Skip to content

Commit 1729745

Browse files
committed
Reapply 19742 enforce TLS for OTel HTTP receiver in distributed setup
test_otel_with_dcd_in_distributed_setup configured the HTTP receiver with basicauth but encryption=False, which is now rejected by the API after CMK-33249 (werk 19742). Enable encryption, extract the central site's CA certificate via a new ca_certificate_path fixture, and pass --cert-path / --site-name to the OTel HTTP client so it can establish the TLS session. Fixes the cascade failure in test_automatic_host_removal caused by the otel_password and DCD connections being left as pending changes when the receiver creation raised. This reverts commit 451b182. Change-Id: I2d29ecb2b8e9c65a71f1afd6228c473bc7ec9f7e
1 parent 14ddb80 commit 1729745

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

.werks/19742.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
[//]: # (werk v3)
2+
# Enforce TLS when using basic authentication for OTel Collector receivers
3+
4+
key | value
5+
---------- | ---
6+
date | 2026-04-09T16:36:29.851214+00:00
7+
version | 2.5.0b5
8+
class | feature
9+
edition | ultimate
10+
component | wato
11+
level | 1
12+
compatible | no
13+
14+
Checkmk now validates that TLS encryption is enabled whenever basic authentication
15+
is configured for OpenTelemetry Collector receiver endpoints (GRPC and HTTP).
16+
17+
Previously, it was possible to configure basic authentication without encryption,
18+
which would transmit credentials in plain text. The GUI setup and REST API now
19+
reject this combination and require you to enable TLS first.
20+
21+
If you have existing receiver configurations using basic authentication without TLS,
22+
you will need to enable TLS encryption before you can save any changes to them.

0 commit comments

Comments
 (0)