-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow config file to contain the keystore / truststore credentials when connecting via ssl to JMX #894
Comments
@sumitbaurai There are two usage scenarios: Java agent We could add the properties to the exporter YAML for use when loading the SSL configuration for HTTPS. This could cause configuration confusion since the application's SSL properties may still require the system properties, negating the value of having the SSL configuration for HTTPS in the exporter YAML. The Java agent is recommended. Standalone HTTP Server Java RMI (used by JMX) doesn't provide the necessary configuration hooks to allow non-system properties for RMI SSL configuration. Here is a great blog on the issue: https://blogger.ziesemer.com/2010/02/jmx-avoid-java-system-properties-rmi.html TL;DR - it requires custom code in both the Standalone HTTP server and custom code in the application (possibly implemented as a Java agent, simply to bypass using system properties.) The standalone HTTP server is not recommended. |
Hi Doug, Is it not the case that the same keystore , truststore can be used for both
Isn't something similar to what jmx offers possible.
|
@sumitbaurai not sure that will help. Conceptually... the standalone HTTP server exporter...
This all assumes that you can bind a (I'm sure I'm missing something/left out some things.) The complexities, code changes, integration tests, etc. to support all of this (if it would even work) for the standalone HTTP server exporter (which is not the recommended deployment scenario) simply to prevent a clear-text password doesn't feel like a worthwhile effort. |
Hi,
This issue is related to the one described here: #834
However, there was no conclusion on that discussion. Hence, opening this new one.
As mentioned in the other issue, how can we provide the following system properties via a config file. In production we cannot afford to provide them via command line as that exposes them to be scraped via ps commands.
-Djavax.net.ssl.keyStore= -Djavax.net.ssl.keyStorePassword= -Djavax.net.ssl.trustStore= -Djavax.net.ssl.trustStorePassword=
The text was updated successfully, but these errors were encountered: