-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VaultSecret refreshPeriod : default behavior with default configurations #129
Comments
I added 1h of |
Does the behavior work as documented if the SecretEngineMount is v2? This might just mean there is no lease information for v1 kv secrets. Regardless, it would be good to document that better.
|
Ok, its the other way around. The lease_duration is returned for kv v1 secret types, not kv v2. example:
|
Good catch, thanks for digging that up! |
can we close this? |
Yes, nothing to be done on the operator side. |
This is a question as I'm not sure what should happen with the default behavior of vault + operator.
I have created a bunch of
VaultSecret
like the following :and when looking at the operator logs, I'm seeing a lot of
DEBUG controllers.VaultSecret Sync VaultSecret {"namespacedName": "tooling-dev/keycloak-secret}
, like 1 every 1s for eachVaultSecret
.If I specify
VaultSecret.refreshPeriod
to1m
, the logs lower to 1 every 1m as expected.The
VaultSecret.refreshPeriod
doc statesThis takes precedence over any vault secret lease duration and can be used to force a refresh.
vault-config-operator/config/crd/bases/redhatcop.redhat.io_vaultsecrets.yaml
Lines 69 to 72 in c56bae0
By default,
auth
&mount
havedefault_lease_ttl
&max_lease_ttl
to 0.Is it evaluated as "since I have no idea when it will expires, I'll request it more often" ?
The text was updated successfully, but these errors were encountered: