-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support different identity key-pairs per endpoint #75
Comments
For completeness, this is the content of the thread post I linked above:
|
You would think the simple solution would be to add support for an optional "agent_identity" section (which would contain the paths to the key-pair locations) to the pod configmap's "endpoints" definitions. But the problem is that these endpoints are defined by your pods (they are config maps on the projects where the pods are deployed) and the people doing those pod deployments are typically not the same admins who configure and set up the agent. So how would the pod configmap authors know the locations and names of the key-pairs or have privileges to install those keys on the agent (I'm thinking of the use case where OpenShift is running and developers/deployers are deploying their own applications and want to collect their own app metrics). |
For my etcd example, i'd expect this to be setup by an admin (the certs are owned by root on the master) so the 'admin vs developer' problem you've highlighted isn't an issue for that use case. However, it might be for other use cases as you've stated, so happy to hear what other viewpoints are. |
Configmaps can store files. But the Agent should not have different key-pair values when talking to an endpoint. The agent should have a more defined client certificate that it uses when communicating with an endpoint and that endpoint should be configured to accept connections from the agent. Configuring the agent to present a different certificate based on the endpoint its accessing seems wrong. For mutual auth, we might have to include the something like the CA cert in the configmap (to support things like self signed certificates) Overall I think we need to think about how to handle security better to support different endpoint types |
There may be cases where the agent's identity needs to change in order to use different key-pairs in order to talk to different endpoints. This means the one global agent Identity (found in the agent config) isn't enough - there needs to be a way to specify a key-pair Identity per endpoint to override the agent's Identity when talking to that specific endpoint.
See the hawkular-dev thread: http://lists.jboss.org/pipermail/hawkular-dev/2016-December/003526.html and specifically this post: http://lists.jboss.org/pipermail/hawkular-dev/2016-December/003531.html
The text was updated successfully, but these errors were encountered: