Hi,
I am trying to use the rate limit feature for aws mount with no success.
According to documentation the path needs to be mount or namespace. I tried setting the rate limit path to “aws” but it’s not working.
Is it not supposed to work on dynamic secrets mount? Couldn’t find anything about it in documentation.
Hi aram,
We have services creating aws users (using vault’s aws/creds API) that sometimes go into a bad restart-loop state. That causes them to create hundreds of users in a very short time.
AWS has a hard limit on the number of users that can be created so when the services are acting up and we reach the limit we are unable to issue more users.
We are working with teams to switch to assumed_role from iam_users so this won’t happen again, but that takes time.
In the mean time I wanted to protect us from this use case by creating rate limit on the aws mount - So that after X requests to aws/creds the quota limit will be exceeded. Given that the rate limit is on the mount I thought that setting “aws” as the rate limit path should work.
Thanks @aram and @mikegreen for the quick replies.
The 2 per second was only to test the rate limit (in reality we will have much less of course to actually be lower than aws’s rate limit).
Want to update that it did work for us. I initially tested this on vault with version 1.5.0. After @aram showed it worked for him I saw there were some fixes related to rate limit in later vault versions. After upgrading to latest it did work.