You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@skywalking.apache.org by "hanahmily (via GitHub)" <gi...@apache.org> on 2023/03/05 01:59:22 UTC
[GitHub] [skywalking] hanahmily commented on issue #9187: [Feature] Enhance etcd auth configuration
hanahmily commented on issue #9187:
URL: https://github.com/apache/skywalking/issues/9187#issuecomment-1454957116
FWIK, Etcd's JWT token is "stateless", being never stored in any storage. Refreshing/Renewing such a token is not necessary. For example, k0s creates a token during booting, https://github.com/k0sproject/k0s/blob/main/pkg/component/controller/etcd.go#L194, never renewing it.
But the key/cert pair should have a chance to get renewed. Users could leverage [vault](https://www.vaultproject.io/) or other tools to generate a new key/cert pair which the BanyanDB server can load to create new tokens.
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: notifications-unsubscribe@skywalking.apache.org
For queries about this service, please contact Infrastructure at:
users@infra.apache.org