Skip to main content
  1. Blog
  2. Article

Anthony Dillon
on 3 October 2016

Juju GUI 2.2.0 released


We’re pleased to announce the latest feature release of the Juju GUI.

With the GA of Juju 2 release coming very soon we’re ready to unveil the new enhanced model management in the Juju GUI. The new GUI allows you to take advantage of Juju 2’s multi-user multi-model functionality as seamlessly as you worked with a single model in the past. You can now create new models, select which region in your cloud to deploy to, add new credentials, and choose which credentials to use when deploying new models.

For a complete rundown of the new features in the the 2.2.0 release of the Juju GUI check out this video below:

Changes:

  • New and enhanced model management in this release. This new experience allows you to create new models, select which region to deploy to, add new credentials, and choose which credentials to use when deploying to new models.
  • Add Bundle Service support. This feature allows the GUI to use the external Bundle Service to import bundles when the bundle lib in Juju is not available, such as when in a sandbox or unconnected mode.
  • Add version.json asset which contains the version number and git sha used to build the GUI. To access this file visit the following path replacing the necessary values:
    /gui/[CONTROLLER UUID]/[MODEL UUID]/static/gui/build/app/version.json
  • (Fix) Logging in via USSO when you have no models.
  • (Fix) Update relation list when removing uncommitted subordinate relation.
  • (Fix) No clouds result when listing clouds.
  • (Fix) Switch between unconnected state to connected state.

To upgrade your existing models to use this version of the GUI:

Juju 2:

Run juju upgrade-gui
Run juju gui --show-credentials

Juju 1:

Run juju upgrade-charm juju-gui

We welcome any feedback you may have on the GUI. You can chat with us in #juju on irc.freenode.net or you can file issues at: https://github.com/juju/juju-gui/issues

Related posts


Luci Stanescu
19 May 2026

CVE-2026-46333 (ssh-keysign-pwn) Linux kernel vulnerability mitigations

Ubuntu Article

An information disclosure security vulnerability in the Linux kernel was publicly disclosed on May 15th, 2026. The vulnerability was reported by Qualys and fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published soon after public disclosure. The ID CVE-2026-46333 was assigned, but the vulnerability is also referr ...


Canonical
19 May 2026

Canonical launches Ubuntu Core 26

Canonical announcements Article

Ubuntu Core 26 introduces precise Linux builds, optimized OTA updates, live kernel patching, and enhanced hardware-backed protection for mission-critical deployments. May 19, 2026 Today, Canonical announced the general availability of Ubuntu Core 26, its minimal, immutable operating system with up to 15 years of security maintenance.  Ubu ...


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...