Backing up and restoring the vault unseal keys
At some point during the installation process, you will be asked to save your Vault unseal keys. These are important as access to the vault backend data (Consul/ETCD) can be restored with their help. To create a backup of the unseal keys, follow the instructions below.
Backing up the unseal keys
- Create a backup using the following command.
kubectl exec -it <vault_pod> -- cat /data/openiam/conf/vault/seal/unseal.keys
For example, the output may look as follows.
kubectl get pods | grep vaulttest2021-vault-0 1/1 Running 0 17hkubectl exec -it test2021-vault-0 -- cat /data/openiam/conf/vault/seal/unseal.keys{"keys":["65fa1cdffb74fd1e9d9872cd81464868d710329aca27cf8d395944048a800a33f7","1374d9698986b135356336f25688b840830b065d417bcfb2066bfe56c552fdf166","0e3fb6ffc3ea7130a4f0cd31fdea3e9aeca305c775ace708ba0b2789df839731a6","6d5a6cd3e9b50d4d6562fd4a5d749a87c75bfd46e4d87191b21f736a9783dea8ea","95dc001966103ad985816662e085dc459e807b0b91b83995b8e0cc4fffc4a4b604"],"keys_base64":["Zfoc3/t0/R6dmHLNgUZIaNcQMprKJ8+NOVlEBIqACjP3","E3TZaYmGsTU1YzbyVoi4QIMLBl1Be8+yBmv+VsVS/fFm","Dj+2/8PqcTCk8M0x/eo+muyjBcd1rOcIugsnid+DlzGm","bVps0+m1DU1lYv1KXXSah8db/Ubk2HGRsh9zapeD3qjq","ldwAGWYQOtmFgWZi4IXcRZ6AewuRuDmVuODMT//EpLYE"],"root_token":"s.zLyftXS2zpOMDFjOjnVf3Tyk"}Save these! Distribute the unseal keys individually to different trusted members of your team.
Restoring the unseal keys
If the unseal keys are lost or destroyed, they can be restored using the following steps:
- Create the Busybox pod with the below content.
vi busybox.yamlapiVersion: v1kind: Podmetadata:name: busyboxspec:containers:- name: busyboximage: busyboxcommand: ['sleep', '3600'] # Keeps the Pod runningvolumeMounts:- name: sealmountPath: /data # Mount point inside the containervolumes:- name: sealpersistentVolumeClaim:claimName: openiam-pvc-vault-seal
- Apply the changes with the following command.
kubectl apply -f busybox.yaml
- Access the Busybox pod command line.
kubectl exec -it busybox -- sh
- Restore the saved keys.
echo '<saved_unseal_keys>' > /data/unseal.keys
Example output:
echo '{"keys":["65fa1cdffb74fd1e9d9872cd81464868d710329aca27cf8d395944048a800a33f7","1374d9698986b135356336f25688b840830b065d417bcfb2066bfe56c552fdf166","0e3fb6ffc3ea7130a4f0cd31fdea3e9aeca305c775ace708ba0b2789df839731a6","6d5a6cd3e9b50d4d6562fd4a5d749a87c75bfd46e4d87191b21f736a9783dea8ea","95dc001966103ad985816662e085dc459e807b0b91b83995b8e0cc4fffc4a4b604"],"keys_base64":["Zfoc3/t0/R6dmHLNgUZIaNcQMprKJ8+NOVlEBIqACjP3","E3TZaYmGsTU1YzbyVoi4QIMLBl1Be8+yBmv+VsVS/fFm","Dj+2/8PqcTCk8M0x/eo+muyjBcd1rOcIugsnid+DlzGm","bVps0+m1DU1lYv1KXXSah8db/Ubk2HGRsh9zapeD3qjq","ldwAGWYQOtmFgWZi4IXcRZ6AewuRuDmVuODMT//EpLYE"],"root_token":"s.zLyftXS2zpOMDFjOjnVf3Tyk"}' > /data/unseal.keys
- Verify that the keys are in place.
cat /data/unseal.keys
Exit from the Busybox container.
Restart services with the command below
terraform apply