Skip to content

Commit

Permalink
backport of commit 6f65369
Browse files Browse the repository at this point in the history
  • Loading branch information
ram-parameswaran authored Nov 8, 2024
1 parent e6203cf commit 46162aa
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions website/content/docs/configuration/seal/seal-ha.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ values. Because there may be two seals of the same type, one must
disambiguate the environment variables used. To do this, in HA setups,
append an underscore followed by the seal's configured name (matching its
case) to any environment variable names. For example, in the sample
configuration below, the AWS acces skey could be provided as `ACCESS_KEY_aws_east`.
configuration below, the AWS access key could be provided as `ACCESS_KEY_aws_east`.
Keep in mind that the seal name must be valid in an environment variable name to use it.

Priority is mandatory if more than one seal is specified. Priority tells Vault
Expand Down Expand Up @@ -158,4 +158,4 @@ use the HA seal feature. To migrate back to a single seal:
1. Perform a [seal migration](/vault/docs/concepts/seal#seal-migration) as described.
2. Monitor [`sys/sealwrap/rewrap`](/vault/api-docs/system/sealwrap-rewrap) until the API returns `fully_wrapped=true`.
3. Remove `enable_multiseal` from all Vault configuration files in the cluster.
4. Restart Vault.
4. Restart Vault.

0 comments on commit 46162aa

Please sign in to comment.