You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description
A security best practice is to use mTLS to establish a secure connection a a remote party. Especially when integrating with 3party systems this is a common practice which should be supported by a MetricPipeline.
The OTLP output of the MetricPipeline supports TLS in general and a header based authentication. However, it does not provide functionality for mutual TLS yet. Also the typical settings for verifying the server-side certificate are missing.
An API to support this scenarios could look like this, which adds a general tls section introducing the missing settings for TLS and mTLS.
The related files should be provided by secrets where the secret attributes need to get mounted as files into the gateway pod.
apiVersion: telemetry.kyma-project.io/v1alpha1kind: MetricPipelinemetadata:
name: examplespec:
output:
otlp:
endpoint:
value: https://xxxheaders:
...authentication:
basic:
...# TLS settingstls:
# if TLS is used, the optional CA that verifies the server certificateca:
valueFrom:
secretKeyRef:
key: xname: ynamespace: z# if TLS is used, wether to skip verifying the certificate or notinsecureSkipVerify: false# mTLS is used, the TLS cert to use for TLS required connectionscert:
valueFrom:
secretKeyRef:
key: xname: ynamespace: z# mTLS is used, the TLS key to use for TLS required connectionskey:
valueFrom:
secretKeyRef:
key: xname: ynamespace: z
Criterias:
Influencing the TLS Server-Side Certificate verification is possible by skipping it or providing a custom CA
Providing certificate and key for mTLS is possible
Needed Certs/keys can be provided by secret mappings
Rotation of certs/keys is possible dynamically
Documentation is updated
Integration test assures functionality
Reasons
It should be possible to follow security best practices using the functionality
Description
A security best practice is to use mTLS to establish a secure connection a a remote party. Especially when integrating with 3party systems this is a common practice which should be supported by a MetricPipeline.
The OTLP output of the MetricPipeline supports TLS in general and a header based authentication. However, it does not provide functionality for mutual TLS yet. Also the typical settings for verifying the server-side certificate are missing.
An API to support this scenarios could look like this, which adds a general
tls
section introducing the missing settings for TLS and mTLS.The related files should be provided by secrets where the secret attributes need to get mounted as files into the gateway pod.
Criterias:
Reasons
It should be possible to follow security best practices using the functionality
Attachments
supported settings of the otlpexporter: https://github.com/open-telemetry/opentelemetry-collector/blob/main/config/configtls/README.md
Related feature in TracePipeline: kyma-project/kyma#17995
The text was updated successfully, but these errors were encountered: