On 23 Sep 13:10, Devin Trejo wrote: > Prometheus-dev, > > I’m excited about an upcoming change that will add TLS auth to the > Alertmanager clustering endpoint. Today we run Alertmanager on networks > where the hosts are provisioned with public IPs but are still firewalled > off from the internet. We understand in the past there were security > concerns for having Alertmanager default to listening on a public IP with > no auth. With the mutual TLS addition, are these concerns mitigated? > > The motivation here is to remove the need for custom startup configuration > we have for our Alertmanagers in these locations. Would the dev-community > be open to change removing the privateIP requirement if mutual TLS is > configured? I imagine this change looking as follows: > > 1. If clustering attempt to get privateIP > 2. If no privateIP is found and TLS is not configured, error like we do > today > 3. If no privateIP is found and TLS is configured, attempt to get publicIP > 4. If no publicIP is found error > > > Devin T.
Hello, I do not think that we should bind the two things. They are different layers. We could have a flag --cluster.allow-insecure-public-advertise-address instead, independent of whether tls is enabled. > > -- > You received this message because you are subscribed to the Google Groups > "Prometheus Developers" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > To view this discussion on the web visit > https://groups.google.com/d/msgid/prometheus-developers/71a6a032-20bd-4dc5-8113-11744129876en%40googlegroups.com. -- Julien Pivotto @roidelapluie -- You received this message because you are subscribed to the Google Groups "Prometheus Developers" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/prometheus-developers/20210923201652.GA341097%40hydrogen.

