@@ -13,6 +13,14 @@ The format of this file is [HCL](https://github.com/hashicorp/hcl) or JSON.
13
13
14
14
An example configuration is shown below:
15
15
16
+ <Note >
17
+
18
+ For multi-node clusters, replace the loopback address with a valid, routable IP address for each Vault node in your network.
19
+
20
+ Refer to the [ Vault HA clustering with integrated storage tutorial] ( /vault/tutorials/raft/raft-storage ) for a complete scenario.
21
+
22
+ </Note >
23
+
16
24
``` hcl
17
25
ui = true
18
26
cluster_addr = "https://127.0.0.1:8201"
@@ -66,15 +74,19 @@ to specify where the configuration is.
66
74
67
75
- ` user_lockout ` ` ([UserLockout][user-lockout]: nil) ` –
68
76
Configures the user-lockout behaviour for failed logins. For more information, please see the
69
- [ user lockout configuration documentation] ( /vault/docs/configuration/user-lockout ) .
77
+ [ user lockout configuration documentation] ( /vault/docs/configuration/user-lockout ) .
70
78
71
79
- ` seal ` ` ([Seal][seal]: nil) ` – Configures the seal type to use for
72
80
auto-unsealing, as well as for
73
81
[ seal wrapping] [ sealwrap ] as an additional layer of data protection.
74
82
75
- - ` cluster_name ` ` (string: <generated>) ` – Specifies the identifier for the
76
- Vault cluster. If omitted, Vault will generate a value. When connecting to
77
- Vault Enterprise, this value will be used in the interface.
83
+ - ` reporting ` ` ([Reporting][reporting]: nil) ` -
84
+ Configures options relating to license reporting in Vault.
85
+
86
+ - ` cluster_name ` ` (string: <generated>) ` – Specifies a human-readable
87
+ identifier for the Vault cluster. If omitted, Vault will generate a value.
88
+ The cluster name is included as a label in some [ telemetry metrics] ( /vault/docs/internals/telemetry/metrics/ ) .
89
+ The cluster name is safe to update on an existing Vault cluster.
78
90
79
91
- ` cache_size ` ` (string: "131072") ` – Specifies the size of the read cache used
80
92
by the physical storage subsystem. The value is in number of entries, so the
@@ -115,10 +127,14 @@ to specify where the configuration is.
115
127
sudo setcap cap_ipc_lock=+ep $( readlink -f $( which vault) )
116
128
```
117
129
118
- ~ > Note: Since each plugin runs as a separate process, you need to do the same
130
+ <Note >
131
+
132
+ Since each plugin runs as a separate process, you need to do the same
119
133
for each plugin in your [ plugins
120
134
directory] ( /vault/docs/plugins/plugin-architecture#plugin-directory ) .
121
135
136
+ </Note >
137
+
122
138
If you use a Linux distribution with a modern version of systemd, you can add
123
139
the following directive to the "[ Service] " configuration section:
124
140
@@ -169,10 +185,10 @@ to specify where the configuration is.
169
185
maximum request duration allowed before Vault cancels the request. This can
170
186
be overridden per listener via the ` max_request_duration ` value.
171
187
172
- - ` detect_deadlocks ` ` (string: "") ` - A comma separated string that specifies the internal
173
- mutex locks that should be monitored for potential deadlocks. Currently supported values
188
+ - ` detect_deadlocks ` ` (string: "") ` - A comma separated string that specifies the internal
189
+ mutex locks that should be monitored for potential deadlocks. Currently supported values
174
190
include ` statelock ` , ` quotas ` and ` expiration ` which will cause "POTENTIAL DEADLOCK:"
175
- to be logged when an attempt at a core state lock appears to be deadlocked. Enabling this
191
+ to be logged when an attempt at a core state lock appears to be deadlocked. Enabling this
176
192
can have a negative effect on performance due to the tracking of each lock attempt.
177
193
178
194
- ` raw_storage_endpoint ` ` (bool: false) ` – Enables the ` sys/raw ` endpoint which
@@ -210,12 +226,20 @@ can have a negative effect on performance due to the tracking of each lock attem
210
226
Supported values (in order of descending detail) are ` trace ` , ` debug ` , ` info ` , ` warn ` , and ` error ` .
211
227
This can also be specified via the ` VAULT_LOG_LEVEL ` environment variable.
212
228
213
- ~ > Note: On SIGHUP (` sudo kill -s HUP ` _ pid of vault_ ), if a valid value is specified, Vault will update the existing log level,
229
+ <Note >
230
+
231
+ On SIGHUP (` sudo kill -s HUP ` _ pid of vault_ ), if a valid value is specified, Vault will update the existing log level,
214
232
overriding (even if specified) both the CLI flag and environment variable.
215
233
216
- ~ > Note: Not all parts of Vault's logging can have its log level be changed dynamically this way; in particular,
234
+ </Note >
235
+
236
+ <Note >
237
+
238
+ Not all parts of Vault's logging can have its log level be changed dynamically this way; in particular,
217
239
secrets/auth plugins are currently not updated dynamically.
218
240
241
+ </Note >
242
+
219
243
- ` log_format ` - Equivalent to the [ ` -log-format ` command-line flag] ( /vault/docs/commands/server#_log_format ) .
220
244
221
245
- ` log_file ` - Equivalent to the [ ` -log-file ` command-line flag] ( /vault/docs/commands/server#_log_file ) .
@@ -236,9 +260,6 @@ can have a negative effect on performance due to the tracking of each lock attem
236
260
When ` imprecise_lease_role_tracking ` is set to true and a new role-based quota is enabled, subsequent lease counts start from 0.
237
261
` imprecise_lease_role_tracking ` affects role-based lease count quotas, but reduces latencies when not using role based quotas.
238
262
239
- - ` request_limiter ` ` ([Request Limiter][request-limiter]: <none>) ` – Allows
240
- operators to enable Vault's Request Limiter functionality.
241
-
242
263
### High availability parameters
243
264
244
265
The following parameters are used on backends that support [ high availability] [ high-availability ] .
@@ -283,6 +304,9 @@ The following parameters are only used with Vault Enterprise
283
304
provided via the environment variable ` VAULT_LICENSE_PATH ` , or the license
284
305
itself can be provided in the environment variable ` VAULT_LICENSE ` .
285
306
307
+ - ` administrative_namespace_path ` ` (string: "") ` - Specifies the absolute path
308
+ to the Vault namespace to be used as an [ Administrative namespace] ( /vault/docs/enterprise/namespaces/create-admin-namespace ) .
309
+
286
310
[ storage-backend ] : /vault/docs/configuration/storage
287
311
[ listener ] : /vault/docs/configuration/listener
288
312
[ seal ] : /vault/docs/configuration/seal
@@ -291,4 +315,3 @@ The following parameters are only used with Vault Enterprise
291
315
[ sentinel ] : /vault/docs/configuration/sentinel
292
316
[ high-availability ] : /vault/docs/concepts/ha
293
317
[ plugins ] : /vault/docs/plugins
294
- [ request-limiter ] : /vault/docs/concepts/request-limiter
0 commit comments