-
Notifications
You must be signed in to change notification settings - Fork 905
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[MD] Support connection to AWS OpenSearch domain with user based Sigv4 #2921
Comments
Hey @zhongnansu is there a way to make this configurable in a way that treats this as an integration. So that it easy for future providers add their own integration. Is this safe to do? Also, as a cluster admin or someone with higher permissions I think I would like the ability to even filter the list that in this drop down. If this lists get large or if I have any legal worries about referencing/using 3rd party services then I can prevent my users from seeing specific auth methods (ie AWS). |
@zhongnansu I think since we are now adding more authentication types, we should re-visit the design using We should set a default for this selection, and I am wondering what your thoughts are here @zhongnansu ? @kavilla Great thoughts here - I think the administration end of this is out of scope for 2.5, but I think we need to consider it as part of the roadmap. I believe I will need to work with @kamingleung on administration settings. |
@KrooshalUX Currently, we don't have future plans for more auth types other than no_auth, basic_auth, sigV4. The Not only Usename & Password, all auth types are intended only for OpenSeach clusters. Currentlu We support 1 datasource type (OpenSearch), but multiple auth types. Default selection auth type is currently |
Existing client management in data source module doesn't fully work with spawning AWS opensearch client. Researching on additional cache strategy for aws clients only |
Reopening to track this for a release - the PR merged to |
Task Breakdown
Frontend:
Backend:
Limitation
Connection
class(in our case the class is SigV4AWSConnection). I plan to disable sigv4 credential update for existing datasource in the 1st iteration. So that we can still benefit from client pooling.Need UX/UI input
basic auth
to implementAWS
auth type, in MD. I'll add additional auth type as a new radio button for user to select. All user inputs will be masked on UI, and encrypted in the backend. To update the auth info, user will need to re-enter all credentials. Are you good with this @KrooshalUXThe text was updated successfully, but these errors were encountered: