--- layout: docs page_title: Upgrading to Vault 1.5.0 - Guides description: |- This page contains the list of deprecations and important or breaking changes for Vault 1.5.0. Please read it carefully. --- # Overview This page contains the list of deprecations and important or breaking changes for Vault 1.5.0 compared to 1.4.1. Please read it carefully. ## Google Cloud Storage `credentials_file` removed The deprecated `credentials_file` config option has been removed. The `GOOGLE_APPLICATION_CREDENTIALS` environment variable or default credentials may be used instead. See [GCS Authentication](https://www.vaultproject.io/docs/configuration/storage/google-cloud-storage#gcs-authentication) for details on supported options. ## Raft Configuration A new Raft configuration value, `max_entry_size`, has been introduced. This value limits the size in bytes for a Raft K/V entry. It applies to both put operations and transactions. Any put or transaction operation exceeding this configuration value will cause the respective operation to fail. The default value for this configuration is 1MiB. In addition, a new metric has been introduced, `vault.raft-storage.entry_size`, that allows for operators to sample the entry size, view the average, and adjust the configuration value as necessary. For additional details, please see [Raft configuration](/docs/configuration/storage/raft). ## Enabling telemetry on 32-bit systems will cause Vault to crash. A workaround for this issue is to disable collection of usage gauges in the [telemetry](/docs/configuration/telemetry) stanza of the configuration. ``` telemetry { ... usage_gauge_period = "none" } ``` This will suppress the metrics `vault.identity.entity.count`, `vault.identity.entity.alias.count`, `vault.token.count`, `vault.token.count.by_auth`, `vault.token.count.by_policy`, `vault.token.count.by_ttl` and `vault.secret.kv.count` that were introduced in version 1.5.0, but all other Vault telemetry will remain available. ## Zero-length keys in key-value stores will cause Vault to crash. A key-value data store might have a zero-length key, created before the request handling was modified to make this operation impossible. The metrics collection process crashes if it encounters this while counting the number of KV secrets. A workaround for this issue is to disable collection of usage gauges in the [telemetry](/docs/configuration/telemetry) stanza of the configuration. ``` telemetry { ... usage_gauge_period = "none" } ``` This will disable all the metrics listed in the previous section. Or, set the environment value `VAULT_DISABLE_KV_GAUGE`, which will disable only `vault.secret.kv.count`. ## Non-string values in seal config prevent startup Any values in the [Seal configuration stanza](/docs/configuration/seal) that are not quoted strings yield a parse error of the form: ``` error loading "/etc/vault.d/config_seal.hcl": error parsing 'seal': seal.pkcs11: unable to parse 'purpose' in kms type "pkcs11": value could not be parsed as string ``` The error is not actually with the `purpose` field, but rather with other config fields such as: ``` mechanism = 0x1082 ``` The workaround is to quote the strings in question, as in: ``` mechanism = "0x1082" ``` @include 'okta-group-pagination.mdx' @include 'aws-imds-timeout-upgrade.mdx'