-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable password-protected Redis for HA #11387
Comments
Is there any plan for adding this functionality any time soon? |
@edmondshtogu in my mind, yes. 😄 I'm not precisely sure when I/someone will get to this though. |
@crenshaw-dev - Thanks for capturing this issue. We're running the HA Argo CD install, and our security team flagged the unprotected Redis as an issue. If I understand it right, the only way right now to password-protect Argo CD Redis is to replace the HA install with the simple install, right? |
@jdoylei based on this comment, you might be able to modify your install manifests to get it to work with HA: #3130 (comment) |
@crenshaw-dev - Thanks for the tip! If I translate that comment into changes applied to Argo CD's HA namespace-install.yaml, it looks like there are 4 "tcp-check send PING" commands in the haproxy.cfg configmap entry. Would I need to replace each of the 4 occurrences, per that comment? |
Michael asked me to jot down some notes about redis gotchas with respect to password updates in redis-ha. Theres some challenges if you ever need to update ACL on a ha redis: Redis (or at least the way we use it) does not replicate ACL configuration to the other two nodes (unlike the actual redis data which does replicate). So if you are connecting to the shared hostname (e.g. Redis does have an So, the easiest way to update redis ACLs after a change, is to bounce all three redis servers after changing the acl on disk (but restarting redis ha statefulset can be slow, and can sometimes cause issues). Note that all of the above is only ever a problem if ACL needs to be changed or password needs to be rotated on an already running redis. |
@jessesuen and @crenshaw-dev - Just revisiting this, because we had some other reason to override haproxy.cfg (see #15319), and I had some second thoughts about the haproxy.cfg |
Closed by f1a449e |
Summary
Our HA manifests should support running Redis with password protection. The redis-haproxy config doesn't currently support auth.
Motivation
Password-protecting Redis is #3130. Adding password protection provides an additional layer of security to protect cached information (e.g. rendered manifests) from unauthorized access.
Proposal
Modify the redis-haproxy manifests to support passing auth information.
The text was updated successfully, but these errors were encountered: