hashicorp / vault

A tool for secrets management, encryption as a service, and privileged access management
https://www.vaultproject.io/
Other
30.9k stars 4.17k forks source link

can not create namespace #19668

Closed 13567436138 closed 1 year ago

13567436138 commented 1 year ago

Describe the bug A clear and concise description of what the bug is.

[root@node01 policy]# vault namespace create ns1
Error creating namespace: Error making API request.

URL: PUT http://10.69.215.160:8200/v1/sys/namespaces/ns1
Code: 404. Errors:

* 1 error occurred:
        * unsupported path

To Reproduce Steps to reproduce the behavior:

  1. Run vault write ...
  2. Run vault login....
  3. See error

Expected behavior A clear and concise description of what you expected to happen.

Environment:

listener "tcp" { tls_disable = 1 address = "[::]:8200" cluster_address = "[::]:8201"

Enable unauthenticated metrics access (necessary for Prometheus Operator)

telemetry {

unauthenticated_metrics_access = "true"

}

} storage "file" { path = "/vault/data" }

Example configuration for using auto-unseal, using Google Cloud KMS. The

GKMS keys must already exist, and the cluster must have a service account

that is authorized to access GCP KMS.

seal "gcpckms" {

project = "vault-helm-dev"

region = "global"

key_ring = "vault-helm-unseal-kr"

crypto_key = "vault-helm-unseal-key"

}

Example configuration for enabling Prometheus metrics in your config.

telemetry {

prometheus_retention_time = "30s",

disable_hostname = true

}/ $

```hcl
# Paste your Vault config here.
# Be sure to scrub any sensitive values

Additional context Add any other context about the problem here.

stevendpclark commented 1 year ago

Hi @13567436138,

I believe you might be running a Vault OSS server, so the response you are receiving is expected. Creating namespaces in Vault requires the Enterprise edition of Vault.

If I have incorrectly diagnosed the issue you are reporting please feel free to re-open this issue!