-
Although the
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 8 replies
-
I ended up testing the behaviour of the
The only question that remains open for me is about the correct format of the token itself. As I've pointed out in my initial post, I've meet with some strange problem that seems to be related with this detail. I was able to get around it just by generating another token, but I think that a clarification on this is needed. The pattern I've used to generate valid agent tokens is the following: K<69-character lower-cased alphanumerical string>::agent:<32-character lower-cased alphanumerical string> A token generated with the format above will be 110 characters long. |
Beta Was this translation helpful? Give feedback.
-
The long token format is Synchronizing server configuration across nodes is left as an exercise for the reader. If you have multiple servers, they should all have the same configuration values (except for the --cluster-init/--server flags that control cluster creation and joining). Most folks handle this via deployment automation - ansible, puppet, vagrant, etc. Failure to keep these items in sync can lead to undefined behavior. |
Beta Was this translation helpful? Give feedback.
The long token format is
K10<sha256 sum of cluster CA certificate>::<username>:<password>
. If you're specifying the token or agent-token on the command line of a server in order to set it, you should specify just the password portion, as the CA and username portion are set internally. The long token is only used on nodes joining the cluster, as the presence of the CA hash in the token allows them to verify the identity of the cluster they're joining. Our docs on this subject could definitely use some work.Synchronizing server configuration across nodes is left as an exercise for the reader. If you have multiple servers, they should all have the same configuration values (except for the -…