Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [WARN] core: leadership lost, stopping active operation
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] core: pre-seal teardown starting
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] rollback: stopping rollback manager
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] core: pre-seal teardown complete
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] core: pre-seal teardown starting
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] core: pre-seal teardown complete
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] core: acquired lock, enabling active operation
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] core: post-unseal setup starting
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] rollback: starting rollback manager
Sep 03 22:07:00 ip-10-183-2-50.ec2.internal bash[9770]: 2015/09/03 22:07:00 [INFO] core: post-unseal setup complete
Any idea what's going on?
--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/eaaa2849-a231-40af-ad2a-22c6b7eacec4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
// DetectHostAddr is used to detect the host address by asking the Consul agentfunc (c *ConsulBackend) DetectHostAddr() (string, error) { agent := c.client.Agent() self, err := agent.Self() if err != nil { return "", err } addr := self["Member"]["Addr"].(string) return addr, nil}To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/e8c02c69-89fd-47cf-9d41-be09a5d958cc%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/53f27372-8271-453d-8547-721002629119%40googlegroups.com.
Thanks. I can certainly do that if that's the way it's supposed to be done. So if I wanted to separate my consul and vault tiers, rather than use an ELB I'd want to run a consul client locally on the vault server and it'd forward to the consul server on the other machine?
I didn't realize that consul (like Vault) runs in a single-leader mode though. Does that mean that the only effective way to scale vault and consul is to go to bigger and bigger machines, rather than scaling out horizontally?
I'm running m4.large instances. That's 2 vCPUs and 8GB of RAM. For the moment the consul server leader and the vault leader could end up being the same machine. Should I change that? Very roughly speaking, what volume of traffic would running both consul and vault on an m4.large be likely to handle before problems?