Skip to content

Commit

Permalink
Docs: mlock() notes, fixes #3605 (#3614)
Browse files Browse the repository at this point in the history
  • Loading branch information
brianshumate authored and jefferai committed Dec 4, 2017
1 parent 9692cde commit 0a53ea2
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 1 deletion.
2 changes: 2 additions & 0 deletions website/source/docs/configuration/index.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -88,6 +88,8 @@ to specify where the configuration is.
sudo setcap cap_ipc_lock=+ep $(readlink -f $(which vault))
```

If you use a Linux distribution with systemd, you can also add the above `setcap` command as an [ExecStartPre](https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStartPre=) additional command in your Vault unit file to ensure that `mlock()` capability is added to the `vault` binary before executing.
- `plugin_directory` `(string: "")` – A directory from which plugins are
allowed to be loaded. Vault must have permission to read files in this
directory to successfully load plugins.
Expand Down
2 changes: 1 addition & 1 deletion website/source/guides/upgrading/index.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ active duty. To do this:
If you kill Vault without letting it release the lock, a standby node will
not be able to take over until the lock's timeout period has expired. This
is backend-specific but could be ten seconds or more.
2. Replace the Vault binary with the new version
2. Replace the Vault binary with the new version; ensure that `mlock()` capability is added to the new binary with [setcap](https://www.vaultproject.io/docs/configuration/index.html#disable_mlock)
3. Start the node
4. Unseal the node (it will now be a standby)

Expand Down

0 comments on commit 0a53ea2

Please sign in to comment.