-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vault unwrap is failing in redirect HA mode #3071
Comments
I also ran into this when using |
@ctlajoie OP indicates that they're using redirect mode, but actually I think this was a bug affecting both that has been fixed. It should behave better in 0.8.0-rc1. |
I've just tested using vault unwrap command and it seems to be still failing after the upgrade to 0.8.1:
|
It's working for me:
|
@jefferai we are having the same issue in |
We publish upgrade guides on our site -- go to the guides area and you'll then see it on the left. |
Understood. Which version should we upgrade to? We are currently on |
0.8.3. |
Got it. Thx. One more question for you: is it a good idea to run multiple versions of Vault as part of the same cluster for canary deployments? e.g we are facing this issue on |
See here for our guidance around that: https://www.vaultproject.io/guides/upgrading/index.html |
We're running a cluster of Vault 0.7.3 behind a load balancer that points to unsealed vault nodes. The load balancer is also excluding the leader from the backend servers pool. The clients are redirected to the leader which will then be able to see the real client IP address for app role cidr validation purpose. The problem we're currently experience is:
When unwrapping a token, we get
error validating wrapping token: Vault is in standby mode
Vault status:
Create wrapped secret-id
Unwrap
The text was updated successfully, but these errors were encountered: