Looks cool, what about security? Since you’re experienced with it, how does it access the information of the nodes and how secure or insecure that may be? At the end of the day I don’t want to open a port on all nodes just to have it be used as root access to those machines…
Yeah, I was typing that on the phone… thanks for the link:
So, I guess the best approach is to just run it inside a management network / internal VPN to avoid exposing the port to the internet.