-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Post-election leader setup failure #11276
Comments
Hi @ncabatoff we just completed our production Vault cluster upgrade to 1.7.0 after having a spate of leader election issues. If we see a recurrence, we'll try to capture stack traces to add here. |
Cool. Correction to my previous comment: use SIGUSR2, not SIGQUIT. Both will yield stack traces, but SIGQUIT will make Vault exit, which isn't usually what's desired. |
We also just did an upgrade from v1.5.4 to 1.5.7 (where the issue persisted) and then upgraded to v1.7.0 where we haven't seen a recurrence yet. So far it looks good! |
Ok, thanks for the update @dmattia. I'm going to close this because otherwise I'll likely forget, please re-open if you have a recurrence. |
Describe the bug
During a Vault HA leadership election, the newly-elected leader failed to conduct it's post-unseal tasks correctly, resulting in a cluster-wide failure due to intra-cluster certificates not being configured.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
Expect that when one vault leader fails and another takes over that it will successfully configure the cluster TLS
Environment:
vault status
): 1.6.0vault version
): Vault v1.6.0 (7ce0bd9)Vault server configuration file(s):
Additional context
Logs from the particular failover:
Prior, successful failover in a similar timeframe:
The text was updated successfully, but these errors were encountered: