-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Use TLS via OpenShift service annotation when gateway/multitenancy is… #962
Conversation
… disabled Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
… disabled Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #962 +/- ##
==========================================
- Coverage 73.36% 73.22% -0.14%
==========================================
Files 105 105
Lines 6487 6503 +16
==========================================
+ Hits 4759 4762 +3
- Misses 1438 1450 +12
- Partials 290 291 +1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
… disabled Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
.chloggen/ingest_tls_openshift.yaml
Outdated
# (Optional) One or more lines of additional information to render under the primary note. | ||
# These lines will be padded with 2 spaces and then inserted directly into the document. | ||
# Use pipe (|) for multiline entries. | ||
subtext: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you please document how users could setup TLS to report data with the OCP service CA?
Is it enabled by default on OCP?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I will include a brief explanation here. I think a more elaborate way on how to configure this on the client side (may be using otel collector) should be in the documentation and not in the subtext . Just my opinion.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added a brief explanation, as I said I would prefer a more deep explanation on the documentation. As this is only a changelog. But if you thing I should include something here I'm not opposites.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done.
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
16e1672
to
5903722
Compare
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
@pavolloffay Should we make TLS enable by default on OpenShift? following the principle of "making secure by default"? |
Do you mean using servicing certs on the Gateway public HTTTP and gRPC APIs (the users would need to use the service CA)? |
I don't understand well the question. From what I can see the gateway case is already implemented. This PR what it does is to use the service CA for the case when the gateway is not enabled. This means configure the distributor to use it directly (without the gateway) |
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
6335d66
to
ffcb50a
Compare
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM,
I would just document into release notes how the clients can inject CA cert.
How are we going to expose this in the monolithic CR? It would be great to come up with a similar config. Do you have CRD draft? |
I don't have a draft, but I would say we can apply the same, if TLS is enabled but not certName is specified AND we are on openshift. we can use the service Certificate. |
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
f53cba1
to
353a68f
Compare
Signed-off-by: Ruben Vargas <ruben.vp8510@gmail.com>
… disabled
Fixes #963
This PR doesn't cover monolitic. I would prefer to do it in a separate PR. in this way I can keep this PR small and move forward faster.