-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Option to secure metrics endpoint #69
Comments
Exposing With mollysocket, there is nothing sensitive in queries, and nothing sensitive in metrics. So, this does not apply here. If you are concerned with any information returned by the endpoint, you can restrict access with your reverse proxy |
Having to disagree here a bit:
Well if I'm an attacker, I can utilize the metrics to see if my attacks work or not. Also the endpoint is irrelevant for the normal user, so limiting it should be no problem.
Yes, I already did that, however other people might not think about this immediately so having an option would be kind of nice :) |
What kind of attack would there be ? And honestly, anyone trying to do any "attack" on ms would do tests on their own instance, making this kind of check irrelevant don't you think ? |
Exposing the
/metrics
endpoint publicly (as is the currently the case) is not a good idea, since attackers could possibly get information from there.Recommended solution:
Make it possible to secure the endpoint with authentification (e.g. Basic Auth) or/and make it possible to expose it on a different port
Related:
https://prometheus.io/docs/operating/security/
The text was updated successfully, but these errors were encountered: