Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Enhancement]: TLS Authentication in Backup Tool #493

Open
gifi-siby opened this issue Jan 6, 2025 · 3 comments
Open

[Enhancement]: TLS Authentication in Backup Tool #493

gifi-siby opened this issue Jan 6, 2025 · 3 comments

Comments

@gifi-siby
Copy link
Contributor

What would you like to be added?

I would like to add TLS support for Milvus-Backup tool

Why is this needed?

Milvus-Backup currently doesn't support TLS and thus, I am not able to connect using certificates.
We are using self signed certificates for authentication in Milvus like below:

uri = "https://ibmlhadmin:password@localhost:19530"
user = "user"
password ="password"
client = MilvusClient(
                      uri=uri,
                      user=user,
                      password=password,
                      secure=True,
                      db_name="default",
                      server_pem_path='/root/tls/cert.crt',
                      server_name='localhost',)

Anything else?

No response

@huanghaoyuanhhy
Copy link
Collaborator

This change has been released in v0.4.30, but was not included in main due to conflicts. Will be cherry-picked to main later.

@huanghaoyuanhhy
Copy link
Collaborator

@gifi-siby

The related commits have been merged into the main branch and will be included in the upcoming v0.5.0 release. However, to ensure a clear distinction from the mTLS-related parameters, I have renamed the original configuration key tlsCertPath to caCertPath in the configuration file.

@gifi-siby
Copy link
Contributor Author

@huanghaoyuanhhy Got it, thanks for the update!
Let me know if there’s anything else I can help with!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants