-
Notifications
You must be signed in to change notification settings - Fork 101
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consideration for making backup-restore https server to be mTLS enabled #814
Comments
Is mTLS is required at this stage given that the server is only being consumed by
Why do we assume that |
After an out-of-band discussion with @unmarshall, we have come to conclusion that having the server This can be considered when the work on |
I think you meant when the work on etcd-steward starts :) Additionally for etcd-wrapper <-> etcd-backup-restore communication line using mTLS might be an overkill as they already share a network namespace. So if we have to enable mTLS then it has to be for use cases where consumers call HTTP(s) APIs exposed out of etcd-backup-restore. |
Enhancement (What you would like to be added):
Backup Restore https server can be considered for mTLS enablement.
Motivation (Why is this needed?):
Currently the
backup-restore
https server is only TLS enabled, I would like it to be mTLS where the server also verifies the client certificates to enhance the security.In the Gardener landscapes, we do generate the client certificates to be used by clients connecting to
backup-restore
server and is mounted to the respective container but thebackup-restore
server is not configured to verify client's identity thus the cert-key pair is rendered useless.When deployed through druid, the clients that currently connect to the
backup-restore
container is onlyetcd-wrapper
which triggers the initialisation procedure, getting etcd config, etc. But, in future there are plans to take out of schedule snapshots frometcd-druid
as well for which it needs to make the api request to thebackup-restore
server, so making the server mTLS makes more sense keeping the future plans in mind.Approach/Hint to the implement solution (optional):
The text was updated successfully, but these errors were encountered: