litmuschaos / litmus

Litmus helps SREs and developers practice chaos engineering in a Cloud-native way. Chaos experiments are published at the ChaosHub (https://hub.litmuschaos.io). Community notes is at https://hackmd.io/a4Zu_sH4TZGeih-xCimi3Q
https://litmuschaos.io
Apache License 2.0
4.35k stars 683 forks source link

Feature Request: RBAC controls #4230

Open smitthakkar96 opened 10 months ago

smitthakkar96 commented 10 months ago

Context

Currently, the only way to reduce blast radius / restrict users from accidentally attacking workloads they don't own is by installing Chaos Infra in Namespaced mode and assigning these different Chaos Infra to different projects based on ownership. This works great where clusters have namespaces segregated by team or service, but sometimes, these best practices aren't properly adopted in organisations. Also one of the trade-offs of the Namespaced deployment of Chaos Infra is the overhead of managing the life-cycle of the resources, registration/un-registration, version upgrades, monitoring, sizing capacity planning etc. Cluster-scoped deployment makes life simpler from an operation perspective however, it increases blast radius.

Feature Request

We propose integrating robust RBAC/ACL rules in Litmus to empower users to finely control access and actions within the platform. This includes:

Inspiration

The goal is to strike a balance between operational simplicity and security, enabling Litmus users to tailor their Chaos Engineering practices to the specific needs and structures of their organization.

smitthakkar96 commented 10 months ago

If the community and Litmus team is interested in such a feature, I am happy to make further discovery on this and come up with an RFC