[GH-ISSUE #258] TLS config for AWS Elastiscache #65

Open
opened 2026-03-02 05:18:30 +03:00 by kerem · 0 comments
Owner

Originally created by @rohitjha941 on GitHub (Jul 25, 2022).
Original GitHub issue: https://github.com/hibiken/asynqmon/issues/258

I am trying to use TLS to connect to AWS Elasticsearch. I have been using the following configurations with the go client. I am not defining the server name in the config as mentioned below.

redisConnOpt.TLSConfig = &tls.Config{
			MinVersion: tls.VersionTLS12,
}		

The makeTLSConfig makes it mandatory for me to provide a server name, which is not desired here.

func makeTLSConfig(cfg *Config) *tls.Config {
	if cfg.RedisTLS == "" && !cfg.RedisInsecureTLS {
		return nil
	}
	return &tls.Config{
		ServerName:         cfg.RedisTLS,
		InsecureSkipVerify: cfg.RedisInsecureTLS,
	}
}
Originally created by @rohitjha941 on GitHub (Jul 25, 2022). Original GitHub issue: https://github.com/hibiken/asynqmon/issues/258 I am trying to use TLS to connect to AWS Elasticsearch. I have been using the following configurations with the go client. I am not defining the server name in the config as mentioned below. ``` redisConnOpt.TLSConfig = &tls.Config{ MinVersion: tls.VersionTLS12, } ``` The `makeTLSConfig` makes it mandatory for me to provide a server name, which is not desired here. ``` func makeTLSConfig(cfg *Config) *tls.Config { if cfg.RedisTLS == "" && !cfg.RedisInsecureTLS { return nil } return &tls.Config{ ServerName: cfg.RedisTLS, InsecureSkipVerify: cfg.RedisInsecureTLS, } } ```
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/asynqmon#65
No description provided.