-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
unable to get root token since vault is already initialized #1
Comments
When you do the initial vault operator init it should give the root token and the recovery keys as part of the output. |
When the pods are just started in a ready state i've been getting this:
Then after the timeouts, il just get the final result of this.
Thus i was never able to get the root token, even after deleting all the pvc's and starting a new install, the same issue persists with gke deployment, any ideas? |
Yours certs are probably not setup correctly. The pods can't talk to each other using TLS so they time out. |
ah i see, but if they were set up incorrectly, would vault still be able to initialize automatically via gcpkms? thus outputting this: |
Hi,
Following the steps, i was not able to run kubectl exec -ti vault-primary-0 -- vault operator init |tee keys.txt since the vault is already initialized. after trying to regenerate a root token, i since it is already initialized i dont have a the unseal tokens. Running vault operator init during after deleting all the pvc's then re-running helm install while waiting for the pods to run, still will not allow me to get the initial root token.
How did you get the root token?
The text was updated successfully, but these errors were encountered: