Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Graduate SecretsFilteredCaching feature gate to beta #6074

Closed
irbekrm opened this issue May 16, 2023 · 9 comments
Closed

Graduate SecretsFilteredCaching feature gate to beta #6074

irbekrm opened this issue May 16, 2023 · 9 comments
Labels
kind/feature Categorizes issue or PR as related to a new feature.

Comments

@irbekrm
Copy link
Collaborator

irbekrm commented May 16, 2023

This is a placeholder issue to gather people's feedback on SecretsFilteredCaching alpha feature

If you are using the secrets filtered caching and would like it to graduate to beta and eventually be enabled in GA, please add a comment about your usage experience:

  • the size of your cert-manager installation (the number of issuers, certificates etc)
  • issuer types and whether you labelled any issuer secrets with controller.cert-manager.io/fao label
  • the issuance patterns (how many certs/issuers are likely to be created/renewed/updated simultaneuously
  • the number of large cert-manager unrelated Secrets in cluster (i.e Helm release secrets)
  • whether you've observed memory improvements for cert-manager controller
  • whether you've observed slowdown of issuance

https://github.com/cert-manager/cert-manager/blob/master/design/20221205-memory-management.md
#5824

/kind cleanup

@jetstack-bot jetstack-bot added the kind/feature Categorizes issue or PR as related to a new feature. label May 16, 2023
@jetstack-bot
Copy link
Collaborator

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Send feedback to jetstack.
/lifecycle stale

@jetstack-bot jetstack-bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Aug 14, 2023
@jetstack-bot
Copy link
Collaborator

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close.
Send feedback to jetstack.
/lifecycle rotten
/remove-lifecycle stale

@jetstack-bot jetstack-bot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Sep 13, 2023
@irbekrm
Copy link
Collaborator Author

irbekrm commented Sep 13, 2023

/remove-lifecycle stale

@irbekrm
Copy link
Collaborator Author

irbekrm commented Sep 13, 2023

/remove-lifecycle rotten

@jetstack-bot jetstack-bot removed the lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. label Sep 13, 2023
@antstacks
Copy link

Customer upgraded to v1.13 to meet some additional requirements, but this change caused some unwarranted renewal of certificates because it was "missing" the label. Is this the intended behavior of this change? Was there a setting to prevent this from automatically renewing certificates?

@inteon
Copy link
Member

inteon commented Nov 16, 2023

EXTRA INFO: this feature was promoted to Beta in 1.13: #6298

@finnribm
Copy link

We recently upgraded one of our instances to v1.13.2 and found that it reissued one of our CA certs and one of the certs that it signed, but not 10 others also signed by the CA. This resulted in a bit of a mess due to poor dependency processing on our side.

We tracked down the cause to this issue - nice spec write up by the way. We have several more instances due to be upgraded soon.

Can I simply add the label controller.cert-manager.io/fao to any cert-manager managed secrets that don't have it? Or do I need to add it to any other objects as well?

The spec says "Users will have to ensure that Secrets they create are labelled. We can help them to discover which Secrets that are currently deployed to cluster and need labelling with a cmctl command."

Is that help available yet? Thanks.

@inteon
Copy link
Member

inteon commented Nov 30, 2023

@finnribm Normally, if you upgrade to a v1.12.x version before upgrading to v1.13, all secrets should be automatically labeled by the cert-manager controller. Alternatively, adding the controller.cert-manager.io/fao label would work too.

IMPORTANT: See #6494 (comment) for more info about this issue and how to prevent it.
Please let us know if that comment does not work for you by leaving a comment there.

@inteon
Copy link
Member

inteon commented Feb 12, 2024

EXTRA INFO: this feature was promoted to Beta in 1.13: #6298

@inteon inteon closed this as completed Feb 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

No branches or pull requests

5 participants