Hello
I try to migrate to raft backend, the old backend is consul
We have 3 servers with HA with tls
the first node is ok, all is up with raft
but when the 2nd node boot they are always errors and join the cluster with:
state voter
follower false
in 2nd node :
core.cluster-listener: no TLS config found for ALPN: ALPN=[“raft_storage_v1”]
in first:
May 28 23:29:06 01-node vault[127235]: 2022-05-28T23:29:06.049+0200 [ERROR] storage.raft: failed to appendEntries to: peer="{Nonvoter 02-node 02-node:8201}" error=“remote error: tls: internal error”
sometime when i restart the migration:
Error unsealing: context deadline exceeded
We tryed with tls option in section raft but same error
We tryed with other cluster but in http, all worked
vault version 1.10.3
config:
cluster_name = “vault”
max_lease_ttl = “768h”
default_lease_ttl = “768h”
disable_clustering = “False”
cluster_addr = “https://01-node:8201”
api_addr = “https://01-node:8200”
plugin_directory = “/usr/local/lib/vault/plugins”
listener “tcp” {
address = “XX.XX.XX.XX:8200”
cluster_address = “XX.XX.XX.XX:8201”
tls_cert_file = “/etc/vault.d/ssl/vault.crt”
tls_key_file = “/etc/vault.d/ssl/vault.key”
tls_disable = “false”
proxy_protocol_authorized_addrs = “XX.XX.XX.XX”
proxy_protocol_behavior = “allow_authorized”
x_forwarded_for_authorized_addrs = “XX.XX.XX.XX”
x_forwarded_for_reject_not_authorized = “false”
x_forwarded_for_reject_not_present = “false”
}
storage “raft” {
path = “/data/vault/raft/”
node_id = “01-node”
retry_join {
leader_api_addr = “https://01-node:8200”
#leader_client_cert_file = “/etc/vault.d/ssl/vault.crt”
#leader_client_key_file = “/etc/vault.d/ssl/vault.key”
#leader_ca_cert_file = “/etc/vault.d/ssl/vault_cacert.pem”
#leader_tls_servername = “01-node”
}
retry_join {
leader_api_addr = “https://02-node:8200”
#leader_client_cert_file = “/etc/vault.d/ssl/vault.crt”
#leader_client_key_file = “/etc/vault.d/ssl/vault.key”
#leader_ca_cert_file = “/etc/vault.d/ssl/vault_cacert.pem”
#leader_tls_servername = “02-node”
}
retry_join {
leader_api_addr = “https://03-node:8200”
#leader_client_cert_file = “/etc/vault.d/ssl/vault.crt”
#leader_client_key_file = “/etc/vault.d/ssl/vault.key”
#leader_ca_cert_file = “/etc/vault.d/ssl/vault_cacert.pem”
#leader_tls_servername = “03-node”
}
}
#backend “consul” {
#address = “01-node:8501”
#path = “vault”
#service = “vault”
#token = “XXXXXXXXXXXXX”
#scheme = “https”
#}
ui = true
disable_mlock = true