Re: [vault] Vault HA and Key Replication

144 views
Skip to first unread message

Jason Martin

unread,
Sep 21, 2018, 11:35:28 AM9/21/18
to vault...@googlegroups.com
HA works by using a storage backend that supports HA, such as
Consul or DynamoDB. The (encrypted) keys are persisted in this
storage. The slaves use this data to pick up where the leader
left off.

-Jason Martin

On Thu, Sep 20, 2018 at 10:25:00PM -0700, Salvador Salazar wrote:
> Reading through
> https://www.vaultproject.io/docs/internals/high-availability.html
> documentation, it is unclear to me how a HA set up works. I
> understand it's a master-slave scheme, where only the master
> will process all incoming request (reads and writes).
>
> However, if I understood correctly, when using the transit
> secret engine, encryption keys are stored within Vault's
> server. In the eventual scenario of the server going down, how
> do the "slave" vault servers learn about the pre-existent
> encryption keys? Do I need to set keys as "exportable", as
> https://www.vaultproject.io/api/secret/transit/index.html#exportable,
> and copy the keys to the slave servers?
>

Chris Hoffman

unread,
Sep 21, 2018, 11:39:09 AM9/21/18
to Vault
Vault HA mode works where all server instances are using the same shared storage but only one is active at a given time.  You can read more about HA here https://www.vaultproject.io/guides/operations/vault-ha-consul.html and https://www.vaultproject.io/docs/concepts/ha.html.

As a point of clarification, the exportable flag is only valid for API requests from Vault.  Server to server communication through Vault’s replication modes found in Vault Enterprise will still pass this information to secondary servers.

Chris
On Sep 21, 2018, 1:25 AM -0400, Salvador Salazar <ssal...@gmail.com>, wrote:
Reading through https://www.vaultproject.io/docs/internals/high-availability.html documentation, it is unclear to me how a HA set up works. I understand it's a master-slave scheme, where only the master will process all incoming request (reads and writes).

However, if I understood correctly, when using the transit secret engine, encryption keys are stored within Vault's server. In the eventual scenario of the server going down, how do the "slave" vault servers learn about the pre-existent encryption keys? Do I need to set keys as "exportable", as https://www.vaultproject.io/api/secret/transit/index.html#exportable, and copy the keys to the slave servers?

If there is any deeper documentation that you can point me to, I will be happy to go through everything. :)

Thank you

--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
 
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/9578523c-c528-4dc7-beb3-a82bb2765f87%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Vikrant Dubey

unread,
Sep 22, 2018, 7:24:52 AM9/22/18
to vault...@googlegroups.com
Hello All,

I am all set with my
 
--> 2 Vault servers: 1 active and 1 standby 
 --> Cluster of 3 Consul servers. 

But Vault URL for its UI is not working. Error 404 is coming. What needs to be done to get UI open using  http://IPADDRESS:8200/ui

Jeff Mitchell

unread,
Sep 24, 2018, 6:33:59 PM9/24/18
to Vault
Reply all
Reply to author
Forward
0 new messages