-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Let lifetime watcher retry until end of lease #11008
Let lifetime watcher retry until end of lease #11008
Conversation
4d529ea
to
70e9d61
Compare
@ncabatoff Any change that someone can look at this? We do have a production problem and our current workaround is a rolling restart of all our k8s production deployments every week, just to make sure we do not run into this vault-agent sidecar edge-case. This MR makes vault agents more resilient against temporary problems not being able to renew leases of tokens and secrets. |
Can someone please take a look at this Vault Agent resilience issue? Our workaround now is doing rolling upgrades of all our Kubernetes deployments when it nears the TTL of the vault token. Insane. The current implementation of I think the whole |
Ping... |
Any chance that this will be picked up? |
Hey @andrejvanderzee, I'm sorry to have left you hanging for so long. I've added a story to the current sprint to tackle this issue. I think this PR is on the right track, though I would like to see some tests. Maybe factor out the first bit of doRenew so that we can provide our own artificial renewFunc when testing. Would you like to work on those, or shall I? |
Hi @ncabatoff, no problem at all, we are just very happy that it is being picked up now, as it occasionally is causing problems in our prd environments. I won't have much time, so if you could add the tests that would be wonderful :-) As a side note: To mitigate the problem, we put Thanks for putting this in your sprint :-) |
Closing this in favour of #11445. |
This pull request retries renewals on error until the end of the lease (minus grace), instead of abruptly restarting the lifetime watcher (and revoking tokens/secrets as a result).
The problem is described in detail here: #10918.
@ncabatoff