Skip to content

Cookie based Sticky Sessions for HAProxy with TLS reencrypt#751

Draft
pruivo wants to merge 8 commits intokeycloak:mainfrom
pruivo:t_750_haproxy_sticky_session
Draft

Cookie based Sticky Sessions for HAProxy with TLS reencrypt#751
pruivo wants to merge 8 commits intokeycloak:mainfrom
pruivo:t_750_haproxy_sticky_session

Conversation

@pruivo
Copy link
Copy Markdown
Member

@pruivo pruivo commented Apr 28, 2026

Closes #750
Depends on #749

Copy link
Copy Markdown
Member

@ahus1 ahus1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for this PR. It doesn't look that ugly, it looks quite manageable. So we would include it by default, at least for the HAProxy setup?

See below for some nitbits.

Comment thread proxy/haproxy/reencrypt/README.md Outdated
Comment thread proxy/haproxy/reencrypt/README.md
Co-authored-by: Alexander Schwartz <[email protected]>
Signed-off-by: Pedro Ruivo <[email protected]>
@pruivo
Copy link
Copy Markdown
Member Author

pruivo commented Apr 28, 2026

Thank you for this PR. It doesn't look that ugly, it looks quite manageable. So we would include it by default, at least for the HAProxy setup?

See below for some nitbits.

It can be included sure, but it looks messy and isn't maintainable. You can add a server dynamically, but not add new mappings, which may be a problem when scaling up and down the cluster.

@ahus1
Copy link
Copy Markdown
Member

ahus1 commented Apr 28, 2026

You can add a server dynamically, but not add new mappings, which may be a problem when scaling up and down the cluster.

OK, I didn't know about that one. Maybe add it to the README so I won't forget. Thanks!

Signed-off-by: Pedro Ruivo <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Cookie based Sticky Sessions for HAProxy with TLS reencrypt

3 participants