2. More commands
k -n vault get po
helm uninstall vault -n vault
k -n vault delete pvc data-vault-0 && k -n vault delete pvc data-vault-1 && k -n vault delete pvc data-vault-2
kubectl -n vault exec -it vault-0 -- sh
vault status
vault operator init
Recovery Key 1: HNIklRd8qUTjYWc2Z5Nb6j0pf/gWs1cHZ5EdvM8HiJxV
Recovery Key 2: 39GW0D2kGyyYzjo/DJQo6bLBFdl2byjB6sOqJrZycSbh
Recovery Key 3: UWWm7sfv0gp40vN45bgn3RGq46nwgSA7HjY5zqknCutr
Recovery Key 4: PPdY8hXrPu6ivH/fajou5KlwCV/kdGhq4zlehepGILDi
Recovery Key 5: UGM09jkX1BkjOY5AkaPMlFLoKv6vej5qQKEx1SsWD9ST
Initial Root Token: s.dyvqvmZeWgddY8Tdxk2G19Sy
export VAULT_TOKEN=s.mg25giPe5EscxCzJkmHUrixi
vault operator raft list-peers
vault operator raft join -leader-ca-cert="$(cat /vault/userconfig/vault-tls/vault_ca)" --address "https://vault-1.vault-internal:8200" "https://vault-0.vault-internal:8200"
vault operator raft join -leader-ca-cert="$(cat /vault/userconfig/vault-tls/vault_ca)" --address "https://vault-2.vault-internal:8200" "https://vault-0.vault-internal:8200" && vault operator raft list-peers
kubectl -n vault port-forward svc/vault 8200
vault operator init -recovery-shares=1 -recovery-threshold=1 -recovery-pgp-keys=/tmp/denis.asc
Initial Root Token: s.mg25giPe5EscxCzJkmHUrixi
ci_version: 1.11.0
vault kv list kv
./medusa import kv encrypted-vault-secrets --address="https://127.0.0.1:8200" --token="s.G8VkrnwCTJOBBqb7FadjieC8" --insecure --decrypt="true" --private-key="private-key.pem"
export VAULT_TOKEN=s.G8VkrnwCTJOBBqb7FadjieC8
uid: dbfe719a-fb47-43bc-9c46-00277bbbe425
2021-11-12T13:27:53.404Z [WARN] service_registration.kubernetes: unable to set initial state due to PATCH https://10.209.8.1:443/api/v1/namespaces/vault/pods/vault-0 giving up after 1 attempt(s): bad status code: req method: PATCH, req url: https://10.209.8.1:443/api/v1/namespaces/vault/pods/vault-0, resp statuscode: 403, will retry
k apply -f ~/Altenar/HashicorpVault/lab/busybox.yaml
euwe1c0-gke002
10.209.8.0/22
kubectl create rolebinding vault-baseline-binding \
--clusterrole=baseline-psp \
--serviceaccount=vault:vault \
--namespace=vault
cat <<EOF | kubectl apply -f -
#This role binding was created to resolve the problem with forbidden patch request from pods to the contol plane
#Details can be found in DOPS-3925
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: vault-baseline-binding
namespace: vault
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: baseline-psp
subjects:
- kind: ServiceAccount
name: vault
namespace: vault
EOF
Last updated
Was this helpful?