-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault executing revocation statements before postgresql credentials expiry #28738
Comments
Hi, I can't seem to reproduce this with the information given. TTLs take into account both the mount TTLs and the role TTLs. Did you update both to 72000h? Additionally, if you try to read the credentials, what value do you see for |
Hi @miagilepner , anything else that can help on this issue ? we checked everything e2e multiple times but could not figure out why this would happen. And pls note that we have been using this configuration in production for 2 years but kept ignoring this behaviour for sometime and now completely relying on dummy revocation statements to remain unaffected from this behaviour but this is very scary in general to witness and proceed any further or resume back on relying for revocation statements |
@rusanki What is the TTL of the token that is used to create the database credentials? If the token that was used to create the credentials has expired, then the credentials will be revoked because it is assumed that the client to whom that token belonged no longer has access, so the credentials that they have received should also no longer be valid. See the leases concepts page:
|
We have an extended expiry of 13 years for the database role and also verified all the leases as well for the role before and after the issue multiple times. |
can I do anything further here ? |
Describe the bug
We have a database secret with default and max ttl of 72000h but vault is running revocation statements after 32 days.
To Reproduce
Not able to reproduce this anywhere else. We had default ttl and max ttl kept at default 768h but a few months back we updated it to 72000h to avoid expiring leases. Now we have faced this behaviour for 3rd time. We verified the database user as well which is having extended 72000h of expiry but can see a recovacation statement which alters the user property to NOLOGIN ran after 32 days period.
Expected behavior
We would expect REVOCATION STATEMENTS to have never run because of extended lease expiry.
Environment:
vault status
): 1.12.1vault version
): 1.14.1Vault server configuration file(s):
Additional context
We now will remove the revocation statement to avoid the recurrence but wanted to highlight the behaviour and a possible bug.
The text was updated successfully, but these errors were encountered: