Skip to content
Discussion options

You must be logged in to vote

We finally solved our issue. When browsing the Quarkus Vault config options we stumbled up the following:

you need to make sure there will be attempts to fetch secrets within the renewGracePeriod, because that is when the renewals will happen. This is particularly important for db dynamic secrets because if the lease reaches its ttl or max_ttl, the password of the db user will become invalid and it will be not longer possible to log in.

This is exactly what happened to us. We were under the impression that Quarkus will automatically keep the Vault token "fresh" at any time but our service (low traffic) does not constantly communicate with Vault so that the login token expired and with i…

Replies: 6 comments 2 replies

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
1 reply
@kdubb
Comment options

kdubb Jul 1, 2022
Collaborator

Comment options

You must be logged in to vote
1 reply
@wiebeck
Comment options

Comment options

You must be logged in to vote
0 replies
Answer selected by wiebeck
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
5 participants