Securing the metrics endpoint
editSecuring the metrics endpoint
editThe ECK operator metrics endpoint will be secured by default beginning in version 2.14.0.
The ECK operator provides a metrics endpoint that can be used to monitor the operator’s performance and health. By default, the metrics endpoint is not enabled and is not secured. To enable the metrics endpoint follow the previous instructions. To enable RBAC and TLS on the metrics endpoint, follow the instructions in the following sections depending on whether you installed ECK through the Helm chart or the manifests.
Using the operator Helm chart
editIf you installed ECK through the Helm chart commands listed in Install ECK using the Helm chart, you can now set config.metrics.secureMode.enabled to true and both RBAC and TLS/HTTPs will be enabled for the metrics endpoint.
Using your own TLS certificate for the metrics endpoint when using the Helm chart
editBy default a self-signed certificate will be generated for use by the metrics endpoint. If you want to use your own TLS certificate for the metrics endpoint you can provide the config.metrics.secureMode.tls.certificateSecret to the Helm chart. The certificateSecret should be the name of an existing Kubernetes Secret that contains both the TLS certificate and the TLS private key. The following keys are supported within the secret:
-
tls.crt- The PEM-encoded TLS certificate -
tls.key- The PEM-encoded TLS private key
The easiest way to create this secret is to use the kubectl create secret tls command. For example:
kubectl create secret tls eck-metrics-tls-certificate -n elastic-system --cert=/path/to/tls.crt --key=/path/to/tls.key
Providing this secret is sufficient to use your own certificate if it is from a trusted Certificate Authority. If the certificate is not signed by a trusted CA you have 2 options:
-
Disable TLS verification.
-
Set
config.metrics.secureMode.tls.insecureSkipVerifytotrueto disable TLS validation.
-
Set
-
Provide the Certificate Authority to Prometheus.
-
Set
config.metrics.secureMode.tls.insecureSkipVerifytofalseto enable TLS validation. -
Set
config.metrics.secureMode.tls.caSecretto the name of an existing Kubernetes secret within the Prometheus namespace that contains the CA in PEM format. -
Set the
spec.secretsfield of thePrometheuscustom resource such that the CA secret is mounted into the Prometheus pod atconfig.metrics.secureMode.tls.caMountDirectory(assuming you are using the Prometheus operator). See the ECK Helm chart values file for more information.
-
Set
See the prometheus requirements section for more information on creating the CA secret.
Using the operator manifests
editIf you installed ECK through using the manifests using the commands listed in Deploy ECK in your Kubernetes cluster some additional changes will be required to enable secure metrics.
-
Enable the metrics port in the
ConfigMap, and set the metrics host to127.0.0.1to force communication throughkube-rbac-proxy.
cat <<EOF | kubectl apply -f -
kind: ConfigMap
apiVersion: v1
metadata:
name: elastic-operator
namespace: elastic-system
data:
eck.yaml: |-
log-verbosity: 0
metrics-port: 8081
metrics-host: 127.0.0.1
container-registry: docker.elastic.co
max-concurrent-reconciles: 3
ca-cert-validity: 8760h
ca-cert-rotate-before: 24h
cert-validity: 8760h
cert-rotate-before: 24h
disable-config-watch: false
exposed-node-labels: [topology.kubernetes.io/.*,failure-domain.beta.kubernetes.io/.*]
set-default-security-context: auto-detect
kube-client-timeout: 60s
elasticsearch-client-timeout: 180s
disable-telemetry: false
distribution-channel: all-in-one
validate-storage-class: true
enable-webhook: true
webhook-name: elastic-webhook.k8s.elastic.co
webhook-port: 9443
operator-namespace: elastic-system
enable-leader-election: true
elasticsearch-observation-interval: 10s
ubi-only: false
EOF
-
Add an additional
ClusterRoleandClusterRoleBindingfor the ECK operator.
cat <<EOF | kubectl apply -f - apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: elastic-operator-proxy-role rules: - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: elastic-operator-proxy-rolebinding roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: elastic-operator-proxy-role subjects: - kind: ServiceAccount name: elastic-operator namespace: elastic-system EOF
-
Add a
Serviceto expose the metrics endpoint.
cat <<EOF | kubectl apply -f -
apiVersion: v1
kind: Service
metadata:
labels:
control-plane: elastic-operator
app.kubernetes.io/component: metrics
name: elastic-operator-metrics
namespace: elastic-system
spec:
ports:
- name: https
port: 8080
protocol: TCP
targetPort: metrics
selector:
control-plane: elastic-operator
EOF
-
Patch the
StatefulSetto include a sidecar container forkube-rbac-proxyto secure the metrics endpoint.
kubectl patch sts -n elastic-system elastic-operator --patch-file=/dev/stdin <<-EOF
spec:
template:
spec:
containers:
- name: kube-rbac-proxy
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- "ALL"
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.15.0
args:
- "--secure-listen-address=0.0.0.0:8080"
- "--upstream=http://127.0.0.1:8081"
- "--logtostderr=true"
- "--v=0"
ports:
- containerPort: 8080
protocol: TCP
name: metrics
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 5m
memory: 64Mi
EOF
-
If using the Prometheus operator, add a
ServiceMonitorto allow scraping of the metrics endpoint by Prometheus.
cat <<EOF | kubectl apply -f -
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
name: elastic-operator
namespace: elastic-system
spec:
namespaceSelector:
matchNames:
- elastic-system
selector:
matchLabels:
control-plane: elastic-operator
app.kubernetes.io/component: metrics
endpoints:
- port: https
path: /metrics
scheme: https
interval: 30s
tlsConfig:
insecureSkipVerify: true
bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token
EOF
Using your own TLS certificate for the metrics endpoint when using the manifests
editBy default a self-signed certificate will be generated for use by the metrics endpoint. If you want to use your own TLS certificate for the metrics endpoint you will need to follow the previous instructions to enable secure metrics as well as the following steps:
-
Create a
Secretcontaining the TLS certificate and TLS private key. The following keys are supported within the secret: -
tls.crt- The PEM-encoded TLS certificate -
tls.key- The PEM-encoded TLS private key
The easiest way to create this secret is to use the kubectl create secret tls command. For example:
kubectl create secret tls my-tls-secret -n elastic-system --cert=/path/to/tls.crt --key=/path/to/tls.key
-
Patch the
StatefulSetto include thetls.crtandtls.keyas a volume and mount it into thekube-rbac-proxycontainer.
kubectl patch sts -n elastic-system elastic-operator --patch-file=/dev/stdin <<-EOF
spec:
template:
spec:
containers:
- name: kube-rbac-proxy
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- "ALL"
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.15.0
args:
- "--secure-listen-address=0.0.0.0:8080"
- "--upstream=http://127.0.0.1:8081"
- "--logtostderr=true"
- "--v=0"
- "--tls-cert-file=/tls/tls.crt"
- "--tls-private-key-file=/tls/tls.key"
volumeMounts:
- mountPath: "/tls"
name: tls-certificate
readOnly: true
ports:
- containerPort: 8080
protocol: TCP
name: metrics
resources:
limits:
cpu: 500m
memory: 128Mi
requests:
cpu: 5m
memory: 64Mi
volumes:
- name: conf
configMap:
name: elastic-operator
- name: cert
secret:
defaultMode: 420
secretName: elastic-webhook-server-cert
- name: tls-certificate
secret:
defaultMode: 420
secretName: eck-metrics-tls-certificate
EOF
-
Potentially patch the
ServiceMonitor. This will only need to be done if you are adjusting theinsecureSkipVerifyfield tofalse.
kubectl patch servicemonitor -n elastic-system elastic-operator --patch-file=/dev/stdin <<-EOF
spec:
endpoints:
- port: https
path: /metrics
scheme: https
interval: 30s
tlsConfig:
insecureSkipVerify: false
caFile: /etc/prometheus/secrets/{secret-name}/ca.crt
serverName: elastic-operator-metrics.elastic-system.svc
bearerTokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token
EOF
|
See the prometheus requirements section for more information on creating the CA secret. |