Skip to content

Commit 237f555

Browse files
TRACING-5851: Clarify tenancy model in Distributed Tracing
Signed-off-by: Andreas Gerstmayr <[email protected]>
1 parent 26e8403 commit 237f555

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

observability/distr_tracing/distr-tracing-tempo-installing.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,10 @@ include::modules/distr-tracing-tempo-object-storage-setup-ibm-storage.adoc[level
6969
[id="configuring-permissions-and-tenants_{context}"]
7070
== Configuring the permissions and tenants
7171

72-
Before installing a `TempoStack` or `TempoMonolithic` instance, you must define one or more tenants and configure their read and write access. You can configure such an authorization setup by using a cluster role and cluster role binding for the Kubernetes Role-Based Access Control (RBAC). By default, no users are granted read or write permissions. For more information, see "Configuring the read permissions for tenants" and "Configuring the write permissions for tenants".
72+
Before installing a `TempoStack` or `TempoMonolithic` instance, you must define one or more tenants and configure their read and write access.
73+
Tenant access is managed globally and not per instance.
74+
Therefore, granting access to a tenant grants access to this tenant in all `TempoStack` and `TempoMonolithic` instances.
75+
You can configure such an authorization setup by using a cluster role and cluster role binding for the Kubernetes Role-Based Access Control (RBAC). By default, no users are granted read or write permissions. For more information, see "Configuring the read permissions for tenants" and "Configuring the write permissions for tenants".
7376

7477
[NOTE]
7578
====

0 commit comments

Comments
 (0)