Document upper limit on Transit encryption size (#6014)

This commit is contained in:
Yoko 2019-01-08 17:57:43 -08:00 committed by GitHub
parent b002915af3
commit 0a97f95ff4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 13 additions and 2 deletions

View File

@ -385,6 +385,12 @@ will be returned.
}
```
!> Vault HTTP API imposes a maximum request size of 32MB to prevent a denial
of service attack. This can be tuned per [`listener`
block](/docs/configuration/listener/tcp.html) in the Vault server
configuration.
### Sample Request
```

View File

@ -144,6 +144,11 @@ the proper permission, it can use this secrets engine.
for storing the encrypted ciphertext. When the caller wants the plaintext,
it must provide the ciphertext back to Vault to decrypt the value.
!> Vault HTTP API imposes a maximum request size of 32MB to prevent a denial
of service attack. This can be tuned per [`listener`
block](/docs/configuration/listener/tcp.html) in the Vault server
configuration.
1. Decrypt a piece of data using the `/decrypt` endpoint with a named key:
```text