You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
Nomad ACL tokens generated through the Vault Nomad Secrets Backend ignores set TTL (at nomad/config/lease) and expires after 1 hour of token generation.
To Reproduce
Steps to reproduce the behavior:
Enable the Vault Nomad secrets backend and add lease configuration:
Additional context
Unsure whether this is an issue with Nomad, or with Vault. But in this case, this ACL token specifically happens to be generated by Vault Nomad secrets backend.
The text was updated successfully, but these errors were encountered:
Hi @Thunderbottom
Sorry to hear you're having trouble with this. I tried to recreate this locally on my Mac using Vault version 1.10.5 but it seems to work as expected. Are you able to consistently recreate this issue? I can try again with your specific Vault version of 1.10.2.
In the meantime, could you try reading the lease information from Vault with the command: vault lease lookup nomad/creds/role-name/1ju...
If you can perform this before the 1-hour mark and then do it again after 1-hour, we could see if your Vault is fully removing the lease after 1 hour or if something else may be going on.
Describe the bug
Nomad ACL tokens generated through the Vault Nomad Secrets Backend ignores set TTL (at
nomad/config/lease
) and expires after 1 hour of token generation.To Reproduce
Steps to reproduce the behavior:
management
, and read the token:Note the
lease_duration
(6h
), which translates to the same lease duration in seconds (21600
) set within the lease config of the Nomad secrets backend.Expected behavior
Nomad ACL tokens generated using the Nomad secrets backend should honor the lease duration (TTL) specified in
nomad/config/lease
Environment:
vault status
): 1.10.2vault version
): 1.10.3Vault server configuration file(s):
Additional context
Unsure whether this is an issue with Nomad, or with Vault. But in this case, this ACL token specifically happens to be generated by Vault Nomad secrets backend.
The text was updated successfully, but these errors were encountered: