@@ -348,7 +348,41 @@ then performs a second password update.
348348While users still receive the latest password, the secondary update may lead to
349349unexpected LDAP activity and cause confusion interpreting audit logs.
350350
351- ### Recommendation
351+ #### Recommendation
352352
353353Send check-in requests directly to the active node of the primary cluster to
354354prevent duplicate password rotations on the LDAP server.
355+
356+ ### Writing configuration to local auth mount (ldap, aws, gcp, azure) ignores local flag ((#local-auth-known-issue))
357+
358+ | Change | Affected version | Fixed version |
359+ | :--- | :--- | :--- |
360+ | Known issue | 1.20.x, 1.19.x | None |
361+
362+ Write operations targeting a local auth mount on a performance replication secondary
363+ cluster are incorrectly forwarded to the primary cluster for processing. This
364+ prevents the independent configuration of local mounts on secondary clusters.
365+
366+ The following auth methods are affected:
367+ - Azure
368+ - GCP
369+ - AWS
370+ - LDAP
371+
372+ This behavior leads to two distinct failure modes. If a local auth mount with the
373+ same path exists on the primary, the write operation is incorrectly applied to
374+ the primary's mount. If the auth mount path does not exist on the primary, the
375+ secondary cluster panics with a ` nil pointer dereference ` error, causing the
376+ Vault node to crash.
377+
378+ As a result, it is not possible to maintain independent configurations for
379+ local mounts that share the same path across a primary and its secondaries.
380+ Furthermore, attempting to use unique paths on the secondary that do not exist
381+ on the primary leads to a panic as Vault will forward the request.
382+
383+ #### Recommendation
384+
385+ There is currently no known workaround for this issue. Do not attempt to
386+ configure local auth mounts on performance replication secondaries until a fix
387+ is available.
388+
0 commit comments