[FEATURE] When internal security configuration is updated, its should be confirmed to be a new value #3275
Labels
enhancement
New feature or request
good first issue
These are recommended starting points for newcomers looking to make their first contributions.
help wanted
Community contributions are especially encouraged for these issues.
triaged
Issues labeled as 'Triaged' have been reviewed and are deemed actionable.
Is your feature request related to a problem?
When looking into how SegRep [1] could impact the read consistency of the security configuration among the different nodes in a cluster, it exposes that on reload of configuration there is no mechanism in place to be sure the loaded configuration is actually newer.
What solution would you like?
When configuration updates the payload should include which configurations are to be reloaded, as well as an indicator of the change. In some systems this is an hash of the new config, ETAG, lastModified date or other value. We should include a value like this that is verified by nodes on reload of configuration that can be checked to confirm the configuration is at least as up to date as when the request was made.
Note; there should be wiggle room if multiple update configuration requests are in flight at once.
What alternatives have you considered?
The current system has no correctness assurances, we could continue doing nothing. Alternatively, from the node that processes the configuration update could query the other nodes in the cluster to be sure if they have gotten the update and then reissue updates until all nodes are complete.
Exit Criteria
Do you have any additional context?
The text was updated successfully, but these errors were encountered: