-
Notifications
You must be signed in to change notification settings - Fork 765
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Redis Enterprise to set tls_verify to false by default in check code (ECOINT-109) #2607
base: master
Are you sure you want to change the base?
Update Redis Enterprise to set tls_verify to false by default in check code (ECOINT-109) #2607
Conversation
…add corresponding test
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I left some minor comments.
Since this is a breaking change we should ask the maintainers what they think.
Please reach out to [email protected]
Error contacting maintainersI attempted emailing the maintainers [email protected] as requested and my email bounced back. ![]() Hopefully mentioning @redis-field-engineering will get some eyes on the PR from their end. Original email requestHello Redis Engineering (@redis-field-engineering), I hope you're doing well. I'm reaching out regarding PR #2607, which introduces a breaking change to the Redis Enterprise Datadog integration. Given the potential impact, I wanted to get your input on the approach and any concerns you might have before moving forward. Could you take a look and share your thoughts? If there's anything we should adjust to ensure a smooth transition for users, I'd really appreciate your feedback. Looking forward to your insights. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Installation command in readme also needs to be updated with correct version
Thank you @mitcherthewitcher and @dd-dominic for reviewing and coordinating these changes. If a user goes through the trouble of setting up a tls connection to Redis they would likely expect the authenticity of that connection to be verified unless they explicitly specify Having this value default to @mitcherthewitcher - would it be possible to rework this PR and the tests so that the documentation is changed to correctly specify that the default value for Last comment here, it seems like mentioning @redis-field-engineering did not actually notify us. We are also working on updating the permissions on that email list you got a bouncer back on. In the future mentioning @jeremyplichta and @j8-redis will be the best way to go. We will also work with DataDog to see if we can get these users added to a |
@jeremyplichta Happy to make these changes. Is it still necessary to do a |
Yes, I think |
What does this PR do?
A brief description of the change being made with this pull request.
This PR explicitly sets the default for
tls_verify
toFalse
in check code.Motivation
What inspired you to submit this pull request?
I encountered a scenario where I overwrote the default
conf.yaml
that is generated during integration installation and provided a minimal check configuration toredis_enterprise
.I provided the following instance configuration:
Per the default conf.yaml, I expected

tls_verify
to be equal toFalse
when running the check, but encounter SSL errors in agent status.These errors are resolved by updating our config
I am proposing we update the check code to explicitly use
self.instance.get("tls_verify", False)
to make the integration behavior consistent and align with documentation.I added a unit test to illustrate this. Please run
ddev test redis_enterprise
and observe the passing tests. Then comment out this change and rerunddev test redis_enterprise
and observe test failure.Review checklist
no-changelog
label attachedAdditional Notes
Anything else we should know when reviewing?
I don't exactly like the idea of having insecure SSL be the default behavior for the check.
This in mind, a more security conscious alternative to the above is still setting a default in code with,
self.instance.get("tls_verify", True)
, only this time we set default toTrue
, and then make updates tospec.yaml
and documentation to reflect this. Happy to proceed with either option. 😄