backend "consul" {
address = "127.0.0.1:8500"
path = "vault"
}
listener "tcp" {
address = "127.0.0.1:8200"
tls_disable = 1
}
I have a consul server and two agents running, and the 'vault server' command starts the server,
i set the VAULT_ADDR to 'http://127.0.0.1:8200' to avoid the https conflict, but when i try to 'vault init', this is the log output:
core: security barrier not initialized
core: failed to write seal configuration error=Unexpected response code: 403 (Permission denied)
core: failed to save barrier configuration error=failed to write seal configuration: Unexpected response code: 403 (Permission denied)
I can then use 'vault status' to get this:
Sealed: true
Key Shares: 5
Key Threshold: 3
Unseal Progress: 0
Version: Vault v0.6.1
High-Availability Enabled: true
Mode: sealed
Which means that the vault init is going through, but not outputting the keys for me to save and use. This then seals the vault and i have
no keys to unseal it.
I'm really hoping this is something simple that I'm missing as I am relatively new to this field. Thanks! -Hunter
--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/c5847c2b-391e-4f8c-977c-ca2bc11b2582%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Consul v0.7.0
{
"bootstrap": true,
"server": true,
"log_level": "DEBUG",
"enable_syslog": true,
"datacenter": "dc1",
"addresses" : {
"http": "0.0.0.0"
},
"bind_addr": "x.x.x.11",
"node_name": "x.x.x.11",
"data_dir": "/etc/consul.d/consuldata",
"ui_dir": "/etc/consul.d/consul-ui",
"acl_datacenter": "dc1",
"acl_master_token": "",
"acl_default_policy": "deny",
"encrypt": ""
}
Servers B (x.x.x.9) and C (x.x.x.10):
{
"bootstrap": false,
"server": false,
"log_level": "DEBUG",
"enable_syslog": true,
"datacenter": "dc1",
"addresses" : {
"http": "0.0.0.0"
},
"bind_addr": "x.x.x.9",
"node_name": "x.x.x.9",
"data_dir": "/etc/consul.d/consuldata",
"acl_datacenter": "dc1",
"acl_master_token": "",
"acl_default_policy": "deny",
"encrypt": ""
}
The tokens and encrypt keys are there in the real configs