The Making of Kloudfuse 3.5: Enterprise Access Control and Identity Management

Stream-level RBAC and automated governance for observability data.

Table of Contents

Observability platforms collect sensitive data from across your infrastructure. Logs capture customer information and authentication tokens. Traces reveal API keys and session identifiers. Metrics expose business performance patterns. RUM tracks user behavior and locations.

Yet most observability platforms treat access control as an afterthought. Coarse account-level permissions grant entire teams full visibility or none at all. Manual user management falls out of sync with organizational reality. Dashboard organization becomes chaotic as platforms scale.

We built enterprise access control in Kloudfuse 3.5 because observability data deserves the same rigorous governance as production databases.

The Access Control Gap

Traditional observability platforms offer limited access control. User permissions operate at platform or account levels. Either you access everything, or you can't access the platform at all.

Development teams see production data they shouldn't access. Security investigations expose sensitive telemetry to unauthorized users. External consultants gain visibility into systems beyond their scope. Finance teams viewing cost dashboards access detailed traces containing application secrets.

Manual user management compounds these issues. Engineers join teams—permissions require manual updates. Engineers switch projects—access from previous assignments accumulates. Engineers leave—platform access lingers because someone forgot to revoke it. Compliance audits reveal access violations from organizational changes nobody tracked.

Stream-Specific RBAC

Kloudfuse 3.5 implements stream-specific RBAC policies controlling visibility at the telemetry stream level. Access control applies independently to metrics, logs, traces, events, and RUM.

Write scope policies limiting data visibility based on labels, tags, or custom attributes. A development team sees logs and traces from services tagged with team=checkout, but not from team=payments. A security team accesses all telemetry for incident response. A finance team queries aggregated metrics without viewing detailed traces containing application secrets.

The same Kubernetes labels, service tags, and custom attributes already used for organization become access control boundaries. Teams leverage existing instrumentation metadata without learning new tagging schemes.

Stream-specific RBAC addresses operational security. Isolate production data from non-production access. Restrict sensitive customer data to authorized personnel. Control third-party vendor visibility during integrations. This implements principle of least privilege—users access exactly what they need, nothing more.

Identity Provider Synchronization

Access control at scale requires automation. Manually managing permissions across hundreds of engineers doesn't scale. Access policies drift from organizational reality as people change roles and teams reorganize.

Kloudfuse 3.5 automatically synchronizes groups and roles with SAML and OAuth 2.0 identity providers including Okta and Google. As organizational structure evolves in your identity provider, access controls stay current without manual updates.

An engineer joins the payments team. Group membership updates in the IdP. Kloudfuse automatically grants access to payment service telemetry based on group-to-RBAC mappings. They transfer to infrastructure. Access shifts automatically. They leave the company. Account deactivation immediately revokes all access.

This eliminates access drift. Former employees don't retain access. Engineers don't accumulate permissions from previous roles. Compliance audits don't discover violations from organizational changes months ago.

Hierarchical Organization

Enterprise observability generates thousands of dashboards, alerts, and saved queries. Without organization, this becomes unmanageable. Teams create duplicate dashboards. Alert ownership becomes unclear.

Kloudfuse 3.5 enables organizing platform objects in hierarchical folder structures mirroring organizational complexity. Create folders by team, by product, by environment—whatever structure matches your organization.

RBAC policies apply at the folder level and inherit downward. Grant the payments team access to /teams/payments. Everything inside becomes accessible automatically. Create a subfolder /teams/payments/production with stricter access. Only senior engineers see production dashboards.

This inheritance simplifies governance at scale. Platform teams delegate dashboard management to individual teams. Teams organize assets independently within allocated folders. IdP membership changes automatically grant or revoke access to folder hierarchies.

Private folders ensure sensitive investigations remain confidential. A security engineer investigating a breach creates a private folder. Only they access investigation dashboards. After concluding, they can share findings by moving specific dashboards to team folders while keeping investigative details private.

Differentiated Governance Policies

Hierarchical organization enables differentiated governance. Production folders require additional audit logging. Development folders have relaxed retention policies. Compliance policies apply to entire folder trees through inheritance, reducing configuration overhead.

This matters because different data requires different treatment. Production telemetry containing customer data demands strict access control and comprehensive auditing. Development telemetry allows broader experimentation and lighter governance. Folder-level policies enforce these differences consistently.

Service Accounts for Automation

Modern platform engineering requires automation. Kloudfuse 3.5 introduces service accounts with bearer token authentication, enabling secure machine-to-machine interactions.

Service accounts authenticate using bearer tokens and inherit RBAC policies like human users. A service account with read-only metrics access can query Prometheus but not modify alerts. A service account with administrative access can provision dashboards programmatically.

This enables infrastructure-as-code approaches. Platform teams manage dashboards and policies through GitOps workflows. Configuration lives in Git repositories. CI/CD pipelines provision observability infrastructure using service account credentials. Changes follow standard code review processes.

Service accounts also enable automated operational responses. Monitor consumption patterns and adjust rate limits dynamically. Generate automated compliance reports by querying audit logs on schedule. Automation inherits security boundaries through RBAC.

Real-World Use Cases

Multi-tenant SaaS platforms use stream-specific RBAC to isolate customer data. Each customer's telemetry gets labeled with customer identifiers. RBAC policies ensure support engineers access only their assigned customers' observability data.

Financial services firms restrict payment processing telemetry to certified personnel. Only engineers with PCI compliance training access logs and traces from payment services. IdP sync ensures certifications map to access automatically.

Healthcare technology companies implement HIPAA-compliant access control. Patient data logs require specific group membership. Audit trails track every access. Private folders enable confidential security investigations without exposing patient information.

Global enterprises organize observability by region and business unit. Regional teams access their geography's telemetry. Business unit leaders access aggregated metrics for their portfolio. Hierarchical folders with inherited policies scale governance across thousands of users.

What We Built

Enterprise access control in Kloudfuse 3.5 delivers:

  • Stream-specific RBAC policies using labels, tags, and custom attributes

  • Automatic identity provider synchronization with SAML and OAuth 2.0

  • Hierarchical folder organization with inherited permissions

  • Service accounts with bearer token authentication

  • Group-based access control updating automatically with IdP changes

  • Private folders for confidential investigations

  • Differentiated governance policies across folder hierarchies

Observability data contains some of the most sensitive information in your infrastructure. It deserves access control that scales with organizational complexity, automates with identity systems, and enforces governance like production databases.

Observe. Analyze. Automate.

logo for kloudfuse

Observe. Analyze. Automate.

logo for kloudfuse

Observe. Analyze. Automate.

logo for kloudfuse

All Rights Reserved ® Kloudfuse 2025

Terms and Conditions

All Rights Reserved ® Kloudfuse 2025

Terms and Conditions

All Rights Reserved ® Kloudfuse 2025

Terms and Conditions