Closed
Description
Please ensure you do the following when reporting a bug:
- Provide a concise description of what the bug is.
- Provide information about your environment.
- Provide clear steps to reproduce the bug.
- Attach applicable logs. Please do not attach screenshots showing logs unless you are unable to copy and paste the log data.
- Ensure any code / output examples are properly formatted for legibility.
Overview
The monitoring user ccp_monitoring
is hard coded to use md5
authentication at this line:
https://github.com/CrunchyData/postgres-operator/blob/master/internal/pgmonitor/postgres.go#L41-L44
This violates STIG V-233519, which is expecting any password authenticated users to use scram-sha-256
.
This happens even if we explicitly tell Postgres to use scram-sha-256
for authentication via the CRD:
patroni:
dynamicConfiguration:
postgresql:
parameters:
password_encryption: "scram-sha-256"
However, the _crunchypgbouncer
user will get created with scram-sha-256
, it seems to only be the ccp_monitoring
user which has this problem.
Environment
Please provide the following details:
- Platform: GKE
- Platform Version: 1.22
- PGO Image Tag: ubi8-5.2.0-0
- Postgres Version 14
- Storage: PVC
Steps to Reproduce
REPRO
Provide steps to get to the error condition:
- Create a new cluster via CRD with
patroni.dynamicConfiguration.postgresql.parameters.password_encryption: "scram-sha-256"
- Shell into one of the instances
- execute
cat /pgdata/pg14/pg_hba.conf | grep md5
EXPECTED
- Would expect all system accounts created to follow the configuration provided to the CRD
ACTUAL
- User
ccp_monitoring
is hard coded to usemd5
for authentication
Logs
n/a
Additional Information
n/a