On 23.05.22 15:24, Rudford Hamon wrote:
>
> So, I am part an open source project called OpenZiti, where you can embed
> zero trust networking into anything (apps-to-apps, server-to-apps,
> server-to-server, etc) and be completely invisible while using basic
> community internet. VPNs, Bastions, or jump servers, including old school
> firewalls are NOT required.
>
> At OpenZiti, we use Prometheus and love the project just as much as
> everyone else. Since we love embedded zero trust security and scrapping
> data via Prometheus, we did a "zitification" test to see what the world
> would look like if Prometheus was able to do its magic with embedded zero
> trust and be completely invisible and scrape anything/anywhere without
> inherently risky vulnerabilities.
I'm not an expert in network security, so please pardon my possibly
imprecise use of jargon, but it sounds to me OpenZiti is a VPN where
you link the VPN parts directly into the software using the VPN.
The Prometheus project traditionally hasn't even tried to address
network security. We decided to delegate it to other components,
partially because Prometheus is already complex enough, partially
because we, as an OSS project, lack capacity and qualification to deal
with the network security aspects. We went as far as even refusing TLS
to be part of Prometheus components. Since TLS is so ubiquitious by
now and essentially seen as part of the network stack, we eventually
decided to support TLS directly rather than asking our users to set up
revers proxies, sidecars, etc. to add TLS support.
The latter gives you an idea what the threshold is where we would
consider linking network security related code directly into the
upstream projects.
Our users have very different approaches how to secure their networks
and how to organize metrics scraping, and I believe that will be the
case for the foreseeable future. (I should mention here that
cross-cluster scraping is considered a rare exception in the general
Prometheus deployment model.) Many might prefer a modular solution
that doesn't require changing all involved binaries with an SDK.
A "zitification" of the upstream Prometheus server (and presumably all
the other components of the Prometheus stack) seems to serve a fairly
niche une case at this moment. You are of course free to offer
"zitified" components, but as long as OpenZiti isn't even remotely as
ubiquitious as TLS, I cannot really imagine 1st class support in the
upstream Prometheus repositories.
That's just my initial thoughts based on a possibly incomplete
understanding of OpenZiti. Happy to hear the thoughts of other
Prometheus developers and of course more explanations from your side.
--
Björn Rabenstein
[PGP-ID] 0x851C3DA17D748D03
[email]
bjo...@rabenste.in