Replies: 1 comment 2 replies
-
We have been using influxdb 1.8 until now and really like the effortless setup for reading/writing to the database locally, but dislike that everyone can write remotely by default. When considering migration to influxdb 2.x, we would be forced to create and maintain a multitude of credentials on all IoT devices and apparently will no longer be able to use 32bit IoT devices. Blocking based on private addresses does not seem to help when port-forwarding of port 8086 is used through ssh, since the remote ssh client would still use local addresses. Hence local read/write access through an alternative local connection (IPC or some other local socket) would be great to offer local read/write access for e.g. users in the influxdb group (/etc/group) and additionally deny remote write access by default on port 8086 (unless user authentication is enabled in /etc/influxdb/influxdb.conf). Moreover, it will reduce the burden to maintain a multitude of credentials locally on influxdb level and in configuration files, for e.g. telegraf and local sensors, and remotely for influxdb datasources in grafana, etc.. |
Beta Was this translation helpful? Give feedback.
-
Dear all,
Thanks for this great real-time database, we use it to store sensor measurements on IoT devices in the field, that don't have permanent Internet access, and make the measurements available by tunneling/proxying the 8086 port to act as influx datasource for grafana and for queries via command-line or python scripts. Influxdb offers great possibilities for fine-grained authorization, we would additionally love the possibility for an easy setup without maintenance of credentials that can easily be made read-only to avoid (remote) tampering.
To this end it would be great when users of the operating system that are in the influxdb group can access influx as admin without having to log in. This could e.g. be supported by adding an IPC port (i.e. read-write for the influxdb group), that supports the same HTTP interface as TCP port 8086 does. All clients (e.g. the ones using an influxdb_client library) can then choose to use the IPC or TCP port (or fallback to TCP/IPC when the other is not available). Such an IPC port could look like ipc:///tmp/influx_port and would by default be readable/writable by the influxdb user and group. On Linux systems additional users could be made admin by adding them to the influxdb group in /etc/group, I expect something similar to be available on other systems.
Once this IPC port exists, it would be great to have an option in the influxdb configuration file to make the TCP port read-only for anonymous access, i.e. only support read queries on databases without having to setup credentials.
I can think of the following advantages for password-less access on same machine:
I can think of the following advantages for anonymous read-only access over TCP:
Kind regards,
Dennis Bijwaard
Beta Was this translation helpful? Give feedback.
All reactions