Skip to content

Cookie based Sticky Sessions for HAProxy with TLS reencrypt#751

Open
pruivo wants to merge 2 commits intokeycloak:mainfrom
pruivo:t_750_haproxy_sticky_session
Open

Cookie based Sticky Sessions for HAProxy with TLS reencrypt#751
pruivo wants to merge 2 commits intokeycloak:mainfrom
pruivo:t_750_haproxy_sticky_session

Conversation

@pruivo
Copy link
Copy Markdown
Member

@pruivo pruivo commented Apr 28, 2026

Closes #750
Depends on #749

Copy link
Copy Markdown
Member

@ahus1 ahus1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for this PR. It doesn't look that ugly, it looks quite manageable. So we would include it by default, at least for the HAProxy setup?

See below for some nitbits.

Comment thread proxy/haproxy/reencrypt/README.md Outdated
Comment thread proxy/haproxy/reencrypt/README.md
@pruivo
Copy link
Copy Markdown
Member Author

pruivo commented Apr 28, 2026

Thank you for this PR. It doesn't look that ugly, it looks quite manageable. So we would include it by default, at least for the HAProxy setup?

See below for some nitbits.

It can be included sure, but it looks messy and isn't maintainable. You can add a server dynamically, but not add new mappings, which may be a problem when scaling up and down the cluster.

@ahus1
Copy link
Copy Markdown
Member

ahus1 commented Apr 28, 2026

You can add a server dynamically, but not add new mappings, which may be a problem when scaling up and down the cluster.

OK, I didn't know about that one. Maybe add it to the README so I won't forget. Thanks!

Closes keycloak#750

Signed-off-by: Pedro Ruivo <1492066+pruivo@users.noreply.github.com>
@pruivo pruivo force-pushed the t_750_haproxy_sticky_session branch from ff7c182 to 64faac6 Compare May 4, 2026 14:39
@pruivo pruivo requested a review from tkyjovsk May 4, 2026 14:46
@pruivo pruivo marked this pull request as ready for review May 4, 2026 14:46
Signed-off-by: Alexander Schwartz <alexander.schwartz@ibm.com>
Copy link
Copy Markdown
Member

@ahus1 ahus1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pruivo - thank you for the update to the readme and the config.

Reading the new paragraph, people might think that this is a mandatory configuration for HAProxy, while it is actually optional.

With that, I think the new sections needs an introduction about the concepts and where to find more about it first before diving into the actual configuration. If some of the concepts should be moved to the main documentation in the general proxy guide, that's also fine.

Please let me know your thoughts. Happy to merge it once you're happy with the change and @tkyjovsk had a chance to have a look.

Copy link
Copy Markdown
Contributor

@tkyjovsk tkyjovsk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. My local test of auth-flow requests' sticky-ness was successful.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Cookie based Sticky Sessions for HAProxy with TLS reencrypt

3 participants