Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[nats] [nack] accounts vs authorization vs .creds, sensitive data not in secrets #899

Open
artiommocrenco opened this issue May 17, 2024 · 3 comments
Labels
defect Suspected defect such as a bug or regression

Comments

@artiommocrenco
Copy link

What version were you using?

1.1.11

What environment was the server running in?

k8s

Is this defect reproducible?

yes

Given the capability you are leveraging, describe your expectation?

I would expect there to be a documented way to configure everything related to passwords using kubernetes secrets

Given the expectation, what is the defect you are observing?

I am observing lack of documentation on the topic (accounts vs authorization) and lack of possibility to use kubernetes secrets

@artiommocrenco artiommocrenco added the defect Suspected defect such as a bug or regression label May 17, 2024
@artiommocrenco
Copy link
Author

I am observing that accounts has effect on the /etc/nats-config/nats.conf file, while /etc/nats/nats-server.conf still has this:

  authorization {
    user: ruser
    password: T0pS3cr3t
    timeout: 2
  }

@artiommocrenco
Copy link
Author

more confusion arises when trying to configure jetstream controller which asks for some .creds file

@artiommocrenco artiommocrenco changed the title [nats] accounts vs authorization, sensitive data not in secrets [nats] [nack] accounts vs authorization vs .creds, sensitive data not in secrets May 17, 2024
@artiommocrenco
Copy link
Author

I figured it out yesterday, posting in case someone else has similar issues.

/etc/nats/nats-server.conf may have no effect at all as it is not being read by nats in this case.

accounts is for multi-tenancy (see NATS docs). So I ended up using authorization

For nack, .creds file is not required: one can specify username & password in the URI. This, however, makes it hard to use kubernetes secrets.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
defect Suspected defect such as a bug or regression
Projects
None yet
Development

No branches or pull requests

1 participant