/tmp $ vault kv put secret/hello foo=world
Error making API request.
URL: GET http://127.0.0.1:8200/v1/sys/internal/ui/mounts/secret/hello
Code: 403. Errors:
* preflight capability check returned 403, please ensure client's policies grant access to path "secret/hello/"
/tmp $
/ $ vault operator init
Unseal Key 1: rUrvo0abV/NT0K4x5ZaCCkbyVbsf88rEUAr1qn00fNrw
Unseal Key 2: vZgywK0ZBh+RI+lKYb4oqzRt7P4BWuRacLTHYEZdtRL6
Unseal Key 3: 8yH0vbYloMEVzaLxPQgCalzUS3uG823UEfzqcLrlLQiL
Unseal Key 4: 9dVwFNK5agYi4fyZW1x0RayhG2YG6eZSp4wLVeLsXPjE
Unseal Key 5: w+KUxcV48Q1ZzyvtipzRcl0yLeYAD0g1ihQBfvZ1NZix
Initial Root Token: s.YIhdm8s9jMRqCqgUP00YyJjI
Vault initialized with 5 key shares and a key threshold of 3. Please securely
distribute the key shares printed above. When the Vault is re-sealed,
restarted, or stopped, you must supply at least 3 of these keys to unseal it
before it can start servicing requests.
Vault does not store the generated master key. Without at least 3 key to
reconstruct the master key, Vault will remain permanently sealed!
It is possible to generate new unseal keys, provided you have a quorum of
existing unseal keys shares. See "vault operator rekey" for more information.
/ $
vault operator init
/ $ vault operator init
Unseal Key 1: 0knf13iA1JvSgIixWC5VMQKtcyHbrfBWoqxSWGKAbuCY
Unseal Key 2: UDcCwhlGcYpdRvYvfLD51hdFTh6QXIjxP3NCMATF6hys
Unseal Key 3: fpO7dILIfIMB6pfOy/IRb5U1zMpELWSWbjUXalwlhYkP
Unseal Key 4: oy4BRHPogCxaF231MfIQjwdF0GNZGcVJRDjwrNvW+yki
Unseal Key 5: sOwl2LUwW0ZZYlgh/T0H9Ajw4VHVwsKuRIMhdvwfGfKw
Initial Root Token: s.sJSDGrPe7rwnb5NDUs5VzPon
Vault initialized with 5 key shares and a key threshold of 3. Please securely
distribute the key shares printed above. When the Vault is re-sealed,
restarted, or stopped, you must supply at least 3 of these keys to unseal it
before it can start servicing requests.
Vault does not store the generated master key. Without at least 3 key to
reconstruct the master key, Vault will remain permanently sealed!
It is possible to generate new unseal keys, provided you have a quorum of
existing unseal keys shares. See "vault operator rekey" for more information.
/ $
HA模式需要 consul 和 存储
https://helm.releases.hashicorp.com
server.replicas = 1
vault operator init
/ $ vault operator init
Unseal Key 1: 0mQk974OWKaSVTXGQ0Uzyj2bte1QM3AaOpSpjgazf9QZ
Unseal Key 2: 8/WoBHinaV0gMK6GsRuhnZWgolHpnBj2jkfAAW2khxTY
Unseal Key 3: gTYfW8gB9B3mI9c8oBYzWqks2Lkfu5cjC+MzWgdKU7sr
Unseal Key 4: FqF8oLlXh3zgnt5+4itdf83ecfmp9fSDC2hDSl4YG6kS
Unseal Key 5: ACAwtnxeD9Wgiq4VeQmQkhQg5IEXo6AYUgVV1u+Bq2g0
Initial Root Token: s.SkECG9cBaD259MLYh1Zvx9jv
Vault initialized with 5 key shares and a key threshold of 3. Please securely
distribute the key shares printed above. When the Vault is re-sealed,
restarted, or stopped, you must supply at least 3 of these keys to unseal it
before it can start servicing requests.
Vault does not store the generated master key. Without at least 3 key to
reconstruct the master key, Vault will remain permanently sealed!
It is possible to generate new unseal keys, provided you have a quorum of
existing unseal keys shares. See "vault operator rekey" for more information.
/ $