-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTP basic auth #343
Comments
Using basic auth would necessitate SSL setup to provide any sane safety. We don't have the bandwidth to support SSL in all exporters at this time. This is something I would like to see change, but it is not something the community can agree on right now. "Most" Prometheus setups are not exposed to the Internet, and there should be no user PII exposed by the node_expoerter. |
mark |
TLS support is being revisited btw, see #1198 |
Now TLS is supported, please revert back basic auth. |
@SuperQ Thoughts? I'm conflicted. I'd rather require client certs than using basic auth these days I think. |
We agreed in the same dev summit about TLS that basic auth and/or bearer tokens was something we were OK with. I'm not personally invested in implementing it, but we should open a new basic auth design issue. My idea for how to implement this involved being able to support Apache-style htpasswd files with some kind of ability to reload or watch them. I'd like to get the "how to inject the secrets" figured out. |
We didn't say we'd support bearer tokens, only TLS and basic auth. |
@SuperQ Well I would have re-open this one but if you prefer a new one, please open one. |
@discordianfish I couldn't find the new issue about basic auth, nor this issue is re-opened. If there is an open issue about the basic auth implementation, please mention that here. |
The new tls_config allows to set tlsConfig :
# Certificate and key files for server to use to authenticate to client
tlsCertPath : <filename>
tlsKeyPath : <filename>
# Server policy for client authentication. Maps to ClientAuth Policies
# For more detail on clientAuth options: [ClientAuthType](https://golang.org/pkg/crypto/tls/#ClientAuthType)
[ clientAuth : <string> | default = "NoClientCert" ]
# CA certificate for client certificate authentication to the server
[ clientCAs : <filename> ] |
Actually, I meant a user/pass authentication method (for simpler usage), but thanks anyway, I used self-signed client cert for auth. |
There is this "basic_auth_users" at the HTTPS package README (https://github.com/prometheus/node_exporter/blob/master/https/README.md) Where and how do I supply these credentials on the prometheus server side when adding a node exporter that uses basic_auth_users? |
Cool so it is fixed with #1683 |
Thank you very much @m-yosefpor |
According to the table in https://xfs.org/index.php/Runtime_Stats, the first number of `rw` stats is write and the second is read. I noticed Prometheus seemed to be reporting the opposite of what I expected. Signed-off-by: William Starling <william@bugsnag.com>
Hi ,
in reference to #100 and #160
why removing basic auth from exporters ? whereas exporters binding in port and exposes they metrics, a minimal auth or any controlled access method to metrics its needed. At least basic auth must be in all exporters to easily control metrics access. I can"t imagine installing nginx or other proxy in all servers who only needs node_exporter, seems totally overkill. Or am I missing something?
The text was updated successfully, but these errors were encountered: