Hi, we’ve been using Consul Connect with Vault as an external CA, and have provided Consul servers with a periodic token to manage the PKI endpoints completely with the permissions specified in the docs.
However on Saturday, the root CA in Vault seems to have expired without Consul replacing or renewing it properly.
My question is whether Consul is supposed to handle this process or if we’re expected to provide a new PKI endpoint before the root expires?
Hi, thank you for the docs. We’ve been trying to use the rotation process via consul connect ca set-config command, just changing to a new Vault root endpoint with a different name.
We see the CA roots update in Consul and existing proxies work fine, however any new proxies we start will error out with "Failed to load trusted CA certificates from " until we specifically restart the Consul leader and an election is forced.
I haven’t found any docs/issues regarding this behavior. It seems like a bug but we’re not entirely sure. Are we implementing this incorrectly?