-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow the Keystore to be completely pluggable #5832
Comments
Let's go back to this as I see several efforts wanting to add more Keystore backends:
Here is my proposal based on PH's write up:
Open questions
any thoughts @urso @kvch @kaiyan-sheng @ChrsMark ? |
Thanks for summing up all these @exekias ! Overall your proposal sounds good to me. Commenting inline to some of your open questions.
I think it will be useful to have it. Having in mind the Kubernetes case, I don't think we should restrict a user to only use Kubernetes keystore, and hence k8s secrets, for managing passwords. I could retrieve some low-sensitivity passwords from k8s secrets but would like to retrieve super secure credentials from Vault let's say. In this, this point make sense to me.
If we include support for different kind of Keystores at the same time we need this I guess. |
+1 for multiple Keystore. I think the priority definition of Keystore is a must, named Keystore is a nice to have. |
Points 1. and 2. sound good. Having an interface for a keystore we can either create a
Following other configuration patterns we might end up with something like this:
or in case we want to have multiple keystores:
The first one would indeed be a breacking change. The second one not so much. We could allow
I think so. Follow up question: Do we want to allow a keystore configuration to use keys defined in another keystore? e.g. if keystore 1 is on disk, and keystore 2 is an external service that requires credentials, do we want to allow users to store those credentials in keystore 1?
This would indeed be a breaking change. As of today a keystore provides a callback like Btw, the |
I think namespace is needed here. For example, if we add support for system manager parameter store for AWS, then namespace here would be aws. This can be used for running beats in AWS. If users want to run beats locally, they can have the flexibility to use the current keystore from beats or AWS parameter store. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
The current keystore only support a file-based format; it would be nice to be able to plug any keystore and be able to use it.
Possible keystore:
Steps required:
Keystore
andEditableKeystore
, not all keystore can be edited on the CLI.The text was updated successfully, but these errors were encountered: