Skip to content

Commit a246bda

Browse files
brewgatorschavis
andauthored
Update Known Issues docs to reflect fix for Database and LDAP Secrets Engine rotation issue (#30057)
* add note about upgrading * typo * Update website/content/partials/known-issues/database-skip-static-role-rotation.mdx Co-authored-by: Sarah Chavis <[email protected]> --------- Co-authored-by: Sarah Chavis <[email protected]>
1 parent e21fe65 commit a246bda

File tree

2 files changed

+7
-6
lines changed

2 files changed

+7
-6
lines changed
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
### Login/token renewal failures after group changes (((#group-writes)))
1+
### Login/token renewal failures after group changes ((#group-writes))
22

33
#### Affected Versions
4-
- 1.19.0
4+
- 1.19.0
55

66
#### Issue
7-
Performance standby nodes return a 500 error during login or token renewal if an
8-
entity's external group association has changed. This occurs because standbys are
7+
Performance standby nodes return a 500 error during login or token renewal if an
8+
entity's external group association has changed. This occurs because standbys are
99
unable to persist the updated group membership to storage.
1010

1111
#### Workaround
12-
Direct all logins and token renewals to the active node.
12+
Direct all logins and token renewals to the active node.

website/content/partials/known-issues/database-skip-static-role-rotation.mdx

+2-1
Original file line numberDiff line numberDiff line change
@@ -14,4 +14,5 @@ their passwords rotated when Vault is restarted. The password rotation will not
1414
occur on restart if the static role has already had its password rotated.
1515

1616
#### Workaround
17-
Currently, there is no workaround except to avoid a restart of the backend.
17+
Upgrade to Vault version 1.18.6+ and 1.19.1+. For earlier versions of Vault, the only
18+
workaround avoiding restarts of the backend.

0 commit comments

Comments
 (0)