Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure actuator endpoints #36

Open
simonhir opened this issue Jul 29, 2024 · 4 comments
Open

Secure actuator endpoints #36

simonhir opened this issue Jul 29, 2024 · 4 comments
Labels
Component: API-Gateway Issues regarding the API Gateway Priority: High The issue contains work with high priority. Type: Feature The issue is a feature

Comments

@simonhir
Copy link
Member

simonhir commented Jul 29, 2024

Is your feature request related to a problem? Please describe.

At the moment the actuator and metrics endpoints are reachable via the default application port.
This means everyone can access all these endpoints.

Describe the solution you'd like

Use a custom management port which is only used internally and can't be accessed externally.
Since the /actuator/info endpoint is also affected by this, it must be considered how to deal with this in the future, e.g. for the appswitcher.

@simonhir
Copy link
Member Author

simonhir commented Jul 30, 2024

@DanielOber @devtobi have you already implemented this in a project or do you have an idea for the info endpoint?
The rest of the implementation should be no problem.

@simonhir simonhir changed the title Implement management port Secure actuator endpoints Jul 30, 2024
@DanielOber
Copy link
Contributor

access all these endpoints.

they can call the endpoints but they get a 401 back if they are not authorized. Can you explain the problem? Or do you mean sth like that

@simonhir
Copy link
Member Author

they can call the endpoints but they get a 401 back if they are not authorized

No as the actuator endpoints need to be accessed by kubernetes they are accessible without authentication. Which means also that every one can access all prometheus metrics.

Or do you mean sth like that

Was the way i thought about but maybe there is some alternative.

@simonhir
Copy link
Member Author

In my opinion usage of the management port ist the only suitable option as securing the actuator endpoints via roles would be very difficult.
The availability of the info endpoint could then by achieved via a route or a custom info rest controller.

To be honest, I don't like either, but an open actuator endpoint is even worse.

@devtobi devtobi added Component: API-Gateway Issues regarding the API Gateway Priority: High The issue contains work with high priority. Type: Feature The issue is a feature and removed feature labels Aug 21, 2024
@devtobi devtobi moved this to Open in it@M RefArch Aug 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Component: API-Gateway Issues regarding the API Gateway Priority: High The issue contains work with high priority. Type: Feature The issue is a feature
Projects
Status: Accepted
Development

No branches or pull requests

3 participants