Expired Tokens Retention when using MySQL as backend
Expired tokens stay in Database.
In Public Cloud, that could be a problem when a lot of tokens are asked every time (and even in Private Cloud).
(Possible) Solution :
add a flag in keystone.conf like :
keep_expired_tokens = True
retention_time = 365 #in days
Blueprint information
- Status:
- Complete
- Approver:
- None
- Priority:
- Undefined
- Drafter:
- None
- Direction:
- Needs approval
- Assignee:
- None
- Definition:
- Superseded
- Series goal:
- None
- Implementation:
- Unknown
- Milestone target:
- None
- Started by
- Completed by
- Dolph Mathews
Related branches
Sprints
Whiteboard
redundant with https:/
the "possible solution" here puts the responsibility of deleting potential audit data on the service, which I don't think should be the case; however, providing an external mechanism to flush audit data is fine; I do very much like the idea of limiting the scope of impact of the flush mechanism to tokens that have already been expired for a certain period of time, and i'll include that in the above bp