-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vault agent certificate renewal troubles #26367
Comments
Another point I'd like to bring up is the renewal trigger time. As per docs:
But it waited (2024-04-10T07:07:37) until almost expiration (2024-04-10T21:45:31Z) of the cert. As you see, they're issued for 1 month, so the cutoff time should've been 2024-03-25 or so. |
Do you get different behavior if changing There is also |
That PR hasn't made into RPM yet thus I can't try. All this Vault PKI thing isn't Enterprise ready. It looks like there are no Enterprise customers who are using Vault in that fashion (private pki/certbot replacement) otherwise we would've seen tons of complaints. As regarding the |
Hi there! I just wanted to let you know that I linked this to a bug we have open in our backlog we're trying to prioritize soon. Renewal retries without backoff is obviously something we should address, and we're planning to and hoping to soon. I can't promise more than that at this point, but I wanted to let you know that this is on our mind. |
That's absolutely good news. Bullet 2) can be taken off the table then. But the first one is still relevant. |
Hey! Wanted to follow up that I've just merged #26844 which should address the constant quick request issue. As to what's causing the 500s, unfortunately I can't speak to that and it will need to wait for further investigation. Still, I wanted to let you know that one half of this issue should be resolved now and is merged. |
Hello @VioletHynes, any update on issue .1 ? |
Have decided to replace our CA with Vault but I'm now facing 2 issues:
Vault Agent will DoS the server if it can't renew the certificate.The setup over here is pretty straightforward: Vault pki is used to issue the certificates and Vault agent is used to TLS cert auth against Vault server to request a renewed certificate. It's a chicken-and-egg scenario where initial certificate is issued manually and then gets indefinitely renewed. It's a poor man's certbot alternative that was supposed to work beautifully but it doesn't.
Vault agent host:
But on Vault server (mind the TZ):
It goes on and on, each 0.02 sec! As you see, it won't slow down, it hammers the server as much as it can and pollutes the audit log. This is a DoS in its pure form. That's just one host, imagine what happens when several agents decide go nuts.
I won't show server config as there's nothing interesting there, it's a dull almost empty config.
v1.16.1
both on server and clientsPlease help.
The text was updated successfully, but these errors were encountered: