Rudder deleting authorized_keys when / is full and 'Flush SSH' enabled
A bug is happening when a disk is being filled (ie: with something spamming the syslog) and 'Flush SSH' is enabled.
The authorized_key happens to be deleted before being recreated, which ends-up not being possible as the disk is full.
This results in a server being totally unreachable.
Updated by Nicolas CHARLES over 3 years ago
The authorized_keys file is never deleted (at least using technique version 4.0)
It is copied from file authorized_keys.tmp - so what is possible is that this file is created empty because of disk full, and technique doesn't detect that there's been an error