-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Functionbeat] Deployment to AWS cannot read keystore #15808
Comments
The current permission of the keystore in the package is However, if we set the suggested permission, the keystore becomes readable by everyone. This is not necessarily a problem given that in order to leak secrets as access to the files of the AWS Lambda instance (which is kind of hard, but not impossible) is required. But I would not change the permissions in order to make this feature work. I suggest advising users against using keystore on AWS or any cloud provider. Let users leverage existing secret stores on these providers (e.g. AWS Systems Manager Parameter Store: https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameter-store.html). Otherwise, we are risking users info getting out. I would rather add one more element to the FAQ about handling secrets on cloud providers. |
I think asking user to move to the AWS System Manager Parameters seems like a good idea.
|
Yes, it has just been released. It's called Secret Manager: https://cloud.google.com/secret-manager/docs
Yes, I believe so. However, it needs further investigation to see how long would it take to implement it. In the meantime, we should recommend users to store the secrets in environment variables. This is what is suggested by cloud providers. |
@kvch Sound good +1. Lets make an issue to track the second item. |
Opened follow-up issue: #15879 |
I am closing this, as we are not fixing the specific problem with file backend of keystore. The progress of the new backends can be tracked in the follow-up issue mentioned above. |
With functionbeat cloudwatch function deployed to AWS using a keystore, the deployed function cannot open the keystore. Seems to be an issue with permissions.
Info
OS: Mac OS X
Version: 7.6.0 BC
Reproduce
Configuration
Logs
The text was updated successfully, but these errors were encountered: