-
Notifications
You must be signed in to change notification settings - Fork 21
fix: protect mongo and redis by password #1214
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Conversation
18b315e to
a1243cd
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good generally, but shouldn't we keep username and passwords as a k8s secrets? 🤔 this notation will make creds be visible in plain text even when in kubectl describe
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please take a look at my comments
|
okay, after I took a moment to think about it it makes sense to put initial credentials as because if not it would be a mess to migrate. But we should also document a way to use |
ea5e147 to
48a8219
Compare
| Create secrets for Mongo and Redis: | ||
|
|
||
| ``` | ||
| kubectl create secret generic redis-auth-secret \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wouldn't be better to create some default secret so we don't have problems during migration? and note that they can change it and how? I know it can be a problem for prodsec but still default secret > no secret 😅
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think additional secrets will confuse people more, do you agree?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
or maybe allow plain auth by default and only inform secret is more secure and point them to how to configure that? @ajasnosz what is your opinion?
2bfe4af to
a4afed4
Compare
efb575c to
02c6c63
Compare
0dfaee8 to
b1c4720
Compare
|
hey @ikheifets-splunk please let me know when you're ready for a review |
7f3dd51 to
c9a1a00
Compare
9362369 to
8058886
Compare
Signed-off-by: Ilya Kheifets <[email protected]>
8058886 to
cc56d45
Compare
@omrozowicz-splunk you can review |
Description
Please include a summary of the change and which issue is fixed. Please also include relevant motivation and context. List any dependencies that are required for this change.
Fixes # (issue)
Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration
Checklist