Skip to content

Conversation

Baarsgaard
Copy link
Collaborator

@Baarsgaard Baarsgaard commented Aug 10, 2025

Use the k8s ServiceAccount token projected in at /var/run/secrets/kubernetes.io/serviceaccount/token as authentication to Grafana instances.

Users can configure [auth.jwt] to accept K8s ServiceAccounts and assign them roles depending on the name, namespace, etc in the JWT token and entirely disable the default Grafana admin account.

TODO

Questions:

  • Should the operator support a default config for JWT auth which is used? The variance in what people want might be a bit high and instead just document the options.
  • Name of the client option? useKubeAuth and useJWTAuth are both a bit vague
  • Should this be merged after Grafana v12.2.0 is released and configured as the new default version?
    Would help a lot for usability as the the full setup can be handled in the Grafana CR

@github-actions github-actions bot added documentation Issues relating to documentation, missing, non-clear etc. feature this PR introduces a new feature labels Aug 10, 2025
@Baarsgaard Baarsgaard force-pushed the feat_k8s_serviceaccont_auth branch from c62ac14 to 6f7a946 Compare August 10, 2025 18:26
@Baarsgaard Baarsgaard force-pushed the feat_k8s_serviceaccont_auth branch 2 times, most recently from b3fd0ff to 9f29f8f Compare August 31, 2025 12:01
@Baarsgaard Baarsgaard marked this pull request as ready for review August 31, 2025 15:10
@Baarsgaard Baarsgaard force-pushed the feat_k8s_serviceaccont_auth branch from c6858be to 30c1a39 Compare September 22, 2025 17:22
@Baarsgaard Baarsgaard force-pushed the feat_k8s_serviceaccont_auth branch from d5b93f3 to 1907e5f Compare September 24, 2025 22:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Issues relating to documentation, missing, non-clear etc. feature this PR introduces a new feature
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants