-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inconsistency in config for TLS vs Auth #4028
Comments
@jpkrohling can you please take a look at this issue and share your design input for auth configs. |
Looking at it now, I believe that it should indeed be squashed, like TLS. It did make sense in the past to be conservative about this and group all auth options under |
It seems there is no consistent design pattern among these projects for TLS and Auth configurations. I found Prometheus and Grafna try to group TLS and Auth configs together, but k8s Kubelet separates them out in the configuration when doing API server authenticating.
However, in Kubelet Configuration
We can combine TLS and Authenticator in I'd like to help on this issue. pls let me know if you want me help on anything. @jpkrohling @bogdandrutu @alolita |
The authenticator options will still be part of the extension's own configuration. |
Agree that we should place TLS and authenticator in the same config level to reduce the confusing. We can either simply squash Option#1 - simply squash
Option#2 - put both TLS and Authenticator under a new
|
I think that either
|
Thanks Anthony. I agree having TLS and Auth as siblings would provide more flexibility. You can have Auth with TLS but TLS can standalone without Auth. |
@bogdandrutu @tigrannajaryan @jpkrohling Can you weigh in on what your final recommendation is? Based on that we will file a PR. |
All these options will introduce the break changes. Option#1 has the minimal impact since |
I prefer the non-squashed versions, as it makes the context clear: we know that |
@bogdandrutu looks like non-squashed version is the way to do - can you weigh in with your comments so that we can make progress. |
This looks better to me. I don't like the squashed version since it is not clear what keys are about (what is key_file?) |
Thanks @tigrannajaryan. Has sent the PR above (#4063) for this option. Please help review it. |
@tigrannajaryan can you please help review and merge? |
@jpkrohling @tigrannajaryan @mxiamxia we need to make sure we are consistent with Server side correct? See https://github.com/open-telemetry/opentelemetry-collector/blob/main/config/confighttp/confighttp.go#L143. I think personally both should be "tls" |
Agree, consistency FTW! |
@mxiamxia please think about #4063 (comment) |
@mxiamxia please close this when you consider it done. |
Change TLSClient config to pointer type in `confighttp` and `configgrpc` config **Related Issue** #4028 #4063 (comment)
Hi @tigrannajaryan , I'm fine to close this issue and also take a look the comment you put in PR #4104 which is the existing behavior not related to this config inconsistency. |
It seems to be very confusing in confighttp and configgrpc that TLS is a special configuration embedded into the main config, and "Auth" is separated.
We need to look into this and confirm the right design/configuration for TLS and other Authentications. Another inconsistency that I remember is the KafkaReceiver/Exporter where these options are combined under an "authentication" sub-layer.
Investigate how other projects are dealing with this and try to use the "standard" across projects (Prometheus, Kafka, Grafana, K8S, etc.).
The text was updated successfully, but these errors were encountered: