* conversion stage 1 * correct image paths * add sidebar title to frontmatter * docs/concepts and docs/internals * configuration docs and multi-level nav corrections * commands docs, index file corrections, small item nav correction * secrets converted * auth * add enterprise and agent docs * add extra dividers * secret section, wip * correct sidebar nav title in front matter for apu section, start working on api items * auth and backend, a couple directory structure fixes * remove old docs * intro side nav converted * reset sidebar styles, add hashi-global-styles * basic styling for nav sidebar * folder collapse functionality * patch up border length on last list item * wip restructure for content component * taking middleman hacking to the extreme, but its working * small css fix * add new mega nav * fix a small mistake from the rebase * fix a content resolution issue with middleman * title a couple missing docs pages * update deps, remove temporary markup * community page * footer to layout, community page css adjustments * wip downloads page * deps updated, downloads page ready * fix community page * homepage progress * add components, adjust spacing * docs and api landing pages * a bunch of fixes, add docs and api landing pages * update deps, add deploy scripts * add readme note * update deploy command * overview page, index title * Update doc fields Note this still requires the link fields to be populated -- this is solely related to copy on the description fields * Update api_basic_categories.yml Updated API category descriptions. Like the document descriptions you'll still need to update the link headers to the proper target pages. * Add bottom hero, adjust CSS, responsive friendly * Add mega nav title * homepage adjustments, asset boosts * small fixes * docs page styling fixes * meganav title * some category link corrections * Update API categories page updated to reflect the second level headings for api categories * Update docs_detailed_categories.yml Updated to represent the existing docs structure * Update docs_detailed_categories.yml * docs page data fix, extra operator page remove * api data fix * fix makefile * update deps, add product subnav to docs and api landing pages * Rearrange non-hands-on guides to _docs_ Since there is no place for these on learn.hashicorp, we'll put them under _docs_. * WIP Redirects for guides to docs * content and component updates * font weight hotfix, redirects * fix guides and intro sidenavs * fix some redirects * small style tweaks * Redirects to learn and internally to docs * Remove redirect to `/vault` * Remove `.html` from destination on redirects * fix incorrect index redirect * final touchups * address feedback from michell for makefile and product downloads
20 KiB
layout | page_title | sidebar_title | sidebar_current | description |
---|---|---|---|---|
guides | Vault Disaster Recovery Replication Setup - Guides | Disaster Recovery Setup | guides-operations-dr | This guide demonstrates step-by-step instruction of setting up a disaster recovery (DR) replications. |
Vault Disaster Recovery Replication
~> Enterprise Only: Disaster Recovery Replication is a part of Vault Enterprise Pro.
It is inevitable for organizations to have a disaster recovery (DR) strategy to protect their Vault deployment against catastrophic failure of an entire cluster. Vault Enterprise supports multi-datacenter deployment where you can replicate data across datacenters for performance as well as disaster recovery.
A cluster is the basic unit of Vault Enterprise replication which follows the leader-follower model. A leader cluster is referred to as the primary cluster and is considered the system of record. Data is streamed from the primary cluster to all secondary (follower) clusters.
~> Important: In DR replication, secondary clusters do not forward service read or write requests until they are promoted and become a new primary
- they essentially act as a warm standby cluster.
The Mount Filter guide provides step-by-step instructions on setting up performance replication. This guide focuses on DR replication setup.
Reference Materials
- Performance Replication and Disaster Recovery (DR) Replication
- DR Replication API
- Replication Setup & Guidance
- Vault HA guide
Estimated Time to Complete
10 minutes
Prerequisites
This intermediate Vault operations guide assumes that you have some working knowledge of Vault.
You need two Vault Enterprise clusters: one behaves as the primary cluster, and another becomes the secondary.
Steps
This guide walk through the following operations:
- Enable DR Primary Replication
- Enable DR Secondary Replication
- Promote DR Secondary to Primary
- Demote DR Primary to Secondary
- Disable DR Primary
Step 1: Enable DR Primary Replication
CLI command
-
Enable DR replication on the primary cluster.
$ vault write -f sys/replication/dr/primary/enable WARNING! The following warnings were returned from Vault: * This cluster is being enabled as a primary for replication. Vault will be unavailable for a brief period and will resume service shortly.
-
Generate a secondary token.
$ vault write sys/replication/dr/primary/secondary-token id="secondary"
The output should look similar to:
Key Value --- ----- wrapping_token: eyJhbGciOiJFUzUxMiIsInR5cCI6IkpXVCJ9.eyJhZGRyIjoiaHR0cDovLzEzLjU3LjIwLjQxOjgyMDAiLCJleHAiOjE1MjkzMzkzMzEsImlhdCI6MTUyOTMzNzUzMSwianRpIjoiZDZmMmMzZTItMTZjNS1mNTU0LWYxMzAtNzMzZDE0OWNiNTIzIiwidHlwZSI6IndyYXBwaW5nIn0.MIGIAkIArsC3s1x7GYnEbaYwAbYUj-Wgp4B3Q3kVXL0BbaKvsECySV4Pwtm--i24OSQfI9zAlsG8ZypOWJdngRa59wlhWdQCQgG22-I-aNWPehjsqmwwEADU-u37LUrR6O0MsUCqtfWYwIM9o7PFP1wMZ4JwDGftQXUH6hIrkXZDxnnGsSCJ1Vl75w wrapping_accessor: bab0ea36-23f6-d21d-4ca6-a9c3673766a3 wrapping_token_ttl: 30m wrapping_token_creation_time: 2018-06-18 15:58:51.645117216 +0000 UTC wrapping_token_creation_path: sys/replication/dr/primary/secondary-token
-> Copy the generated
wrapping_token
which you will need to enable the DR secondary cluster.
API call using cURL
-
Enable DR replication on the primary cluster by invoking
/sys/replication/dr/primary/enable
endpoint.Example:
$ curl --header "X-Vault-Token: ..." \ --request POST \ --data '{}' \ https://cluster-A.example.com:8200/v1/sys/replication/dr/primary/enable { "request_id": "ef38af20-9c1f-138a-2d03-bbb6410fb0fc", "lease_id": "", "renewable": false, "lease_duration": 0, "data": null, "wrap_info": null, "warnings": [ "This cluster is being enabled as a primary for replication. Vault will be unavailable for a brief period and will resume service shortly." ], "auth": null }
-
Generate a secondary token by invoking
/sys/replication/dr/primary/secondary-token
endpoint.Example:
$ curl --header "X-Vault-Token: ..." \ --request POST \ --data '{ "id": "secondary"}' \ https://cluster-A.example.com:8200/v1/sys/replication/dr/primary/secondary-token | jq { "request_id": "", "lease_id": "", "renewable": false, "lease_duration": 0, "data": null, "wrap_info": { "token": "eyJhbGciOiJFUzUxMiIsInR5cCI6IkpXVCJ9.eyJhZGRyIjoiaHR0cDovLzEzLjU3LjIwLjQxOjgyMDAiLCJleHAiOjE1MjkzNDQzMjcsImlhdCI6MTUyOTM0MjUyNywianRpIjoiYmRiZTJiNzEtODgwMS05YjZjLTNjMTQtMzVkNDI3NDQ3MjEzIiwidHlwZSI6IndyYXBwaW5nIn0.MIGIAkIBmESVVq_83l9hixTN7Ot0v5XQMsQfi1zV9APooZWkLvbS2olBWSQnskykQQH6GskMOi-ypOlAabqxWmfoCLA8-TICQgHRdkbJGgAQtWmjc8Z-ZEgymMv8YZq6qQxbUtPXloyM-cf_1Y1qmdGDYWtjPqoF5m1Bt_WkAJl9MguVb04QMWSotw", "accessor": "7e56e9da-178c-119d-1d01-807a203fa0b3", "ttl": 1800, "creation_time": "2018-06-18T17:22:07.129747708Z", "creation_path": "sys/replication/dr/primary/secondary-token" }, "warnings": null, "auth": null }
-> Copy the generated
token
which you will need to enable the DR secondary cluster.
Web UI
Open a web browser and launch the Vault UI (e.g. https://cluster-A.example.com:8200/ui) and then login.
-
Select Replication and check the Disaster Recovery (DR) radio button.
-
Click Enable replication.
-
Click Copy to copy the token which you will need to enable the DR secondary cluster.
Step 2: Enable DR Secondary Replication
The following operations must be performed on the DR secondary cluster.
CLI command
-
Enable DR replication on the secondary cluster.
$ vault write sys/replication/dr/secondary/enable token="..."
Where the
token
is thewrapping_token
obtained from the primary cluster.Expected output:
WARNING! The following warnings were returned from Vault: * Vault has successfully found secondary information; it may take a while to perform setup tasks. Vault will be unavailable until these tasks and initial sync complete.
!> NOTE: This will immediately clear all data in the secondary cluster.
API call using cURL
-
Enable DR replication on the secondary cluster.
$ tee payload.json <<EOF { "token": "..." } EOF $ curl --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ https://cluster-B.example.com:8200/v1/sys/replication/dr/secondary/enable | jq { "request_id": "7a9730c1-b6fc-6557-5c0a-081e1f89ed2d", "lease_id": "", "renewable": false, "lease_duration": 0, "data": null, "wrap_info": null, "warnings": [ "Vault has successfully found secondary information; it may take a while to perform setup tasks. Vault will be unavailable until these tasks and initial sync complete." ], "auth": null }
Where the
token
inpayload.json
is the token obtained from the primary cluster.!> NOTE: This will immediately clear all data in the secondary cluster.
Web UI
-
Now, launch the Vault UI for the secondary cluster (e.g. https://cluster-B.example.com:8200/ui) and click Replication.
-
Check the Disaster Recovery (DR) radio button and select secondary under the Cluster mode. Paste the token you copied from the primary in the Secondary activation token field.
!> NOTE: This will immediately clear all data in the secondary cluster.
Step 3: Promote DR Secondary to Primary
This step walks you through the promotion of the secondary cluster to become the new primary when a catastrophic failure causes the primary cluster to be inoperable. Refer to the Important Note about Automated DR Failover section for more background information.
First, you must generate a DR operation token which you need to promote the secondary cluster. The process, outlined below using API calls, is the similar to Generating a Root Token (via CLI).
From Terminal
-
Generate an one time password (OTP) to use:
$ vault operator generate-root -dr-token -generate-otp HenFLWmt0AgrjWJp/RECzQ==
-
Start the DR operation token generation process by invoking
/sys/replication/dr/secondary/generate-operation-token/attempt
endpoint.Example:
$ tee payload.json <<EOF { "otp": "HenFLWmt0AgrjWJp/RECzQ==" } EOF $ curl --request PUT \ --data @payload.json \ https://cluster-B.example.com:8200/v1/sys/replication/dr/secondary/generate-operation-token/attempt | jq { "nonce": "455bf989-6575-1262-c0d0-a94eaf60bdd0", "started": true, "progress": 0, "required": 3, "complete": false, "encoded_token": "", "encoded_root_token": "", "pgp_fingerprint": "" }
-> Distribute the generated
nonce
to each unseal key holder. -
In order to generate a DR operation token, a quorum of unseal keys must be entered by each key holder via
/sys/replication/dr/secondary/generate-operation-token/update
endpoint.Example:
$ tee payload_key1.json <<EOF { "key": "<primary_unseal_key_1>", "nonce": "455bf989-6575-1262-c0d0-a94eaf60bdd0" } EOF $ curl --request PUT \ --data @payload_key1.json \ https://cluster-B.example.com:8200/v1/sys/replication/dr/secondary/generate-operation-token/update | jq { "nonce": "455bf989-6575-1262-c0d0-a94eaf60bdd0", "started": true, "progress": 1, "required": 3, "complete": false, "encoded_token": "", "encoded_root_token": "", "pgp_fingerprint": "" }
This operation must be executed by each unseal key holder. Once the quorum has been reached, the output contains the encoded DR operation token (
encoded_token
).Example:
$ curl --request PUT \ --data @payload_key3.json \ https://cluster-B.example.com:8200/v1/sys/replication/dr/secondary/generate-operation-token/update | jq { "nonce": "455bf989-6575-1262-c0d0-a94eaf60bdd0", "started": true, "progress": 3, "required": 3, "complete": true, "encoded_token": "dKNQqNmh3JfJcSZdGlkttQ==", "encoded_root_token": "", "pgp_fingerprint": "" }
-
Decode the generated DR operation token (
encoded_token
).Example:
$ vault operator generate-root -dr-token \ -decode="dKNQqNmh3JfJcSZdGlkttQ==" \ -otp="HenFLWmt0AgrjWJp/RECzQ==" 23e02f22-2ae6-94cc-d93f-5ee295e03e9d
-
Finally, promote the DR secondary to become the primary by invoking the
sys/replication/dr/secondary/promote
endpoint. The request payload must contains the DR operation token.Example:
$ tee payload.json <<EOF { "dr_operation_token": "23e02f22-2ae6-94cc-d93f-5ee295e03e9d" } EOF $ curl --header "X-Vault-Token: ..." \ --request POST \ --data @payload.json \ https://cluster-B.example.com:8200/v1/sys/replication/dr/secondary/promote | jq { "request_id": "3879546b-1dc7-8490-521b-80104ad761b5", "lease_id": "", "renewable": false, "lease_duration": 0, "data": null, "wrap_info": null, "warnings": [ "This cluster is being promoted to a replication primary. Vault will be unavailable for a brief period and will resume service shortly." ], "auth": null }
Web UI
-
Click on Generate OTP to generate an OTP. Then click Copy OTP.
-
Click Generate Operation Token.
-
A quorum of unseal keys must be entered to create a new operation token for the DR secondary.
-> This operation must be performed by each unseal-key holder.
-
Once the quorum has been reached, the output displays the encoded DR operation token. Click Copy CLI command.
-
Execute the CLI command from a terminal to generate a DR operation token using the OTP generated earlier. (Be sure to enter your OTP in the command.)
Example:
$ vault operator generate-root -dr-token \ -otp="vZpZZf5UI1nvB3A5/7Xq9A==" \ -decode="cuplaFGYduDEY6ZVC5IfaA==" cf703c0d-afcc-55b9-2b64-d66cf427f59c
-
Now, click Promote tab, and then enter the generated DR operation token.
-
Click Promote cluster.
When you prompted, "Are you sure you want to promote this cluster?", click Promote cluster again to complete.
Once the secondary cluster was successfully promoted, you should be able to log in using the original primary cluster's root token or via configured authentication method. If desired, generate a new root token.
Step 4: Demote DR Primary to Secondary
If the original DR primary cluster becomes operational again, you may want to utilize the cluster by making it a DR secondary cluster. This step explains how to demote the original DR primary cluster to a secondary.
~> Remember that there is only one primary cluster available to the clients in DR replication.
CLI command
Execute the following command to demote the original DR primary cluster to a secondary.
$ vault write -f sys/replication/dr/primary/demote
WARNING! The following warnings were returned from Vault:
* This cluster is being demoted to a replication secondary. Vault will be
unavailable for a brief period and will resume service shortly.
This secondary cluster will not attempt to connect to a primary (see the update-primary call), but will maintain knowledge of its cluster ID and can be reconnected to the same DR replication set without wiping local storage.
API call using cURL
Invoke the sys/replication/dr/secondary/enable
endpoint to demote the
original DR primary cluster to a secondary.
$ curl --header "X-Vault-Token: ..." \
--request POST \
https://cluster-A.example.com:8200/v1/sys/replication/dr/primary/demote | jq
{
"request_id": "8a40adac-6eb7-c798-48d0-f7cdd25fdd6f",
"lease_id": "",
"renewable": false,
"lease_duration": 0,
"data": null,
"wrap_info": null,
"warnings": [
"This cluster is being demoted to a replication secondary. Vault will be unavailable for a brief period and will resume service shortly."
],
"auth": null
}
This secondary cluster will not attempt to connect to a primary (see the update-primary call), but will maintain knowledge of its cluster ID and can be reconnected to the same DR replication set without wiping local storage.
Web UI
Select Replication and click Demote cluster.
When you prompted, "Are you sure you want to demote this cluster?", click Demote cluster again to complete.
Step 5: Disable DR Primary
Once the DR secondary cluster was promoted to be the new primary, you may want to disable the DR replication on the original primary when it becomes operational again.
~> Remember that there is only one primary cluster available to the clients in DR replication.
CLI command
Execute the following command to disable DR replication.
$ vault write -f sys/replication/dr/primary/disable
WARNING! The following warnings were returned from Vault:
* This cluster is having replication disabled. Vault will be unavailable for
a brief period and will resume service shortly.
Any secondaries will no longer be able to connect.
API call using cURL
Invoke the sys/replication/dr/primary/disable
endpoint to disable DR
replication.
$ curl --header "X-Vault-Token: ..." \
--request POST \
https://cluster-A.example.com:8200/v1/sys/replication/dr/primary/disable | jq
{
"request_id": "92a5f57a-2f7b-11be-b9dd-0f028396fba8",
"lease_id": "",
"renewable": false,
"lease_duration": 0,
"data": null,
"wrap_info": null,
"warnings": [
"This cluster is having replication disabled. Vault will be unavailable for a brief period and will resume service shortly."
],
"auth": null
}
Any secondaries will no longer be able to connect.
Web UI
Select Replication and click Disable replication.
When you prompted, "Are you sure you want to disable replication on this cluster?", click Disable again to complete.
Any secondaries will no longer be able to connect.
!> Caution: Once this is done, re-enabling the DR replication as a primary will change the cluster's ID. Its connecting secondaries will require a wipe of the underlying storage even if they have connected before. If re-enabling DR replication as a secondary, its underlying storage will be wiped when connected to a primary.
Important Note about Automated DR Failover
Vault does not support an automatic failover/promotion of a DR secondary cluster, and this is a deliberate choice due to the difficulty in accurately evaluating why a failover should or shouldn't happen. For example, imagine a DR secondary loses its connection to the primary. Is it because the primary is down, or is it because networking between the two has failed?
If the DR secondary promotes itself and clients start connecting to it, you now have two active clusters whose data sets will immediately start diverging. There's no way to understand simply from one perspective or the other which one of them is right.
Vault's API supports programmatically performing various replication operations which allows the customer to write their own logic about automating some of these operations based on experience within their own environments. You can review the available replication APIs at the following links:
Next steps
Read Production Hardening to learn more about the guidance on hardening the production deployments of Vault.