TLS Listener for Kine #423
log1cb0mb
started this conversation in
Feature Requests
Replies: 1 comment 3 replies
-
I'm a bit concerned here, mostly because of the scope of this requirement. Kine is binding on the loopback network of the Tenant Control Plane container, which is not exposed externally. I understand the requirement of having encrypted traffic to avoid packet inspection, but the scope of loopback binding makes it inaccessible even if I start a packet dump on the host: I try to be pragmatic here. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Continuation or related to proposal here: #422
Currently Kine listener even though only tied to localhost, should enable TLS listener from "security perspective"
Current implementation of datastore could be actually be renamed and
tlsConfig
could be moved fromclientCertificate
toserverCertificate
with flags changing to:With this,
--etcd-cafile
argument could be set accordingly under kube-apiserver spec.Even though not an essential requirement as kine being accessed via a unix socket where filesystem permissions can be used to restrict access however would be useful if the configurations can be controlled by user.
Beta Was this translation helpful? Give feedback.
All reactions