New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ipsec, option: Make the IPsec key rotation delay configurable #24811
ipsec, option: Make the IPsec key rotation delay configurable #24811
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Have you tested it interactively?
This comment was marked as resolved.
This comment was marked as resolved.
No. |
We currently have a maximum IPsec key rotation delay hardcoded to 5 minutes. After that time, we remove the old key from the node. Therefore, if the new key wasn't propagated to all nodes before then, communication between nodes will break. 5 minutes is usually enough because all agents will pick up the new key as soon as it's loaded and takes them a few seconds maximum to reload their IPsec configuration in the kernel. For clustermesh scenarios however, 5 minutes may not be enough. In those cases, the key needs to be updated separately on all clusters. Depending on the number of clusters and how this is done, it may take longer than 5 minutes. This commit therefore makes this 5 minutes delay configurable via an agent flag. Signed-off-by: Paul Chaignon <paul@cilium.io>
d178da2
to
52b5bc2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 💯
This is not covered in end-to-end tests and all compile & lint tests are passing. Merging. |
We currently have a maximum IPsec key rotation delay hardcoded to 5 minutes. After that time, we remove the old key from the node. Therefore, if the new key wasn't propagated to all nodes before then, communication between nodes will break.
5 minutes is usually enough because all agents will pick up the new key as soon as it's loaded and takes them a few seconds maximum to reload their IPsec configuration in the kernel.
For clustermesh scenarios however, 5 minutes may not be enough. In those cases, the key needs to be updated separately on all clusters. Depending on the number of clusters and how this is done, it may take longer than 5 minutes.
This pull request therefore makes this 5 minutes delay configurable via an agent flag.