-
Notifications
You must be signed in to change notification settings - Fork 217
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pluggable JMX credentials backend #809
Comments
Hi @denniskline, we sure need something like this because what we have now is faaaaar from agile (and not secured much). We would love to have a contribution on this 😍 |
@adejanovski - That's great news! I'll take a stab at it and keep this issue thread updated with questions along the way. Thank you very much. |
…ngside JMX Port in the backend storage system.
…ration in the reaper yaml
… when adding a new cluster in the UI
…ngside JMX Port in the backend storage system.
…ngside JMX Port in the backend storage system.
…ration in the reaper yaml
… when adding a new cluster in the UI
…ngside JMX Port in the backend storage system.
…ngside JMX Port in the backend storage system.
…ngside JMX Port in the backend storage system.
…rt in the backend storage system.
…rt in the backend storage system.
Provide a mechanism for allowing reaper users to define where/how the JMX credentials are stored.
This was briefly discussed as part of issue 143: #143
When reaper is used to orchestrate repairs across many clusters where clusters are added and removed often and each cluster has different JMX credentials, it is cumbersome to make modifications to the config.yaml on all the running instances of reaper and then restart each instance to pick up the change.
It would be great if there were options for users to be able to choose where reaper pulled JMX credentials. Reaper would also need the ability to be able to pull in new JmxCredentials as they are added.
Along these lines (and perhaps this should be split into a different issue), it would also be nice if these JMX credentials could be encrypted as leaving them as plain text raises red flags with audit it some companies.
If this is something that the community would like, I'd be more than happy to contribute to this issue
The text was updated successfully, but these errors were encountered: