Key Value - token s.hVvcy6gpcaifc9JEetzJENes token_accessor mOzYyELAnMM9qAYRl9jItSPP token_duration ∞ token_renewable false token_policies identity_policies policies Success! Enabled the kv-v2 secrets engine at: kv/ storing secret 'kv/apikey' to demonstrate snapshot and recovery methods Key Value - created_time T20:23:20.007558Z deletion_time n/a destroyed false version 1 = Metadata = Key Value - created_time T20:23:20.007558Z deletion_time n/a destroyed false version 1 = Data = Key Value - webapp ABB39KKPTWOR832JGNLS02 Future Vault requests will automatically use this token. You do NOT need to run "vault login" again. The token information displayed below is already stored in the token helper. cluster.sh setup vault_2 Using root token (s.1AoVuEpdGp1aZez2iGiINPo6) to retrieve transit key for auto-unseal starting Vault server initializing and capturing the recovery key and root token Recovery key: u7LNz4gDy0W/REpjLiVrr5JD05yeRzZQv218JN4rc3A= Root token: s.hVvcy6gpcaifc9JEetzJENes waiting to join Vault cluster (15 seconds) logging in and enabling the KV secrets engine Success! You are now authenticated. Key Value - token s.1AoVuEpdGp1aZez2iGiINPo6 token_accessor RkToomYDiEnmfbsWbDgTFjiH token_duration ∞ token_renewable false token_policies identity_policies policies enabling the transit secrets engine and storing key to enable remaining nodes to join the cluster Success! Enabled the transit secrets engine at: transit/ Success! Data written to: transit/keys/unseal_key
cluster.sh setup vault_1 starting Vault server initializing and capturing the unseal key and root token Unseal key: O8jPtbOvpjLOnXOXmE2iIvFXZ0l2q4WyHdAK5UWQdiw= Root token: s.1AoVuEpdGp1aZez2iGiINPo6 unsealing and logging in Key Value - Seal Type shamir Initialized true Sealed false Total Shares 1 Threshold 1 Version 1.8.1 Storage Type inmem Cluster Name vault-cluster-e8af93da Cluster ID 44f1cda9-0291-3651-927a-68c5bfa1ea6e HA Enabled false Success! You are now authenticated. Hashicorp/vault-guides repository from GitHub. Retrieve the configuration by cloning or downloading the vault_2 ( ) is initialized and unsealed.Token creates a transit key that enables the other Vaults auto-unseal. vault_1 ( ) is initialized and unsealed.The cluster.sh script configures and starts four Vault servers. This tutorial requires Vault, sudo access, and additional configuration to create Lowers complexity when diagnosing issues (leading to faster time to recovery).Eliminates additional network requests.