Vault kms unseal failed

I have setup aws kms based auto unseal and use consul as storage backend.I have also created temp consul and vault and restored consul snapshot in temp consul. Now when I try to start temp vault server and set storage backend at temp consul using same aws kms I am getting this error

2021-01-19T13:23:43.036Z [INFO] proxy environment: http_proxy= https_proxy= no_proxy=

2021-01-19T13:23:43.036Z [DEBUG] storage.consul: config path set: path=stg-vault

2021-01-19T13:23:43.036Z [WARN] storage.consul: appending trailing forward slash to path

2021-01-19T13:23:43.036Z [DEBUG] storage.consul: config address set: address=http://localhost:8500

2021-01-19T13:23:43.036Z [DEBUG] storage.consul: config address parsed: scheme=http

2021-01-19T13:23:43.036Z [DEBUG] storage.consul: config scheme parsed: address=localhost:8500

2021-01-19T13:23:43.043Z [DEBUG] service_registration.consul: config disable_registration set: disable_registration=false

2021-01-19T13:23:43.043Z [DEBUG] service_registration.consul: config service set: service=vault

2021-01-19T13:23:43.043Z [DEBUG] service_registration.consul: config service_tags set: service_tags=

2021-01-19T13:23:43.043Z [DEBUG] service_registration.consul: config service_address set: service_address=

2021-01-19T13:23:43.043Z [DEBUG] service_registration.consul: config address set: address=http://localhost:8500

2021-01-19T13:23:43.043Z [DEBUG] service_registration.consul: config address parsed: scheme=http

2021-01-19T13:23:43.043Z [DEBUG] service_registration.consul: config scheme parsed: address=localhost:8500

2021-01-19T13:25:45.724Z [WARN] no api_addr value specified in config or in VAULT_API_ADDR; falling back to detection if possible, but this value should be manually set

2021-01-19T13:25:45.728Z [DEBUG] storage.cache: creating LRU cache: size=0

2021-01-19T13:25:45.729Z [DEBUG] cluster listener addresses synthesized: cluster_addresses=[[::]:8201]

2021-01-19T13:25:45.734Z [INFO] core: stored unseal keys supported, attempting fetch

2021-01-19T13:25:45.764Z [DEBUG] core: unseal key supplied

2021-01-19T13:25:45.766Z [WARN] failed to unseal core: error=“unseal with stored key failed: failed to check for keyring: cannot decode sealwrapped storage entry “core/keyring””

2021-01-19T13:25:50.766Z [INFO] core: stored unseal keys supported, attempting fetch

2021-01-19T13:25:50.812Z [DEBUG] core: unseal key supplied

2021-01-19T13:25:50.813Z [WARN] failed to unseal core: error=“unseal with stored key failed: failed to check for keyring: cannot decode sealwrapped storage entry “core/keyring””

If anyone is still stuck on this. This issue occurs because of seal wrap. I was taking backup from vault enterprise and restoring in community vault. Seal Wrap is enterprise only feature.