I’m running vault on GKE using the official helm chart. This is my config:
ui = true
listener “tcp” {
tls_disable = 1
address = “[::]:8200”
cluster_address = “[::]:8201”
}
storage “gcs” {
bucket = “<>”
ha_enabled = “true”
}
service_registration “kubernetes” {}
# Example configuration for using auto-unseal, using Google Cloud KMS. The
# GKMS keys must already exist, and the cluster must have a service account
# that is authorized to access GCP KMS.
seal “gcpckms” {
project = “<>”
region = “>?”
key_ring = “<>”
crypto_key = “<>”
}
I think I configured everything correctly but still getting this unclear error:
==> Vault server configuration:
GCP KMS Crypto Key: <>
GCP KMS Key Ring: <>
GCP KMS Project: <>
GCP KMS Region: <>
Seal Type: gcpckms
Api Address: http://<>:8200
Cgo: disabled
Cluster Address: https://vault-0.vault-internal:8201
Listener 1: tcp (addr: "[::]:8200", cluster address: "[::]:8201", max_request_duration: "1m30s", max_request_size: "33554432", tls: "disabled")
Log Level: trace
Mlock: supported: true, enabled: false
Recovery Mode: false
Storage: gcs (HA available)
Version: Vault v1.4.2
==> Vault server started! Log data will stream in below:
2020-06-03T14:51:59.943Z [INFO] proxy environment: http_proxy= https_proxy= no_proxy=
2020-06-03T14:51:59.944Z [DEBUG] storage.gcs: configuring backend
2020-06-03T14:51:59.944Z [DEBUG] storage.gcs: configuration: bucket=<> chunk_size=8388608 ha_enabled=true max_parallel=0
2020-06-03T14:51:59.944Z [DEBUG] storage.gcs: creating client
2020-06-03T14:52:05.934Z [DEBUG] service_registration.kubernetes: “namespace”: “<>”
2020-06-03T14:52:05.934Z [DEBUG] service_registration.kubernetes: “pod_name”: “vault-0”
2020-06-03T14:52:06.056Z [DEBUG] storage.cache: creating LRU cache: size=0
2020-06-03T14:52:06.056Z [DEBUG] cluster listener addresses synthesized: cluster_addresses=[[::]:8201]
2020-06-03T14:52:06.075Z [INFO] core: stored unseal keys supported, attempting fetch
2020-06-03T14:52:06.093Z [WARN] failed to unseal core: error=“stored unseal keys are supported, but none were found”
2020-06-03T14:52:06.419Z [INFO] core.autoseal: seal configuration missing, but cannot check old path as core is sealed: seal_type=recovery
2020-06-03T14:52:09.420Z [INFO] core.autoseal: seal configuration missing, but cannot check old path as core is sealed: seal_type=recovery
2020-06-03T14:52:11.093Z [INFO] core: stored unseal keys supported, attempting fetch
What am I missing? this is a clean install from scratch, not a restore