-
After we support CDH to unseal secret by ehsm, we can integrate the ability of ehsm to make sealed secrets in the [tool](https://github.com/confidential-containers/guest-components/blob/main/confident…
-
**Is your feature request related to a problem? Please describe.**
I would like to utilize IBM Key Protect to run vault with auto-unseal enabled in a kubernetes cluster in IBM Cloud.
**Describe t…
-
A long standing issue is that the kernel will happily try to reduce functions defined by well-founded recursion (#2171), and then this often fails with `(kernel) deep recursion detected`.
This lead…
-
#### Description of the problem
We are seeing a strange typeclass resolution failure in Iris. We managed to reproduce it in Iris itself (it originally came up further downstream) but I have no …
-
**Is your feature request related to a problem? Please describe.**
I am following the tutorial [Auto-unseal using Transit Secrets Engine](https://learn.hashicorp.com/tutorials/vault/autounseal-transi…
-
Cluster cannot be created due to:
```
module.eks-jx.module.vault.aws_kms_key.kms_vault_unseal[0]: Still creating... [1m40s elapsed]
```
I suspect that it may be related to https://github.com/h…
-
**Describe the bug**
VaultSaticSecret doesnt resume syncing post a Vault being sealed, and then unsealed. Vault instance is external to the cluster and was successfully unsealed.
Expected Vau…
-
All apps are currently deployed into a single namespace.
I'm not sure that this is required or helpful, because `$VAULT_K8S_NAMESPACE` is currently only used to facilitate the unseal operations in …
-
**Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
In production, you will never do any…
-
**Describe the bug**
Using AWS KMS as a method to automatically unseal HashiCorp Vault most likely results in unnecessary AWS KMS API calls.
I have 2 Vault instances set up that use AWS KMS as a…