-
Notifications
You must be signed in to change notification settings - Fork 551
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
the adapter doesn't support access to prometheus which enabled ssl/tls #52
Comments
@luxas @DirectXMan12 hi, is this issue make sense? I will create a PR to fix it, what do you think? |
fix kubernetes-sigs#52 Currently, the adapter use http.DefaultClient to access prometheus instance and it doesn't support https client to access ssl/tls is enabled prometheus. It is a gap here if prometheus behind a proxy or prometheus is enable ssl/tls according to official guideline. This is a common case that prometheus in production, this patch will fix the gap described above.
The issue makes sense. I think we should have something like a |
@DirectXMan12 case 1: ssl/tls based case 2 : simple based case 3: based my patch only cover case 1 now, did you mean we should support all above and leverage kubeconfig codes and implementation? |
Yeah, I'm saying it might not be a bad idea to just have a separate argument for |
@DirectXMan12 I am ok for your postal, append some code snippet for you check in advance. (will make it more modularization later)
any comments is welcome, thanks. |
fix kubernetes-sigs#52 Currently, the adapter use http.DefaultClient to access prometheus instance and it doesn't support https client to access ssl/tls is enabled prometheus. It is a gap here if prometheus behind a proxy or prometheus is enable ssl/tls according to official guideline. This is a common case that prometheus in production, this patch will fix the gap described above.
fix kubernetes-sigs#52 Currently, the adapter use http.DefaultClient to access prometheus instance and it doesn't support https client to access ssl/tls is enabled prometheus. It is a gap here if prometheus behind a proxy or prometheus is enable ssl/tls according to official guideline. This is a common case that prometheus in production, this patch will fix the gap described above.
fix kubernetes-sigs#52 Currently, the adapter use http.DefaultClient to access prometheus instance and it doesn't support https client to access ssl/tls is enabled prometheus. It is a gap here if prometheus behind a proxy or prometheus is enable ssl/tls according to official guideline. This is a common case that prometheus in production, this patch will fix the gap described above.
fix kubernetes-sigs#52 Currently, the adapter use http.DefaultClient to access prometheus instance and it doesn't support https client to access ssl/tls is enabled prometheus. It is a gap here if prometheus behind a proxy or prometheus is enable ssl/tls according to official guideline. This is a common case that prometheus in production, this patch will fix the gap described above.
fix kubernetes-sigs#52 Currently, the adapter use http.DefaultClient to access prometheus instance and it doesn't support https client to access ssl/tls is enabled prometheus. It is a gap here if prometheus behind a proxy or prometheus is enable ssl/tls according to official guideline. This is a common case that prometheus in production, this patch will fix the gap described above.
Currently, the adapter uses http.DefaultClient to access Prometheus. This means that it does support using TLS client certificates, custom CA certificates, or token-base authentication, which are all common setups when connecting to Prometheus behind an auth proxy. This commit adds support for using a separate kubeconfig, or in-cluster config, to configure auth when connecting to Prometheus. Fixes kubernetes-sigs#52
Currently, the adapter uses http.DefaultClient to access Prometheus. This means that it does support using TLS client certificates, custom CA certificates, or token-base authentication, which are all common setups when connecting to Prometheus behind an auth proxy. This commit adds support for using a separate kubeconfig, or in-cluster config, to configure auth when connecting to Prometheus. Fixes kubernetes-sigs#52 [directxman12: cleanups, spelling corrections, and slight refactor]
I checked the codes, that adapter use http.DefaultClient to access prometheus instance and it doesn't support https client to access ssl/tls enabled prometheus. It is a gap here if prometheus behind a proxy or
prometheus enable ssl/tls according to official guideline Why don't the Prometheus server components support TLS or authentication? Can I add those?
This is a common case that prometheus in production, do we have any plan for this? Thanks in advance.
The text was updated successfully, but these errors were encountered: