Merge pull request #15028 from hashicorp/docs/auto-cert-1-13-2
Update upgrade docs for 1.13.2.
This commit is contained in:
commit
4c53fdc05a
|
@ -27,9 +27,9 @@ upgrade flow.
|
|||
|
||||
Prior to Consul 1.14, it was possible to encrypt communication between Consul and Envoy over `ports.grpc` using these settings.
|
||||
|
||||
Consul 1.14 introduces [`ports.grpc_tls`](/docs/agent/config/config-files#grpc_tls_port), a new configuration
|
||||
for encrypting communication over gRPC. The existing [`ports.grpc`](/docs/agent/config/config-
|
||||
files#grpc_port) configuration **will stop supporting encryption in a future release**. As of version 1.14,
|
||||
Consul 1.14 introduces [`ports.grpc_tls`](/docs/agent/config/config-files#grpc_tls_port), a new configuration
|
||||
for encrypting communication over gRPC. The existing [`ports.grpc`](/docs/agent/config/config-
|
||||
files#grpc_port) configuration **will stop supporting encryption in a future release**. As of version 1.14,
|
||||
`ports.grpc_tls` is the recommended configuration to encrypt gRPC traffic.
|
||||
|
||||
For most environments, the Envoy communication to Consul is loop-back only and does not benefit from encryption.
|
||||
|
@ -51,7 +51,7 @@ review the following guidances relevant to your deployment:
|
|||
|
||||
Upgrade to **Consul version 1.13.1 or later**.
|
||||
|
||||
Consul 1.13.0 contains a bug that prevents Consul server agents from restoring
|
||||
Consul 1.13.0 contains a bug that prevents Consul server agents from restoring
|
||||
saved state on startup if the state
|
||||
|
||||
1. was generated before Consul 1.13 (such as during an upgrade), and
|
||||
|
@ -61,25 +61,22 @@ This bug is fixed in Consul versions 1.13.1 and newer.
|
|||
|
||||
#### Service mesh deployments using auto-encrypt or auto-config
|
||||
|
||||
**Do not upgrade to Consul 1.13 yet** if using
|
||||
Upgrade to **Consul version 1.13.2 or later** if using
|
||||
[auto-encrypt](/docs/agent/config/config-files#auto_encrypt) or
|
||||
[auto-config](/docs/agent/config/config-files#auto_config).
|
||||
|
||||
In Consul 1.13, auto-encrypt and auto-config both cause Consul
|
||||
In Consul 1.13.0 - 1.13.1, auto-encrypt and auto-config both cause Consul
|
||||
to require TLS for gRPC communication with Envoy proxies.
|
||||
In environments where Envoy proxies are not already configured
|
||||
to use TLS for gRPC, upgrading Consul 1.13 will cause
|
||||
to use TLS for gRPC, upgrading to Consul 1.13.0 - 1.13.1 will cause
|
||||
Envoy proxies to disconnect from the control plane (Consul agents).
|
||||
|
||||
The underlying cause is the same as discussed in
|
||||
[deployments without the HTTPS port enabled on Consul agents](#service-mesh-deployments-without-the-https-port-enabled-on-consul-agents).
|
||||
However, when using auto-encrypt or auto-config,
|
||||
the problem **cannot** currently be avoided by
|
||||
[modifying the agent's TLS configuration](#modify-the-consul-agent-s-tls-configuration)
|
||||
because auto-encrypt and auto-config automatically set
|
||||
interface-generic TLS configuration in a manner similar to
|
||||
[`tls.defaults`](/docs/agent/config/config-files#tls_defaults).
|
||||
We are working to address this problem in an upcoming 1.13 patch release.
|
||||
If upgrading to version 1.13.2 or later, you must enable
|
||||
[tls.grpc.use_auto_cert](/docs/agent/config/config-files#use_auto_cert)
|
||||
if you currently rely on Consul agents presenting the auto-encrypt or
|
||||
auto-config certs as the TLS server certs on the gRPC port.
|
||||
The new `use_auto_cert` flag enables TLS for gRPC based on the presence
|
||||
of auto-encrypt certs.
|
||||
|
||||
#### Service mesh deployments without the HTTPS port enabled on Consul agents ((#grpc-tls))
|
||||
|
||||
|
|
Loading…
Reference in New Issue