-
Notifications
You must be signed in to change notification settings - Fork 42
NETOBSERV-2503: use TLS by default in Service mode; make Service the default mode #2204
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
@jotak: This pull request references NETOBSERV-2503 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
| DeploymentModelServiceNoTLS FlowCollectorDeploymentModel = "Service-NoTLS" | ||
| DeploymentModelServiceTLS FlowCollectorDeploymentModel = "Service-TLS" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It feels strange to me to have that here in the list.
What's the goal of having a NoTLS mode ?
If we want to promote TLS first, I would rather put an option in the advanced config of FLP like insecureService or even hide that in an environment variable.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done: be1847a
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks !
So if I understand correctly you'll need to set SERVER_NOTLS env variable in both eBPF and flp advanced sections ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no, just FLP. Agent reads it from FLP (like it does for the port)
Always use TLS, except if SERVER_NOTLS env is set on FLP
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/hold |
|
/unhold |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #2204 +/- ##
==========================================
+ Coverage 73.21% 74.19% +0.97%
==========================================
Files 84 84
Lines 9391 9418 +27
==========================================
+ Hits 6876 6988 +112
+ Misses 2087 2005 -82
+ Partials 428 425 -3
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
|
@jotak: This pull request references NETOBSERV-2503 which is a valid jira issue. Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Description
SERVER_NOTLSenv on processor advanced configDependencies
Checklist
If you are not familiar with our processes or don't know what to answer in the list below, let us know in a comment: the maintainers will take care of that.