-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
etcdctl 2.2.2 sometimes fail to get information #3964
Comments
Hi @gzliudan , it seems to be an interesting problem. Current etcd doesn't turn quorum flag on in its authentication requests and it would produce such results. I made a change in a branch of my own fork, could you try it? https://github.com/mitake/etcd/tree/auth-quorum I still cannot reproduce your problem and am not fully sure the branch is effective |
After I reboot all servers, the results becomes: |
maybe you can reproduce problem according to below steps:
|
@gzliudan thanks for your instruction. Now I can produce the problem. I'll dig this problem. |
…lag is updated Current etcd doesn't invalidate a cache of auth enabling flag even if the flag is updated via PUT request to /2/enabled. Therefore, even one server enables or disables auth, other servers don't follow the change. This commit adds a mechanism for invalidating the flag. For simplicity, the mechanism is based on a new hook functionality based on path and request. It reduces an adhoc branch in the log update path. Fixes etcd-io#3964
…lag is updated Current etcd doesn't invalidate a cache of auth enabling flag even if the flag is updated via PUT request to /2/enabled. Therefore, even one server enables or disables auth, other servers don't follow the change. This commit adds a mechanism for invalidating the flag. For simplicity, the mechanism is based on a new hook functionality based on path and request. It reduces an adhoc branch in the log update path. Fixes etcd-io#3964
This commit removes a flag that indicates auth is enabled or disabled because it doesn't have an invalidation mechanism. Fixes etcd-io#3601 and etcd-io#3964
This commit removes a flag that indicates auth is enabled or disabled because it doesn't have an invalidation mechanism. Fixes etcd-io#3601 and etcd-io#3964
This commit removes a flag that indicates auth is enabled or disabled because it doesn't have an invalidation mechanism. Fixes etcd-io#3601 and etcd-io#3964
This commit removes a flag that indicates auth is enabled or disabled because it doesn't have an invalidation mechanism. Fixes etcd-io#3601 and etcd-io#3964
@mitake OK. Thanks! |
This commit removes a flag that indicates auth is enabled or disabled because it doesn't have an invalidation mechanism. Fixes etcd-io#3601 and etcd-io#3964 Conflicts: etcdserver/auth/auth.go
This commit removes a flag that indicates auth is enabled or disabled because it doesn't have an invalidation mechanism. Fixes etcd-io#3601 and etcd-io#3964 Conflicts: etcdserver/auth/auth.go
[root@mongo1 ~]# etcdctl -u liudan:daniel role get guest
Insufficient credentials
[root@mongo1 ~]# etcdctl -u liudan:daniel role get guest
Role: guest
KV Read:
/*
KV Write:
/*
[root@mongo1 ~]# etcdctl -u liudan:daniel role get guest
Insufficient credentials
[root@mongo1 ~]# etcdctl -u liudan:daniel role get guest
Insufficient credentials
[root@mongo1 ~]# etcdctl -u liudan:daniel role get guest
Insufficient credentials
[root@mongo1 ~]# etcdctl -u liudan:daniel role get guest
Role: guest
KV Read:
/*
KV Write:
/*
The text was updated successfully, but these errors were encountered: