When you upgrade from Istio 1.5.x to Istio 1.6.x, you need to consider the changes on this page. These notes detail the changes which purposefully break backwards compatibility with Istio 1.5.x. The notes also mention changes which preserve backwards compatibility while introducing new behavior. Changes are only included if the new behavior would be unexpected to a user of Istio 1.5.x.
Currently, Istio doesn’t support skip-level upgrades. If you are using Istio 1.4, you must upgrade to Istio 1.5 first, and then upgrade to Istio 1.6. If you upgrade from versions earlier than Istio 1.4, you should first disable Galley’s configuration validation.
Update the Galley deployment using the following steps:
To edit the Galley deployment configuration, run the following command:
$ kubectl edit deployment -n istio-system istio-galley
--enable-validation=falseoption to the
command:section as shown below:
apiVersion: extensions/v1beta1 kind: Deployment ... spec: ... template: ... spec: ... containers: - command: ... - --log_output_level=default:info - --enable-validation=false
Save and quit the editor to update the deployment configuration in the cluster.
ValidatingWebhookConfiguration Custom Resource (CR) with the following command:
$ kubectl delete ValidatingWebhookConfiguration istio-galley -n istio-system
Change the readiness port of gateways
If you are using the
15020 port to check the health of your Istio ingress gateway with your Kubernetes network load balancer, change the port from
Removal of legacy Helm charts
Istio 1.4 introduced a new way to install Istio using the in-cluster Operator or
istioctl install command. Part of this change meant deprecating the old Helm charts in 1.5. Many new Istio features rely on the new installation method. As a result, Istio 1.6 doesn’t include the old Helm installation charts.
Go to the Istio 1.5 Upgrade Notes before you continue because Istio 1.5 introduced several changes not present in the legacy installation method, such as Istiod and telemetry v2.
To safely upgrade from the legacy installation method that uses Helm charts, perform a control plane revision. Upgrading in-place is not supported. Upgrading could result in downtime unless you perform a canary upgrade.
Support ended for
v1alpha1 security policy
Istio 1.6 no longer supports the following security policy APIs:
Starting in Istio 1.6, Istio ignores these
v1alpha1 security policy APIs.
Istio 1.6 replaced the
v1alpha1 authentication policy with the following APIs:
Istio 1.6 replaces the
v1alpha1 RBAC policy APIs with the
v1beta1 authorization policy APIs.
Verify that there are no
v1alpha1 security policies in your clusters the following commands:
$ kubectl get policies.authentication.istio.io --all-namespaces $ kubectl get meshpolicies.authentication.istio.io --all-namespaces $ kubectl get rbacconfigs.rbac.istio.io --all-namespaces $ kubectl get clusterrbacconfigs.rbac.istio.io --all-namespaces $ kubectl get serviceroles.rbac.istio.io --all-namespaces $ kubectl get servicerolebindings.rbac.istio.io --all-namespaces
If there are any
v1alpha1 security policies in your clusters, migrate to the new APIs before upgrading.
Istio configuration during installation
Past Istio releases deployed configuration objects during installation. The presence of those objects caused the following issues:
- Problems with upgrades
- A confusing user experience
- A less flexible installation
To address these issues, Istio 1.6 minimized the configuration objects deployed during installation.
The following configurations are impacted:
global.mtls.enabled: Configuration removed to avoid confusion. Configure a peer authentication policy to enable strict mTLS instead.
- No default
Certificatecustom resources are deployed during installation. Go to the Ingress task to configure a gateway for your mesh.
- Istio no longer creates
Ingresscustom resources for telemetry addons. Visit remotely accessing telemetry addons to learn how to reach the addons externally.
- The default sidecar configuration is no longer defined through the automatically generated
Sidecarcustom resource. The default configuration is implemented internally and the change should have no impact on deployments.
Reach Istiod through external workloads
In Istio 1.6, Istiod is configured to be
cluster-local by default. With
cluster-local enabled, only workloads running on the same cluster can reach Istiod. Workloads on another cluster can only access the Istiod instance through the Istio gateway. This configuration prevents the ingress gateway of the master cluster from incorrectly forwarding service discovery requests to Istiod instances in remote clusters. The Istio team is actively investigating alternatives to no longer require
To override the default
cluster-local behavior, modify the configuration in the
MeshConfig section as shown below:
values: meshConfig: serviceSettings: - settings: clusterLocal: false hosts: - "istiod.istio-system.svc.cluster.local"