In some cases, Vault wants to have a notion of a single master/leader. For example, when a lease expires, Vault needs to revoke that lease (e.g., tear down issued credentials). When a token expires, all leases for that token need to be revoked. In your setup, which of the instances would tear down resources that are inherently global (such as AWS IAM users in the AWS Secrets engine)? Both might try, and that could cause race conditions and potentially data corruption.
But, more fundamentally, Vault isn't designed for this; it's not tested, it's not supported, and it could easily break in the future with no warning. There are many previous discussions around this very subject on this mailing list. You might get lucky, but you're playing with fire.
Paid Vault editions do support replication, and that is the suggested and supported way of handling global availability. I know it's a bit disappointing to hear a response of, "Buy the paid product," but HashiCorp employs a number of full-time engineers working on developing Vault, both OSS and paid features, and so HC needs to make money to be able to continue employing their engineers and delivering great features. (And no, I'm not a HashiCorp employee, just a community member and contributor, so I'm not trying to tell you that you should buy the product to support me personally.) There are some very thoughtful comments from HashiCorp employees at
https://github.com/hashicorp/vault/issues/132#issuecomment-320778432 about whether features are paid vs. OSS that I encourage people to read.
--Joel