}. | |
| ** *roles* - An array of roles that are assigned to the bootstrap token. |
| ** *token* - The token that will be created on (initial) start of SUSE Observability. | ||
| ** *roles* - An array of roles that will be assigned to the bootstrap token. | ||
| ** *ttl* - Optional. The time-to-live for the service token, expressed as a duration string. | ||
| . Store the file `authentication.yaml` together with the `values.yaml` from the SUSE Observability installation instructions. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| . Store the file `authentication.yaml` together with the `values.yaml` from the SUSE Observability installation instructions. | |
| . Store the file `authentication.yaml` together with the `values.yaml` from the {stackstate-product-name} installation instructions. |
|
|
||
| ==== Setup the bootstrap service token from an external secret | ||
|
|
||
| When the bootstrap token should come from an external secret, follow xref:/setup/security/external-secrets.adoc#_getting_authentication_data_from_an_external_secret[these steps] and add the following data: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When the bootstrap token should come from an external secret- This isn't clear. Is it supposed to be - "When the bootstrap token is retrieved from an external secret"?
| ---- | ||
| > sts context --name <name> --service-token <TOKEN> --url https://<tenant>.app.stackstate.io | ||
| ---- | ||
| A service token can be used for authentication with the `sts` CLI. For details, see xref:/setup/cli/cli-sts.adoc#_authentication[the CLI documentation]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| A service token can be used for authentication with the `sts` CLI. For details, see xref:/setup/cli/cli-sts.adoc#_authentication[the CLI documentation]. | |
| A service token isd used for authentication with the `sts` CLI. For more information, see xref:/setup/cli/cli-sts.adoc#_authentication[the CLI documentation]. |
akashraj4261
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor comments and typos.
| === List service tokens | ||
|
|
||
| The ID, name, expiration date and roles of all created service tokens can be seen using the `sts` CLI. For example: | ||
| The ID, name, expiration date and roles of all created service tokens can be seen using the new `sts` CLI. For example: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| The ID, name, expiration date and roles of all created service tokens can be seen using the new `sts` CLI. For example: | |
| The ID, name, expiration date and roles of all created service tokens can be seen using the `sts` CLI. For example: |
Should we stop use "new" for the cli? It is inconsistent even within this page. And also it might be confusing for those who aren't aware about the "old" cli.
No description provided.