-
Notifications
You must be signed in to change notification settings - Fork 181
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't store cert backups #124
Conversation
Those are inconvenient if you don't want to run Redis as LRU cache. We are more interested in not silently discarding any certificates, and scaling Redis with increasing number of domains, so we don't. If this change is not acceptable, another scheme could be to store the previous (":old") certificate in addition to the current one (":latest"). This way we'd only be storing at most two certificates per domain in Redis, and not a growing number due to renewals.
Apologies for the delay on this one too, but I’ll try to take a look at this in the next couple weeks. Thanks again! |
Ah, I had forgotten that we were indefinitely storing all the previous certificates, so thanks for catching this! I can see how this could become an issue with lots of certificates, particularly for in-memory stores like Redis. That being said, I would like to retain the ability to keep previous certificates for debugging purposes by making this more configurable, instead of getting rid of the backups completely. I might be overly paranoid, since I'm not sure I've actually ever had to use the old certificates, but I'd probably prefer to keep a few old copies around for my own installations (again, I just personally tend to be overly-paranoid about deleting things :). So my general idea for how we could maybe make this more configurable might be something like:
Does something like that approach make sense to you? If so, I know this more configurable approach might not be something you need for your use-case, so while you're more than welcome to implement it, I'm also happy to implement these changes at some point. Thanks again! |
@GUI Thanks for having a look! From the point of our use-case: I feel that the benefit of having extra backups in Redis is limited unless there is a built-in mechanism to fall back to those backups in the event of an issue. We never had any issues with storing certificates - and I believe even accidentally deleting and re-requesting one is much less of an issue in terms of Let's Encrypt rate-limits, compared to the rate-limits one runs during other failure modes (e.g. So I believe in case of a problem we would most likely simply switch to a day-old backup, and study the differences with help of the log file. But any scheme that limits the amount of backups being held per-domain is certainly acceptable for us! On our systems, I purged all backups from Redis (after harvesting their timestamps to set
|
I have 800mb of certs clogging a redis instance....I'd love to see the keep_previous_certs setting make it to the next release |
is this going to be merged in? this is becoming a huge problem for us |
This is finally part of a release in v0.13.0 that's now published. Thanks! |
Those are inconvenient if you don't want to run Redis as LRU cache. We are more interested in not silently discarding any certificates, and scaling Redis with increasing number of domains, so we don't.
If this change is not acceptable, another scheme could be to store the previous (":old") certificate in addition to the current one (":latest"). This way we'd only be storing at most two certificates per domain in Redis, and not a growing number due to renewals.