Update the seal migration docs (#9432)

* update the seal migration docs

* Update website/pages/docs/concepts/seal.mdx

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>

Co-authored-by: Alexander Bezobchuk <alexanderbez@users.noreply.github.com>
This commit is contained in:
Mike Jarmy 2020-07-15 11:55:28 -04:00 committed by GitHub
parent 064cc4afb3
commit 11b10f21b7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 36 additions and 25 deletions

View File

@ -141,37 +141,48 @@ These steps are common for seal migrations between any supported kinds and for
any storage backend. any storage backend.
1. Take a standby node down and update the [seal 1. Take a standby node down and update the [seal
configuration](/docs/configuration/seal). If the migration is from Shamir seal configuration](/docs/configuration/seal).
to KMS seal, add the desired new KMS seal block to the config. If the migration
is from KMS seal to Shamir seal, add `disabled = "true"` to the old seal block.
If the migration is from KMS seal to another KMS seal, add `disabled = "true"`
to the old seal block and add the desired new KMS seal block. Now, bring the
standby node back up and run the unseal command on each by supplying the
`-migrate` flag. Supply Shamir unseal keys if old seal was Shamir, which will be
migrated as the recovery keys for the KMS seal. Supply recovery keys if the old
seal is one of KMS seals, which will be migrated as the recovery keys of the new
KMS seal or as Shamir unseal keys if the new seal is Shamir.
2. Perform step 1 for all the standby nodes, one at a time. It is necessary to * If the migration is from Shamir seal to KMS seal, add the desired new KMS
seal block to the configuration.
* If the migration is from KMS seal to Shamir seal, add `disabled = "true"`
to the old seal block.
* If the migration is from KMS seal to another KMS seal, add `disabled =
"true"` to the old seal block and add the desired new KMS seal block.
Now, bring the standby node back up and run the unseal command on each key, by
supplying the `-migrate` flag.
* Supply Shamir unseal keys if the old seal was Shamir, which will be migrated
as the recovery keys for the KMS seal.
* Supply recovery keys if the old seal is one of KMS seals, which will be
migrated as the recovery keys of the new KMS seal, or as Shamir unseal
keys if the new seal is Shamir.
1. Perform step 1 for all the standby nodes, one at a time. It is necessary to
bring back the downed standby node before moving on to the other standby nodes, bring back the downed standby node before moving on to the other standby nodes,
specifically when integrated storage is in use for it helps to retain the specifically when Integrated Storage is in use for it helps to retain the
quorum. quorum.
3. Stop the active node. One of the standby nodes will become the active node 1. [Step down](https://www.vaultproject.io/docs/commands/operator/step-down) the
and perform the migration. When using Integrated Storage, ensure that quorum is active node. One of the standby nodes will become the new active node.
reached and a leader is elected. Monitor the server log in the active node to When using Integrated Storage, ensure that quorum is reached and a leader is
witness the completion of the seal migration process. Wait for a little while elected.
for the migration information to replicate to all the nodes in case of
Integrated Storage. In enterprise Vault, switching a KMS seal implies that the
seal wrapped storage entries get re-wrapped. Monitor the log and wait until this
process is complete (look for `seal re-wrap completed`).
4. Seal migration is now completed. Update the config of the old active node 1. The new active node will perform the migration. Monitor the server log in
(that is still down) to use the new seal blocks (completely unaware of the old the active node to witness the completion of the seal migration process.
seal type) and bring it up. It will be auto-unsealed if the new seal is one of the Wait for a little while for the migration information to replicate to all the
KMS seals or will require unseal keys if the new seal is Shamir. nodes in case of Integrated Storage. In enterprise Vault, switching a KMS seal
implies that the seal wrapped storage entries get re-wrapped. Monitor the log
and wait until this process is complete (look for `seal re-wrap completed`).
5. At this point, config files of all the nodes can be updated to only have the 1. Seal migration is now completed. Take down the old active node, update its
configuration of the old active node to use the new seal blocks (completely
unaware of the old seal type) and bring it back up. It will be auto-unsealed if
the new seal is one of the KMS seals, or will require unseal keys if the new
seal is Shamir.
1. At this point, configuration files of all the nodes can be updated to only have the
new seal information. Standby nodes can be restarted right away and the active new seal information. Standby nodes can be restarted right away and the active
node can be restarted upon a leadership change. node can be restarted upon a leadership change.