grafana-agent

Grafana Agent

Channel Revision Published Runs on
1/stable 606 18 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/stable 605 18 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/stable 607 18 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/stable 603 18 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/stable 604 18 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/stable 602 18 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/candidate 606 09 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/candidate 605 09 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/candidate 607 09 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/candidate 603 09 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/candidate 604 09 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/candidate 602 09 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/beta 606 02 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/beta 605 02 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/beta 607 02 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/beta 603 02 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/beta 604 02 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/beta 602 02 Sep 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/edge 607 20 Aug 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/edge 606 20 Aug 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/edge 605 20 Aug 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/edge 604 20 Aug 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/edge 603 20 Aug 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
1/edge 602 20 Aug 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
dev/edge 719 Yesterday
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
dev/edge 718 Yesterday
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
dev/edge 717 Yesterday
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
dev/edge 716 Yesterday
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
dev/edge 715 Yesterday
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
dev/edge 714 Yesterday
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/stable 689 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/stable 686 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/stable 688 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/stable 684 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/stable 687 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/stable 685 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/candidate 689 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/candidate 686 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/candidate 688 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/candidate 684 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/candidate 687 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/candidate 685 12 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/edge 707 27 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/edge 706 27 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/edge 705 27 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/edge 704 27 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/edge 703 27 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
2/edge 702 27 Nov 2025
Ubuntu 24.04 Ubuntu 22.04 Ubuntu 20.04
juju deploy grafana-agent --channel 1/beta
Show information

Platform:

Ubuntu
24.04 22.04 20.04

This document provides cryptographic documentation for the COS-Lite bundle. Its purpose is to track the exposure of charm code to cryptographic attack vectors.

What is not included in this document and regarded as out of scope:

  • Workload code (refer to the workloads’ cryptographic documentation)
  • Data at rest encryption

The COS-Lite charms have a very similar exposure. Unless specified otherwise in the charm’s own documentation, this cryptographic documentation applies to all.

Usage of cryptographic technology

COS-Lite charm code uses cryptographic technology for mainly two purposes:

  • enabling TLS communication between their workloads
  • securing admin login to their workloads

Cryptographic use internal to cos-lite

COS-Lite charm code can use cryptographic technology to generate a private key to sign their TLS certificate requests. They do so via the tls-certificates-interface which in turn uses the cryptography python library and Juju secrets to exchange data with the CA.

Also, charms that deal with large configuration files use sha256 to efficiently detect diffs in them.

Cryptographic use in how cos-lite communicates externally

COS-Lite charm users use passwords generated by charm code that depends on python’s secrets module. No configuration is exposed to the user. These passwords secure admin login to the user-facing server provided by the workload. For example, in grafana-k8s.

Additionally, charms supporting BasicAuth such as traefik accept a <username>:<hashed-password> config option by which the user can configure basic authentication. The supported hashing algorithm are MD5, SHA1, or BCrypt, as per official documentation. Also following the official guidelines, we recommend cloud admins to use htpasswd for hashing the password and formatting the configuration string.

List of packages and cryptographic tech used

  • to generate private keys for setting up TLS communication: the rsa.generate_private_key function from the rsa package. They use the following parameters (hardcoded, not user-configurable):
    • key_size = 2048
    • public_exponent = 65537
  • to generate admin passwords for user admin login: the secrets module from the python standard library. See for example: usage in grafana.

Help improve this document in the forum (guidelines). Last updated 1 year, 3 months ago.