-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KEDA doesn't seem to support TLS for '/metrics' endpoint for any of it's components? #5304
Comments
Hi @AshutoshNirkhe , |
Hi @JorTurFer thanks for your reply. I was going through 'kube-rbac-proxy' today as you suggested. |
we already have integrated |
I think in general it's great to build on existing components, without reinventing the wheel. At the same time, a sidecar just for implementing TLS termination (which is typically done natively by the code in most projects) brings a certain level of operational complexity and overhead. |
@zroubalik @tomkerkhove WDYT? |
Sorry, I am not getting the proposal - Is it to not use |
Agree with @tomkerkhove on this one. Can we please the proposal and options we have? What kind of changes each solution requires in KEDA (in general, new resources, containers etc). |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
This issue has been automatically closed due to inactivity. |
@JorTurFer any reason why you have re-opened this one? I think we have an agreement that this is out-of-scope for KEDA? |
I thought that we agreed with not implementing by ourself and using any well-known component, but supporting TLS for metrics endpoint is something that we should do IMHO. It was detected during the security audit too. Maybe I misunderstood the agreement, if I'm the only one who understood that, feel free to close the issue again xD |
I think we need to follow-up with kube-rbac-proxy to ensure this gets implemented, no? |
I think so :), that's why I reopened the issue to track the we implement kube-rbac-proxy |
Discussed in #5302
Originally posted by AshutoshNirkhe December 20, 2023
I checked a few references (below links) and glad to understand that TLS is inherently supported/enabled among different KEDA components. In fact, it supports us to provide our custom CA and own certificates.
https://keda.sh/blog/2023-05-02-certificate-improvements/
https://github.com/kedacore/keda-docs/pull/1057/files#diff-8156f5370ce315e79d101fdc9cd7bca585e1efc378ad48f8c82b977099378b44
But I didn't get a clarity where we can enable TLS for '/metrics/' endpoint (e.g. port 8080 for keda-operator, port 9022 for keda-operator-metrics-apiserver and port 8080 for keda-admission-webhooks)
I tried passing in our custom CA and certs (with helm by using https://github.com/kedacore/charts/blob/main/keda/values.yaml#L686), and it did seem to work for the main ports (e.g. communication between keda-operator:9666 and keda-operator-metrics-apiserver is using TLS). But for metrics server, I see this in logs,
2023-12-20T03:46:57Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", **"secure": false**}
I also got the link #2850 (comment) , where it seems like this is not required because its exposed internally. But if we expose those ports in the service, it can be hit from outside like by Prometheus to collect metrics right? Shouldn't they support TLS in that case?
cc : @JorTurFer as I found most of the TLS links/PRs from you :)
The text was updated successfully, but these errors were encountered: