Masking sensitive credentials in OpenNMS config dir

Description

Need to mask the credentials that are stored in the following files:

  • PostgreSQL

  • Elasticsearch

  • Cassandra

  • snmp-config.xml (community strings & v3 parameters)

Acceptance / Success Criteria

None

Lucidchart Diagrams

Activity

Show:

Jeff Gehlbach October 26, 2021 at 1:43 PM

This issue has implications for the config management (CM) effort ( et seq), which aims to move the config files from filesystem to relational storage:

  • Whichever mechanism gets used, we need to be sure that it's exposed as a service that the CM framework can easily consume

  • If work on this issue starts in earnest before the CM work is completed and merged, the people implementing the CM work should be kept apprised

Zoë Knox July 8, 2021 at 2:48 PM

Let's use this issue to investigate how this could be solved: deliverable is a strategy/plan and effort estimates to feed into that Epic.

Benjamin Reed July 6, 2021 at 6:19 PM

This issue is in our sprint to be looked at, but it's hard to turn into real action items based on what was given. Are there a set of actual requirements for this?

It should be turned into an epic and broken down into issues. (For example, what does "PostgreSQL" mean? our opennms-datasources.xml file? Something else?)

Details

Assignee

Reporter

HB Grooming Date

HB Backlog Status

FD#

Components

Affects versions

Priority

PagerDuty

Created June 10, 2021 at 4:34 AM
Updated August 23, 2022 at 4:05 PM