-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Access control on job registration #589
Comments
This is something that we will be tackling in Nomad 0.4. For now there is no ACL policies or enforcement in Nomad. |
Cool to know that this is on the roadmap, thanks for the quick response! |
I take it this didn't make it into 0.4.0, which was released recently. Is this still on the near-term roadmap? |
@doherty Yes, this is very much on the roadmap. |
Any chance this will go into an 0.4.x release soon? I'm looking into using nomad for deploying apps and this would be a really useful feature, even in very basic form. |
@kyhavlov It will not be in a 0.4.x release |
Just to lay out the things I'd be looking for in an ACL system for Nomad:
Does that align with what you guys were already planning for an ACL system in the future? I'd be interested in helping make it happen if that's the case. |
Is this feature planned in any release? |
It will most likely be in Nomad 0.7. Thanks, On Tue, Sep 20, 2016 at 9:32 AM, vrenjith [email protected] wrote:
|
Without ACL's it looks like a single subverted nomad 'agent' node effectively subverts the entire cluster, that makes for a very difficult security story. |
related issue: #227 |
Hey all! This has landed in Nomad 0.7! https://www.nomadproject.io/guides/acl.html |
I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues. |
Is there a best practice/recommendation for implementing access control on running jobs? Consul, for example, has ACLs to control who can register KVs and services. We can use Consul's ACLs to restrict service registration from Nomad jobs, but those jobs would still run on the Nomad clients (just not easily accessible without service discovery).
If ACLs or something similar is outside the scope of Nomad, what is the recommended way to control who can run jobs and how many jobs or resources as user can request? Thanks in advance!
The text was updated successfully, but these errors were encountered: