Closed szechp closed 8 months ago
I am curious to learn about the autopilot behaviour. Would you please checkout the tutorial in the link and post here autopilot configuration and state?
vault operator raft autopilot get-config
Key Value
--- -----
Cleanup Dead Servers false
Last Contact Threshold 10s
Dead Server Last Contact Threshold 24h0m0s
Server Stabilization Time 10s
Min Quorum 0
Max Trailing Logs 1000
Disable Upgrade Migration false
vault operator raft autopilot state
Healthy: false
Failure Tolerance: 0
Leader: vault-01
Voters:
vault-01
Servers:
vault-01
Name: vault-01
Address: node1:8201
Status: leader
Node Status: alive
Healthy: true
Last Contact: 0s
Last Term: 4
Last Index: 55
Version: 1.14.9
Node Type: voter
vault-02
Name: vault-02
Address: node2:8201
Status: non-voter
Node Status: alive
Healthy: false
Last Contact: 49h4m44.00153693s
Last Term: 0
Last Index: 0
Version: 1.14.9
Node Type: voter
vault-03
Name: vault-03
Address: node3:8201
Status: non-voter
Node Status: alive
Healthy: false
Last Contact: 49h4m25.821732653s
Last Term: 0
Last Index: 0
Version: 1.14.9
Node Type: voter
the time till last contact exactly lines up with the first unseal of the nodes, which passes with no errors. so there is a unseal, but it somehow reseals and wont let me unseal afterwards.
okay i figured out the problem: i forgot to open up the tcp port 8201 in our firewall.
Hi,
I am also facing the same issue , my side the ports are opened but still it is showing me same error.
I am using vault version1.16.2.
Describe the bug The bug is related to the inability to successfully unseal Vault on a High Availability (HA) setup using Raft storage. Despite successfully joining the Raft cluster, the vault remains in a sealed state on one of the nodes (vault-02). Upon retrying the unseal process, an error is encountered, indicating an issue with creating the cipher and an invalid key size.
To Reproduce Steps to reproduce the behavior:
vault operator unseal
with 3 keys on node-01 which unseals fine.vault operator unseal
with 3 keys on node-02 which seems to unseals fine and adds the node:vault operator unseal
with 3 keys on node-02 which returns this error* failed to create cipher: crypto/aes: invalid key size 0
Expected behavior i want vault-02 to unseal.
Environment:
vault status
): 1.14.9vault version
): Vault v1.14.9 (7c9990adc7b56d27ef5f461ee484764643ba16f7), built 2024-01-29T17:52:52ZVault server configuration file(s):
Additional context I'm using self signed certs i distribute across all nodes.
additional logs: