-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to unseal vault with config files #3958
Comments
On postman sending a GET request on "http://127.0.0.1:8200/v1/sys/unseal" gives below response: { No error posted on console in this case. |
Attempt2"
backend "zookeeper" {
D:\WORK\KMS>vault server -config=etc\vault.hcl An ==> Vault server configuration:
2018/02/12 17:29:07 Connected to 127.0.0.1:2181 ==> Vault server started! Log data will stream in below: 2018/02/12 17:29:07 Authenticated: id=99512262965067777, timeout=4000
Error initializing Vault: Put https://127.0.0.1:8200/v1/sys/init: dial tcp 127.0.0.1:8200: connectex: No connection could be made because the target machine actively refused it. Where am I missing the step and how to initialise and unseal vault? Thanks |
This appears to be a duplicate of #3896 (not identical but caused by similar issues with the underlying library). You may want to try a build from master, or wait for 0.9.4 (or don't use zookeeper). |
Changed from zookeeper to filesystem storage. New hcl file: storage "file" { O/P of: vault server -config=config.hcl D:\WORK\KMS>vault server -config=config.hcl An ==> Vault server configuration:
==> Vault server started! Log data will stream in below: O/P of "vault init" D:\WORK>vault init Tried setting VAULt_ADDR: D:\WORK>set VAULT_ADDR=http://127.0.0.1:8200 D:\WORK>vault init D:\WORK> No service running on 8200 or 8201 or 8202 port. |
What is the rest of your configuration file? What is the rest of the data displayed at Vault startup? |
I've been hitting this exact same issue trying to run Vault with a Zookeeper backend. My config is practically identical to the one provided by jumbo007 and I got the very same error (e.g. "failed to check seal configuration: zk: invalid path"). This occurs with both windows_386 and windows_amd64 variants, and for all version I tried (0.8.3, 0.9.6 and 0.10.3) On further investigation, I've found that this issue is isolated to the Windows version of Vault. I launched the Docker version (official Vault image) with the same config file and it works just fine without any error. |
@dchrislloyd it says: Error initializing: Put http://127.0.0.1:8200/v1/sys/init: dial tcp 127.0.0.1:8200: connectex: No connection could be made because the target machine actively refused it. |
@AAGJKPRT did you found the solution for the problem in windows ?? |
I would guess it's Windows Firewall blocking the port, based on the error message. You could try telnet-ing into that port too to see if you can connct that way. |
try adding parameter disable_mlock = false in the config file. |
Hello - we haven't heard anything for a few weeks, so I'm going to close this for now. It's not clear to me thus far that this represents a bug in Vault itself. If you have more information on steps to reproduce, please let us know and we can take another look! Also, for future questions or discussion such as this, please checkout https://discuss.hashicorp.com/c/vault Thanks! |
100% this link will resolve your issue : |
@sudhir6199 - Your link https://www.techmanyu.com/hashicorp-vault-setup-on-linux/ is no more active. Crazy to see that issue still doesn't alternative solution yet. |
Hi
I am following below steps to start and unseal vault for secret storage.
Started zookeeper on my local windows setup on 2181 port
Created one path "vault" in zookeeper
[zk: localhost:2181(CONNECTED) 0] ls /
[zookeeper, vault]
[zk: localhost:2181(CONNECTED) 1]
backend "zookeeper" {
address = "127.0.0.1:2181"
redirect_addr = "http://127.0.0.1:8200"
path = "vault/"
}
listener "tcp" {
address = "127.0.0.1:8200"
tls_disable = true
}
D:\WORK\KMS>vault server -config=etc\vault.conf
==> WARNING: mlock not supported on this system!
An
mlockall(2)
-like syscall to prevent memory from beingswapped to disk is not supported on this system. Running
Vault on an mlockall(2) enabled system is much more secure.
==> Vault server configuration:
2018/02/12 12:49:26 Connected to 127.0.0.1:2181
==> Vault server started! Log data will stream in below:
2018/02/12 12:49:26 Authenticated: id=99511096385601541, timeout=4000
2018/02/12 12:49:26 Re-submitting
0
credentials after reconnect2018/02/12 12:49:39.216306 [ERROR] core: failed to read seal configuration: error=zk: invalid path
D:\WORK\KMS>vault unseal
Error checking seal status: Get https://127.0.0.1:8200/v1/sys/seal-status: http: server gave HTTP response to HTTPS client
On Postman, sending a GET request on "http://127.0.0.1:8200/v1/sys/seal-status" gives below response:
{
"errors": [
"failed to check seal configuration: zk: invalid path"
]
}
What is the correct way to start and unseal vault with zookeeper as storage?
The text was updated successfully, but these errors were encountered: