-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Constant growing consul db size (seems related to entries not deleted in path sys/expire/token/$hex1/$hex2) #11178
Comments
Hi @bom-d-van , Thanks! |
Hi @HridoyRoy , ttls are like this:
|
Some more informations: In order to mitigate the situation, we decided to migrate to orphan batch token. And after that we are noticing the growth of consul snapshot size is getting stable and growth of the entries in It seems that there are two ways to avoid this bug/issue:
Potential ways to handle this issue:
|
Hi, another follow-up. We have decided to manually clean-up the obsolete entries in path At the same time, we didn't delete all of the entries created by the root token. We kept 8621 of them around, and then we tried to revoke the root/parent token. We were hoping Vault would at least clean them up on revocation, but still not, the revoke api call timed out, and then we tried with a token tidy api call.
Only entries in vault/sys/token/{id,parent} were deleted.
All the entries in |
Should be fixed by #11377. Please let us know if you're still seeing issues post upgrade |
Hi,
We are seeing our vault storage backend consul snapshot size growing constantly. We notice it's since around the time that we started using AWS secret engine. Thus we are suspecting that it might be caused by sys/expire/token/ expiration clean-up logics not dealing entries created by non-orphan batch token.
vault/sys/expire/token/h6600xxx/xxx
{"errors":["invalid lease"]}
.vault/sys/expire/id/aws
.To Reproduce
Expected behavior
vault/sys/expire/token/h6600xxx/xxx
entries created by using batch token should also be cleaned up.Environment:
vault version
): various versions, some are using vault cli (1.6.1), some are using go library github.com/hashicorp/vault (v0.11.1)Vault server configuration file(s):
Additional context
Upon reading the source code, we found that the following source codes in vault/expieration.go that might be the root cause.
when vault is creating new leased secrets, it creates both sys/expire/id and sys/expire/token entries for non-orphan batch and service token api call.
But while deleting it, it only deletes sys/expire/token for service token api call.
The text was updated successfully, but these errors were encountered: