Configure Keycloak HTTP retries
What you’ll accomplish
Section titled “What you’ll accomplish”You’ll enable and tune Keycloak’s outbound HTTP retry behavior for requests to external services such as upstream identity providers. This configuration is applied via bundle overrides — no image rebuild required.
Prerequisites
Section titled “Prerequisites”- UDS Core deployed
- UDS CLI installed
- Familiarity with UDS bundle overrides
Before you begin
Section titled “Before you begin”HTTP retries are disabled by default. To enable them, set httpRetry.maxRetries above 0.
Retries can improve resilience in environments with intermittent network issues, but they can also delay failure detection when an upstream service is down.
-
Configure HTTP retry behavior for outgoing requests
In your
uds-bundle.yaml, set the retry options using Keycloak chart values:uds-bundle.yaml packages:- name: corerepository: registry.defenseunicorns.com/public/coreref: x.x.x-upstreamoverrides:keycloak:keycloak:values:- path: httpRetry.maxRetriesvalue: 2- path: httpRetry.initialBackoffMillisvalue: 1000- path: httpRetry.backoffMultipliervalue: 2.0- path: httpRetry.applyJittervalue: true- path: httpRetry.jitterFactorvalue: 0.5Option Default Description maxRetries0(disabled)Maximum retry attempts (set > 0 to enable) initialBackoffMillis1000Initial backoff delay in milliseconds backoffMultiplier2.0Exponential backoff multiplier applyJittertrueAdds randomness to prevent retry storms jitterFactor0.5Jitter factor (0–1) for backoff variation -
Create and deploy your bundle
Terminal window uds create <path-to-bundle-dir>uds deploy uds-bundle-<name>-<arch>-<version>.tar.zst
Verification
Section titled “Verification”Confirm the bundle override applied successfully:
- Review your
uds deployoutput for the Keycloak release upgrade - Confirm Keycloak is healthy and login flows that depend on external services (such as external IdPs) behave as expected during transient network failures
Related Documentation
Section titled “Related Documentation”- Configure Keycloak outgoing HTTP requests — upstream Keycloak docs for outgoing HTTP requests
Next steps
Section titled “Next steps”These guides and concepts may be useful to explore next:
Configure Keycloak login policies Set session timeouts, concurrent session limits, and logout behavior via bundle overrides.
Connect Azure AD as an identity provider Federate Keycloak with Azure Entra ID for enterprise SSO.