-
Notifications
You must be signed in to change notification settings - Fork 4.6k
Add upgrade warnings #19061
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add upgrade warnings #19061
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -21,11 +21,20 @@ After Consul 1.17.0, only timestamps will be included in rotated log file names. | |
|
|
||
| ## Consul 1.16.x | ||
|
|
||
| #### Known issues | ||
| ### Known issues | ||
|
|
||
| Service mesh in Consul versions 1.16.0 and 1.16.1 may have issues when a snapshot restore is performed and the servers are hosting xDS streams. | ||
| When this bug triggers, it causes Envoy to incorrectly populate upstream endpoints. To prevent this issue, service mesh users who run agent-less workloads should upgrade Consul to v1.16.2 or later. | ||
|
|
||
| #### Vault Enterprise as CA ((#vault-enterprise-as-ca-1-16)) | ||
| Using Vault as CA with Consul version 1.16.2 will fail to initialize the CA if [`namespace`](/consul/docs/connect/ca/vault#namespace) is set | ||
| but [`intermediate_pki_namespace`](/consul/docs/connect/ca/vault#intermediatepkinamespace) or [`root_pki_namespace`](/consul/docs/connect/ca/vault#rootpkinamespace) | ||
| are empty. This is a bug which will be fixed in a future version. | ||
|
|
||
| To work around this issue, users must explicitly set [`intermediate_pki_namespace`](/consul/docs/connect/ca/vault#intermediatepkinamespace) and | ||
| [`root_pki_namespace`](/consul/docs/connect/ca/vault#rootpkinamespace) to the same value as [`namespace`](/consul/docs/connect/ca/vault#namespace). | ||
| Set your configuration by calling [set-config](/consul/commands/connect/ca#set-config) then use [get-config](/consul/commands/connect/ca#get-config) to check. | ||
|
|
||
| #### API health endpoints return different status code | ||
|
|
||
| Consul versions 1.16.0+ now return an error 403 "Permission denied" status | ||
|
|
@@ -44,9 +53,10 @@ This change removes the backward-compatibility behavior introduced in Consul 1.1 | |
|
|
||
| ## Consul 1.15.x | ||
|
|
||
| #### Service mesh compatibility ((#service-mesh-compatibility-1-15)) | ||
| ### Service mesh compatibility ((#service-mesh-compatibility-1-15)) | ||
|
|
||
| Upgrade to **Consul version 1.15.2 or later**. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Do these all belong within a "service mesh compatibility" section (like exists for 1.15 and 1.14)? And would it affect our upgrade guidance here? Like ... upgrade to Consul 1.15.2 or later, but avoid 1.15.6 if [using Vault Enterprise as a CA](link to anchor tag).
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I moved around the sections so they fall under "service mesh compatibility" except for 1.16 which didn't have the section. |
||
| If using [Vault Enterprise as CA](#vault-enterprise-as-ca-1-15), **avoid Consul version 1.15.6**. | ||
|
|
||
| Consul versions 1.15.0 - 1.15.1 contain a race condition that can cause | ||
| some service instances to lose their ability to communicate in the mesh after | ||
|
|
@@ -55,6 +65,15 @@ due to a problem with leaf certificate rotation. | |
|
|
||
| This bug is fixed in Consul versions 1.15.2 and newer. | ||
|
|
||
| #### Vault Enterprise as CA ((#vault-enterprise-as-ca-1-15)) | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Nice catch on the anchor alias ;) |
||
| Using Vault as CA with Consul version 1.15.6 will fail to initialize the CA if [`namespace`](/consul/docs/connect/ca/vault#namespace) is set | ||
| but [`intermediate_pki_namespace`](/consul/docs/connect/ca/vault#intermediatepkinamespace) or [`root_pki_namespace`](/consul/docs/connect/ca/vault#rootpkinamespace) | ||
| are empty. This is a bug which will be fixed in a future version. | ||
|
|
||
| To work around this issue, users must explicitly set [`intermediate_pki_namespace`](/consul/docs/connect/ca/vault#intermediatepkinamespace) and | ||
| [`root_pki_namespace`](/consul/docs/connect/ca/vault#rootpkinamespace) to the same value as [`namespace`](/consul/docs/connect/ca/vault#namespace). | ||
| Set your configuration by calling [set-config](/consul/commands/connect/ca#set-config) then use [get-config](/consul/commands/connect/ca#get-config) to check. | ||
|
|
||
| #### Removing configuration options | ||
|
|
||
| The `connect.enable_serverless_plugin` configuration option was removed. Lambda integration is now enabled by default. | ||
|
|
@@ -196,6 +215,14 @@ to use TLS for contacting the HTTP API, it will also incorrectly enable TLS for | |
| Users should not upgrade to 1.14.0 if they are using plaintext gRPC connections in | ||
| conjunction with TLS-encrypted HTTP APIs. | ||
|
|
||
| #### Vault Enterprise as CA ((#vault-enterprise-as-ca-1-14)) | ||
| Using Vault as CA with Consul version 1.14.10 will fail to initialize the CA if [`namespace`](/consul/docs/connect/ca/vault#namespace) is set | ||
| but [`intermediate_pki_namespace`](/consul/docs/connect/ca/vault#intermediatepkinamespace) or [`root_pki_namespace`](/consul/docs/connect/ca/vault#rootpkinamespace) | ||
| are empty. This is a bug which will be fixed in a future version. | ||
|
|
||
| To work around this issue, users must explicitly set [`intermediate_pki_namespace`](/consul/docs/connect/ca/vault#intermediatepkinamespace) and | ||
| [`root_pki_namespace`](/consul/docs/connect/ca/vault#rootpkinamespace) to the same value as [`namespace`](/consul/docs/connect/ca/vault#namespace). | ||
| Set your configuration by calling [set-config](/consul/commands/connect/ca#set-config) then use [get-config](/consul/commands/connect/ca#get-config) to check. | ||
|
|
||
| #### Changes to gRPC TLS configuration | ||
|
|
||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.