Replies: 3 comments 9 replies
-
can you resolve this by restarting secretstore-setup |
Beta Was this translation helpful? Give feedback.
-
Another workaround is to extend the token TTL
|
Beta Was this translation helpful? Give feedback.
-
@nyameen @jrtitus @cloudxxx8 As discussed during the meeting , if a service is missing the window of renewing its token the today there is no way that the service to retreive a new token from vault. Of course, restarting of secres-store setup can fix this but this cannot be a acceptable solution in production. Also forcing renewing a token with a expired token might introduce some vulneraibility. So may be the solution should be to introduce a way to manually approve with human intervention the workflow of regenerating a token for a service whose token is already expired. This can be though a new implemetation with new API. @cloudxxx8 dont hesiate to correct me or add any point I might have missed. |
Beta Was this translation helpful? Give feedback.
-
Hello,
I am wondering if anyone has faced this issue and if there is a way to solve it without restarting multiple services manually. In secure mode, each service is given a Vault Token for communicating to Vault. This token is only valid for 1 hour and is supposed to be renewed every 30 minutes. If a service is stopped, and then restarted after 1 hour, it cannot start. For example, you can stop any device or app service, in this case,
device-modbus
$ docker-compose up -d $ docker stop edgex-device-modbus # wait 1 hour... $ docker start edgex-device-modbus
In the
device-modbus
logs you will see this repeatedly untilsecretstore-setup
is manually restarted:Is there a way I can successfully start
device-modbus
without having to restart the entire deployment?Beta Was this translation helpful? Give feedback.
All reactions