-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure actuator endpoints #36
Comments
@DanielOber @devtobi have you already implemented this in a project or do you have an idea for the info endpoint? |
they can call the endpoints but they get a 401 back if they are not authorized. Can you explain the problem? Or do you mean sth like that |
No as the actuator endpoints need to be accessed by kubernetes they are accessible without authentication. Which means also that every one can access all prometheus metrics.
Was the way i thought about but maybe there is some alternative. |
In my opinion usage of the management port ist the only suitable option as securing the actuator endpoints via roles would be very difficult. To be honest, I don't like either, but an open actuator endpoint is even worse. |
Is your feature request related to a problem? Please describe.
At the moment the actuator and metrics endpoints are reachable via the default application port.
This means everyone can access all these endpoints.
Describe the solution you'd like
Use a custom management port which is only used internally and can't be accessed externally.
Since the
/actuator/info
endpoint is also affected by this, it must be considered how to deal with this in the future, e.g. for the appswitcher.The text was updated successfully, but these errors were encountered: