Understanding Grafana's Data Source Proxy Whitelist Behavior
During my recent assessment of Grafana’s data source functionality, I discovered an interesting behavior regarding how different endpoints handle the data source proxy whitelist. This highlights important security considerations for organizations using Grafana’s data source proxy features.
Overview
Grafana provides a data source proxy whitelist feature through the data_source_proxy_whitelist
configuration setting. This setting is intended to restrict which targets data sources can connect to. However, the implementation reveals an interesting behavior that security teams should be aware of.
Technical Deep Dive
The key finding involves two different endpoints that handle data source connections:
/api/datasources/proxy/<uid>
- This endpoint goes through Grafana’s data source proxy and respects the whitelist configuration./api/datasources/uid/<uid>/resources/*
- This endpoint uses theCallResource
API and intentionally bypasses the proxy.
This distinction is by design, as confirmed by the Grafana team. The CallResource
API endpoint is documented and intended to operate independently of the data source proxy mechanism.
Demonstration Environment
To demonstrate this behavior clearly, I created a test environment consisting of two services:
- A Grafana instance with whitelist configuration
- A Python test server that logs incoming requests
Environment Setup
First, let’s look at the Docker Compose configuration:
|
|
The Grafana configuration file (grafana.ini
) includes the whitelist setting:
|
|
Our test server (server.py
) logs all incoming requests:
|
|
Testing the Behavior
With this environment set up, we can demonstrate the different endpoint behaviors:
Start the environment:
1
docker-compose up -d
Log into Grafana at http://localhost:3000 (default credentials: admin/admin)
Create a data source pointing to our test server (http://172.20.0.3:8000)
- Test both endpoints:
/api/datasources/proxy/<uid>
- This will be blocked due to whitelist
/api/datasources/uid/<uid>/resources/
- This will successfully connect
To automate this testing, I created a Python script that demonstrates the behavior:
|
|
The script will:
- Login to Grafana
- Create a data source
- Attempt connections through both endpoints
- Clean up by removing the test data source
Observed Results
When running these tests, we can observe that:
- The proxy endpoint correctly enforces the whitelist.
- The resources endpoint successfully connects regardless of whitelist settings.
- All requests are logged by our test server for verification.
This setup clearly demonstrates the different handling of requests between the two endpoints, helping understand Grafana’s proxy implementation.
Security Considerations
While this behavior is working as designed, it raises important security considerations:
- Organizations relying on the whitelist for security controls should be aware of this architectural design.
- The different behavior between endpoints needs to be considered in security planning.
- Access to data source creation should be carefully controlled.
- Network-level access controls (like firewall rules or network segmentation) should be implemented as additional security measures, rather than relying solely on application-level restrictions.
Conclusion
Understanding these architectural decisions in Grafana’s implementation is crucial for security teams. While the behavior might initially appear as a security bypass, it’s an intentional design choice that needs to be considered when planning security controls.
The Grafana team plans to update their documentation to provide more clarity about these different endpoints and their behavior. For more details about the CallResource
API, refer to Grafana’s official documentation.
Acknowledgments
Special thanks to the Grafana security team for their transparency and collaboration in understanding this behavior, and for allowing the public disclosure of this finding.