Open khusseini opened 3 years ago
Hi,
This is something we can add to the dev plan. I just need to understand better this use case.
BTW, thank you for the feedback ;)
I would love to chat with you to understand your requirement. https://calendly.com/stremovsky/30min
The usecase is actually quite simple. I have a cluster filled with different microservices, some of which have access to user profiles, for example ecommerce checkout process, authentication services to check the email address etc. When I look at the audit of databunker I currently only see logs of requests made by the root key, but it would be nicer to have a more granular insight, on which service issued the request.
Ok, I understand it better now. I will add this to the product roadmap.
You scheduled a meeting. This is great. I love chatting with Databunker users ;)
@stremovsky
Has this feature made it to the current state of Databunker? We're currently evaluating for a straightforward GDPR compliant PII vault solution. More granular system access controls would definitely benefit this project in the wild west of distributed service architectures.
Hi guys.
Thank you for the input. I will add this feature as a top priority on my list. Best regards, Yuli
@yuli-lendbuzz Happy to hear that. Do you have any sort of guesstimate on how long this feature will take until available on Databunker (I guess weeks or months is enough of a rough estimate).
Let me know if there is anything we can do to further assist.
Sounds great. We'll keep monitoring this project and come back to it in the future!
Any news on this one?
Hi
I am working on this. It is my top priority.
I was ill for 2 weeks, so I am getting back to this.
Hey there, I was able to deploy databunker on a microk8s instance with openfaas. so far things are working fine and I even implemented a simple password less login mechanism. I was wondering if it is possible to generate more than just the root_key to access the databunker api, for example one for each user app, so that it is possible to distinguish the different systems that access a user's data. can other tokens than the root token be generated?
Thank you for this great peace of software