Closed 13567436138 closed 1 year ago
Hi @13567436138,
I believe you might be running a Vault OSS server, so the response you are receiving is expected. Creating namespaces in Vault requires the Enterprise edition of Vault.
If I have incorrectly diagnosed the issue you are reporting please feel free to re-open this issue!
Describe the bug A clear and concise description of what the bug is.
To Reproduce Steps to reproduce the behavior:
vault write ...
vault login....
Expected behavior A clear and concise description of what you expected to happen.
Environment:
vault status
):Seal Type shamir Initialized true Sealed false Total Shares 5 Threshold 3 Version 1.12.1 Build Date 2022-10-27T12:32:05Z Storage Type file Cluster Name vault-cluster-4c3b22c9 Cluster ID 0e2e4ce6-98e5-ef4f-3cad-768289e8005d HA Enabled false
vault version
):listener "tcp" { tls_disable = 1 address = "[::]:8200" cluster_address = "[::]:8201"
Enable unauthenticated metrics access (necessary for Prometheus Operator)
telemetry {
unauthenticated_metrics_access = "true"
}
} storage "file" { path = "/vault/data" }
Example configuration for using auto-unseal, using Google Cloud KMS. The
GKMS keys must already exist, and the cluster must have a service account
that is authorized to access GCP KMS.
seal "gcpckms" {
project = "vault-helm-dev"
region = "global"
key_ring = "vault-helm-unseal-kr"
crypto_key = "vault-helm-unseal-key"
}
Example configuration for enabling Prometheus metrics in your config.
telemetry {
prometheus_retention_time = "30s",
disable_hostname = true
}/ $
Additional context Add any other context about the problem here.