Upgrade Notes
When you upgrade from Istio 1.6.x to Istio 1.7.x, you need to consider the changes on this page. These notes detail the changes which purposefully break backwards compatibility with Istio 1.6.x. The notes also mention changes which preserve backwards compatibility while introducing new behavior. Changes are only included if the new behavior would be unexpected to a user of Istio 1.6.x.
Require Kubernetes 1.16+
Kubernetes 1.16+ is now required for installation.
Installation
istioctl manifest apply
is removed, please useistioctl install
instead.- Installation of telemetry addons by istioctl is deprecated, please use these addons integration instructions.
Gateways run as non-root
Gateways will now run without root permissions by default. As a result, they will no longer be able to bind to ports below 1024. By default, we will bind to valid ports. However, if you are explicitly declaring ports on the gateway, you may need to modify your installation. For example, if you previously had the following configuration:
ingressGateways:
- name: istio-ingressgateway
enabled: true
k8s:
service:
ports:
- port: 15021
targetPort: 15021
name: status-port
- port: 80
name: http2
- port: 443
name: https
It should be changed to specify a valid targetPort
that can be bound to:
ingressGateways:
- name: istio-ingressgateway
enabled: true
k8s:
service:
ports:
- port: 15021
targetPort: 15021
name: status-port
- port: 80
name: http2
targetPort: 8080
- port: 443
name: https
targetPort: 8443
Note: the targetPort
only modifies which port the gateway binds to. Clients will still connect to the port defined by port
(generally 80 and 443), so this change should be transparent.
If you need to run as root, this option can be enabled with --set values.gateways.istio-ingressgateway.runAsRoot=true
.
EnvoyFilter
syntax change
EnvoyFilter
s using the legacy config
syntax will need to be migrated to the new typed_config
. This is due to underlying changes in Envoy’s API.
As EnvoyFilter
is a break glass API without backwards compatibility guarantees, we recommend users explicitly bind EnvoyFilter
s to specific versions and appropriately test them prior to upgrading.
For example, a configuration for Istio 1.6, using the legacy config
syntax:
apiVersion: networking.istio.io/v1alpha3
kind: EnvoyFilter
metadata:
name: lua-1.6
spec:
configPatches:
- applyTo: HTTP_FILTER
match:
context: ANY
listener:
filterChain:
filter:
name: envoy.http_connection_manager
proxy:
proxyVersion: ^1\.6.*
patch:
operation: INSERT_BEFORE
value:
name: envoy.lua
config:
inlineCode: |
function envoy_on_request(handle)
request_handle:headers():add("foo", "bar")
end
When upgrading to Istio 1.7, a new filter should be added:
apiVersion: networking.istio.io/v1alpha3
kind: EnvoyFilter
metadata:
name: lua-1.7
spec:
configPatches:
- applyTo: HTTP_FILTER
match:
context: ANY
listener:
filterChain:
filter:
name: envoy.http_connection_manager
proxy:
proxyVersion: ^1\.7.*
patch:
operation: INSERT_BEFORE
value:
name: envoy.filters.http.lua
typed_config:
'@type': type.googleapis.com/envoy.extensions.filters.http.lua.v3.Lua
inlineCode: |
function envoy_on_request(handle)
request_handle:headers():add("foo", "bar")
end