Replies: 6 comments 13 replies
-
can you resolve this by restarting secretstore-setup |
Beta Was this translation helpful? Give feedback.
-
Another workaround is to extend the token TTL
|
Beta Was this translation helpful? Give feedback.
-
@nyameen @jrtitus @cloudxxx8 As discussed during the meeting , if a service is missing the window of renewing its token the today there is no way that the service to retreive a new token from vault. Of course, restarting of secres-store setup can fix this but this cannot be a acceptable solution in production. Also forcing renewing a token with a expired token might introduce some vulneraibility. So may be the solution should be to introduce a way to manually approve with human intervention the workflow of regenerating a token for a service whose token is already expired. This can be though a new implemetation with new API. @cloudxxx8 dont hesiate to correct me or add any point I might have missed. |
Beta Was this translation helpful? Give feedback.
-
Here's a summary in this discussion so far: The service secret-store token's lease will be periodically renewed(every half of the Current workarounds:
We are actively investigating looking at this issue and try to come up with a good solution with security is concerned. |
Beta Was this translation helpful? Give feedback.
-
Could you please clarify in case the secretstore is restarted by any external procedure,, how does it impact a service for which the token is expired for any reason. The service is obviously in failure status as its token is not valid for the instant. Does the service will recover by itself as soon as the new token is regenerated by the secret-store ? |
Beta Was this translation helpful? Give feedback.
-
Well my scenario was the service started well with a good token , gets paused for some reason resulting eventually failure to renew the token in the time frame and then its restarted. Now the secret-store might have renewed the token but does the failing service would look for this renewed token so that it can recover ? |
Beta Was this translation helpful? Give feedback.
-
Hello,
I am wondering if anyone has faced this issue and if there is a way to solve it without restarting multiple services manually. In secure mode, each service is given a Vault Token for communicating to Vault. This token is only valid for 1 hour and is supposed to be renewed every 30 minutes. If a service is stopped, and then restarted after 1 hour, it cannot start. For example, you can stop any device or app service, in this case,
device-modbus
$ docker-compose up -d $ docker stop edgex-device-modbus # wait 1 hour... $ docker start edgex-device-modbus
In the
device-modbus
logs you will see this repeatedly untilsecretstore-setup
is manually restarted:Is there a way I can successfully start
device-modbus
without having to restart the entire deployment?Beta Was this translation helpful? Give feedback.
All reactions