Skip to main content

Team Settings

Based on self-service options allowed by the platfrom administrator, team members can change the settings of their team.

Configure OIDC group mapping

note

The OIDC group mapping will only be visible when an external Identity Provider (IdP) is used.

Change the OIDC group-mapping to allow access based on a group membership.

Managed monitoring

Activate a (platform) managed Grafana, Prometheus or Alertmanager instance for the team. The installed Grafana, Prometheus and Alertmanager will be monitored by the Platform administrator.

Grafana

Enable to install a Grafana instance for the team.

Dependencies:

  • The Grafana instance is automatically configured with a datasource for the Team's Prometheus if Prometheus for the Team is enabled.

  • If Loki (for logs) is enabled on the Platform, Grafana needs to be enabled for the Team to able to see logs in Grafana.

  • Grafana is provisioned with multiple dashboards that rely on the Platform Prometheus. If Prometheus on the Platform is not enabled, these dashboards will not work!

Prometheus

Enable to install a Prometheus instance for the team. The Prometheus instance is configured to only scrape metrics from PodMonitors and ServiceMonitors that have the label prometheus: team-<team-name>.

Alertmanger

Enable to install an Alertmanager instance for the team. The Alertmanger instance will only show alerts based on Rules for the Team's Prometheus.

Private

Select to disable cross-team access (and make the Team Grafana private for Team members only)

Configure alert settings

note

Alerts settings will only be applied when Alertmanager is enabled for the team.

Change the alert settings and preferred notification receivers.

OptionDescription
SlackNeeds a slack webhook url that will give alerts for warnings and criticals
Microsoft TeamsNeeds two alerting endpoints, for both warnings as well as criticals
EmailYou may provide a list of email addresses for both 'Non Critical' and 'Critical'
If none selectedGlobal (admin) alerting endpoint configuration will be used

Configure Resource Quotas

When required, add resource quota for the team. The resource quota should adhere to the "spec.hard" format as described here.

note

There is no validation as there is no schema published. Add/change resource quota at your own risk.

Configure Network Policies

OptionDescription
Ingress controlWhen enabled team services will be bound by (ingress) network policies
Egress controlWhen enabled team service egress traffic will be limited to pre-defined endpoints only

Team self service flags

The self-service flags (what is a team allowed to) can only be configured by an admin user.

Service

OptionPermission
IngressThe Team is allowed to configure External Exposure for a Service

Security Policies

OptionPermission
Edit policiesThe Team is allowed to edit Team Security Policies

Team

OptionPermission
OIDCThe team is allowed to configure the OIDC group mapping for the team
AlertsThe Team is allowed to configure Alert settings for the team
Managed monitoringThe team is allowed to configure Managed Monitoring
Resource quotasThe team is allowed to configure resource quotas for the team
Network policyThe team is allowed to configure Security Policies (enable/disable Security Policies for the Team)

Access

OptionPermission
ShellThe team is allowed to use the cloud Shell
Download kube configThe team is allowed to download the Kube Config
Download docker configThe team is allowed to download the Docker Config
Download certificate authorityThe team is allowed to download the certificate authority (only when installed with a auto-generated or custom CA)