![]() ![]() Using Kubernetes authentication: Portworx uses Kubernetes service account to fetch and refresh Vault tokens.Using Token authetication: A static Vault token is provided to Portworx.Based on your Vault configuration and the authentication method you choose, you must use one of the following two methods: Kubernetes users Step 1: Choose the Vault authentication method.Īuthentication methods are responsible for authenticating Portworx with Vault. Vault kv put secret/my-secret my-value= Key Value Enter the following command to unseal the Vault server. When you first start Vault, you must unseal it. See "vault operator rekey" for more information. It is possible to generate new unseal keys, provided you have a quorum ofĮxisting unseal keys shares. Reconstruct the main key, Vault will remain permanently sealed! Vault does not store the generated main key. Restarted, or stopped, you must supply at least 3 of these keys to unseal it Please securelyĭistribute the key shares printed above. Vault initialized with 5 key shares and a key threshold of 3. Initial Root Token: s.KkNJYWF5g0pomcCLEmDdOVCW Unseal Key 5: fYhZOseRgzxmJCmIqUd圎m9C3jB5Q27AowER9w4FC2Ck Unseal Key 4: 0cZE0C/gEk3YHaKjIWxhyyfs8REhqkRW/CSXTnmTilv+ Unseal Key 3: Arig0N9rN9ezkTRo7qTB7gsIZDaonOcc53EHo83F5chA Unseal Key 2: B05G1DRtfYckFV5BbdBvXq0wkK5HFqB9g2jcDmNfTQiS Vault operator init Unseal Key 1: 4jYbl2CBIv6SpkKj6Hos9iD32k5RfGkLzlosrrq/JgOm ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |