You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@skywalking.apache.org by "hanahmily (via GitHub)" <gi...@apache.org> on 2023/03/05 01:59:22 UTC

[GitHub] [skywalking] hanahmily commented on issue #9187: [Feature] Enhance etcd auth configuration

hanahmily commented on issue #9187:
URL: https://github.com/apache/skywalking/issues/9187#issuecomment-1454957116

   FWIK, Etcd's JWT token is "stateless", being never stored in any storage. Refreshing/Renewing such a token is not necessary. For example, k0s creates a token during booting, https://github.com/k0sproject/k0s/blob/main/pkg/component/controller/etcd.go#L194, never renewing it. 
   
   But the key/cert pair should have a chance to get renewed. Users could leverage [vault](https://www.vaultproject.io/) or other tools to generate a new key/cert pair which the BanyanDB server can load to create new tokens.
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscribe@skywalking.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org