Skip to content

IMDS retry exponential backoff #568

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: main
Choose a base branch
from
Open

IMDS retry exponential backoff #568

wants to merge 3 commits into from

Conversation

4gust
Copy link
Collaborator

@4gust 4gust commented May 19, 2025

Description

This pull request introduces enhancements to the IMDS (Instance Metadata Service) retry logic in the Microsoft Authentication Library for Go (MSAL Go). The updates aim to improve the reliability and resilience of token acquisition when interacting with Azure IMDS endpoints, particularly under transient network failures or service unavailability scenarios.

Key changes:

  • Adjusted backoff intervals and retry limits for improved fault tolerance.
  • Added or updated corresponding unit tests to ensure correct retry behavior.

These improvements help ensure more consistent authentication experiences for applications running in Azure environments that rely on managed identities.


Please review the changes and provide feedback or suggestions for further improvements.

@4gust 4gust requested review from bgavrilMS and rayluo as code owners May 19, 2025 13:56
@4gust 4gust requested review from AndyOHart and chlowell and removed request for AndyOHart May 19, 2025 13:56
Copy link

Quality Gate Failed Quality Gate failed

Failed conditions
C Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants