-
Notifications
You must be signed in to change notification settings - Fork 311
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS-only NATS #929
Comments
We have created an issue in Pivotal Tracker to manage this: https://www.pivotaltracker.com/story/show/178948246 The labels on this github issue will be updated when the story is started. |
Hi @46bit, 🎉 I am so happy that you are taking on this work! Not only will this make our internal system more secure, but it will also cut the number of nodes in the NATS cluster in half, which will provide more stability. Here is the list of NATS clients (that I know of):
✅ - can be configured to use TLS or non-TLS I've circulated this issue internally and no one (outside of my team) has jumped out saying that they maintain something that uses NATS, so hopefully this is a complete list. |
@ameowlia Thanks for the list! Here's some first impressions.
|
@ameowlia Good news! Both I've checked |
I had hoped we'd ship TLS NATS by default, but provide an opsfile to revert to plaintext NATS if anyone needed to. Unfortunately that is not possible.
|
Thanks for the update @46bit !
🤦♀️ yup, you are right. I was looking only for the "tls.enabled" property, but these don't have it because they ALWAYS use TLS. I fixed my table to reflect this.
You are right. It is currently (only?) used in Tanzu Application Service (see release notes here). I will bring up this work internally to get it prioritized.
🎉 Yay! This work is closer to being done then I thought. |
@ameowlia I've discovered that |
Current state of the world:
|
@davewalter agreed! and thanks to you, @ameowlia et al for getting this merged :) |
What is this issue about?
cf-deployment
deploys a NATS cluster that is available over both plaintext and TLS. This was necessary because not all components supported TLS NATS.Having a NATS cluster that supports both plaintext and TLS is complicated. NATS is only available on one at a time, so each NATS node is running two separate NATS agents (one for plaintext, one for TLS.) The cluster config has also been quite fragile (@ameowlia knows more about this.)
What change do you propose?
We want
cf-deployment
to default to deploying TLS-only NATS. This would simplify the cluster, and remove one of the remaining non-TLS components (furthering #906.)We'd provide an optional opsfile so that users can choose to run plaintext-only NATS. Users with custom components that don't yet support TLS NATS could still use plaintext NATS.
We will also finish upgrading mainstream open-source components to support TLS NATS (e.g.
service-discovery-controller
andmetric-discovery-registrar
.)How seriously is this work taken?
SAP want to get this done. For instance we've already switched Gorouter to use TLS NATS.
The text was updated successfully, but these errors were encountered: