You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It seems that there is some issue caused by having the audit log enabled. I have the audit backend configured to write to syslog.
I am still able to sign/verify data, so this is not a huge blocker, I just ran across it in my verification that the key existed. I tested the same thing out with the default key type(aes256-gcm96) and received no such errors. If I can provide any more details, please feel free to ask.
The text was updated successfully, but these errors were encountered:
I am trying to use the transit backend to sign/verify some data. To achieve this, I used an ecdsa-p256 in development and it worked great.
In a production environment, running a 2 node Vault cluster, with a 3 node Consul cluster, I am unable to read information about the transit key.
I write the key:
$ vault write -f transit/keys/my_key type=ecdsa-p256 Success! Data written to: transit/keys/my_key
When I attempt to read, I get a 500 error:
I investigated the logs of my Vault node, and was able to find this:
It seems that there is some issue caused by having the audit log enabled. I have the audit backend configured to write to syslog.
I am still able to sign/verify data, so this is not a huge blocker, I just ran across it in my verification that the key existed. I tested the same thing out with the default key type(aes256-gcm96) and received no such errors. If I can provide any more details, please feel free to ask.
The text was updated successfully, but these errors were encountered: