-
-
Save drawks/44dfb9437bd27f5b09d9064e1c7a95b3 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[vagrant@localhost ~]$ vault agent -exit-after-auth -config=vault-agent.hcl && consul-template -config=consul-template.hcl | |
==> Vault agent started! Log data will stream in below: | |
==> Vault agent configuration: | |
Cgo: disabled | |
Log Level: info | |
Version: Vault v1.11.3, built 2022-08-26T10:27:10Z | |
Version Sha: 17250b25303c6418c283c95b1d5a9c9f16174fe8 | |
2022-09-06T17:44:03.482Z [INFO] sink.file: creating file sink | |
2022-09-06T17:44:03.482Z [INFO] sink.file: file sink configured: path=/tmp/vault.token.wrapped mode=-rw-r----- | |
2022-09-06T17:44:03.486Z [INFO] template.server: starting template server | |
2022-09-06T17:44:03.487Z [INFO] template.server: no templates found | |
2022-09-06T17:44:03.487Z [INFO] auth.handler: starting auth handler | |
2022-09-06T17:44:03.487Z [INFO] auth.handler: authenticating | |
2022-09-06T17:44:03.487Z [INFO] sink.server: starting sink server | |
2022-09-06T17:44:03.514Z [INFO] auth.handler: authentication successful, sending wrapped token to sinks and pausing | |
2022-09-06T17:44:03.514Z [INFO] sink.file: token written: path=/tmp/vault.token.wrapped | |
2022-09-06T17:44:03.514Z [INFO] sink.server: sink server stopped | |
2022-09-06T17:44:03.515Z [INFO] sinks finished, exiting | |
2022-09-06T17:44:03.515Z [INFO] auth.handler: shutdown triggered | |
2022-09-06T17:44:03.515Z [INFO] auth.handler: auth handler stopped | |
2022-09-06T17:44:03.515Z [INFO] template.server: template server stopped | |
2022-09-06T17:44:03.521Z [INFO] consul-template v0.29.2 () | |
2022-09-06T17:44:03.521Z [INFO] (runner) creating new runner (dry: false, once: false) | |
2022-09-06T17:44:03.522Z [DEBUG] (runner) final config: {"Consul":{"Address":"","Namespace":"","Auth":{"Enabled":false,"Username":""},"Retry":{"Attempts":12,"Backoff":250000000,"MaxBackoff":60000000000,"Enabled":true},"SSL":{"CaCert":"","CaPath":"","Cert":"","Enabled":false,"Key":"","ServerName":"","Verify":true},"Token":"","TokenFile":"","Transport":{"CustomDialer":null,"DialKeepAlive":30000000000,"DialTimeout":30000000000,"DisableKeepAlives":false,"IdleConnTimeout":90000000000,"MaxIdleConns":100,"MaxIdleConnsPerHost":2,"TLSHandshakeTimeout":10000000000}},"Dedup":{"Enabled":false,"MaxStale":2000000000,"Prefix":"consul-template/dedup/","TTL":15000000000,"BlockQueryWaitTime":60000000000},"DefaultDelims":{"Left":null,"Right":null},"Exec":{"Command":[],"Enabled":false,"Env":{"Denylist":[],"Custom":[],"Pristine":false,"Allowlist":[]},"KillSignal":2,"KillTimeout":30000000000,"ReloadSignal":null,"Splay":0,"Timeout":0},"KillSignal":2,"LogLevel":"debug","FileLog":{"LogFilePath":"","LogRotateBytes":0,"LogRotateDuration":86400000000000,"LogRotateMaxFiles":0},"MaxStale":2000000000,"PidFile":"","ReloadSignal":1,"Syslog":{"Enabled":false,"Facility":"LOCAL0","Name":"consul-template"},"Templates":[{"Backup":false,"Command":[],"CommandTimeout":30000000000,"Contents":"","CreateDestDirs":true,"Destination":"/tmp/sample","ErrMissingKey":false,"ErrFatal":true,"Exec":{"Command":[],"Enabled":false,"Env":{"Denylist":[],"Custom":[],"Pristine":false,"Allowlist":[]},"KillSignal":2,"KillTimeout":30000000000,"ReloadSignal":null,"Splay":0,"Timeout":30000000000},"Perms":0,"User":null,"Uid":null,"Group":null,"Gid":null,"Source":"sample.tmpl","Wait":{"Enabled":false,"Min":0,"Max":0},"LeftDelim":"","RightDelim":"","FunctionDenylist":[],"SandboxPath":""}],"TemplateErrFatal":null,"Vault":{"Address":"https://localhost:8200","Enabled":true,"Namespace":"","RenewToken":true,"Retry":{"Attempts":12,"Backoff":250000000,"MaxBackoff":60000000000,"Enabled":true},"SSL":{"CaCert":"","CaPath":"","Cert":"","Enabled":true,"Key":"","ServerName":"","Verify":true},"Transport":{"CustomDialer":null,"DialKeepAlive":30000000000,"DialTimeout":30000000000,"DisableKeepAlives":false,"IdleConnTimeout":90000000000,"MaxIdleConns":100,"MaxIdleConnsPerHost":2,"TLSHandshakeTimeout":10000000000},"UnwrapToken":true,"DefaultLeaseDuration":300000000000,"LeaseRenewalThreshold":0.9,"K8SAuthRoleName":"","K8SServiceAccountTokenPath":"/run/secrets/kubernetes.io/serviceaccount/token","K8SServiceAccountToken":"","K8SServiceMountPath":"kubernetes"},"Nomad":{"Address":"","Enabled":false,"Namespace":"","SSL":{"CaCert":"","CaPath":"","Cert":"","Enabled":false,"Key":"","ServerName":"","Verify":true},"AuthUsername":"","AuthPassword":"","Transport":{"CustomDialer":null,"DialKeepAlive":30000000000,"DialTimeout":30000000000,"DisableKeepAlives":false,"IdleConnTimeout":90000000000,"MaxIdleConns":100,"MaxIdleConnsPerHost":2,"TLSHandshakeTimeout":10000000000},"Retry":{"Attempts":12,"Backoff":250000000,"MaxBackoff":60000000000,"Enabled":true}},"Wait":{"Enabled":false,"Min":0,"Max":0},"Once":false,"ParseOnly":false,"BlockQueryWaitTime":60000000000} | |
2022-09-06T17:44:03.522Z [XXXX] wrapping token: - hvs.CAESIM8DEODxMF121lSFeqtynHr_kOqbbxQBNJJz0Gh3cM0kGh4KHGh2cy5tMVdUUm5xdkQ0UkJEazFPS1UyS0pVQlA | |
2022-09-06T17:44:03.540Z [XXXX] wrapped token: - hvs.CAESIKaofvhWzWJDAPc05VvmqXmLas_VIU9pCUC2dYEo9YJZGh4KHGh2cy5nbzR2NmdZdGhQNjZJN2tZbmI1NEY1Zlc | |
2022-09-06T17:44:03.540Z [XXXX] set token: - hvs.CAESIKaofvhWzWJDAPc05VvmqXmLas_VIU9pCUC2dYEo9YJZGh4KHGh2cy5nbzR2NmdZdGhQNjZJN2tZbmI1NEY1Zlc | |
2022-09-06T17:44:03.540Z [INFO] (runner) creating watcher | |
2022-09-06T17:44:03.540Z [DEBUG] (watcher) adding vault.token | |
2022-09-06T17:44:03.540Z [DEBUG] (watcher) adding vault-agent.token | |
2022-09-06T17:44:03.543Z [INFO] (runner) starting | |
2022-09-06T17:44:03.543Z [DEBUG] (runner) running initial templates | |
2022-09-06T17:44:03.543Z [DEBUG] (runner) initiating run | |
2022-09-06T17:44:03.544Z [DEBUG] (runner) checking template 75cd85d01ab2b9d5a01ad2444c22f248 | |
2022-09-06T17:44:03.545Z [DEBUG] (runner) missing data for 1 dependencies | |
2022-09-06T17:44:03.545Z [DEBUG] (runner) missing dependency: vault.read(kv/foo) | |
2022-09-06T17:44:03.545Z [DEBUG] (runner) add used dependency vault.read(kv/foo) to missing since isLeader but do not have a watcher | |
2022-09-06T17:44:03.545Z [DEBUG] (runner) was not watching 1 dependencies | |
2022-09-06T17:44:03.547Z [DEBUG] (watcher) adding vault.read(kv/foo) | |
2022-09-06T17:44:03.547Z [DEBUG] (runner) diffing and updating dependencies | |
2022-09-06T17:44:03.547Z [DEBUG] (runner) watching 3 dependencies | |
2022-09-06T17:44:03.547Z [XXXX] read token - {"token":"hvs.CAESIM8DEODxMF121lSFeqtynHr_kOqbbxQBNJJz0Gh3cM0kGh4KHGh2cy5tMVdUUm5xdkQ0UkJEazFPS1UyS0pVQlA","accessor":"3PWAl4fIw2bBYV9igOcJtvCm","ttl":300,"creation_time":"2022-09-06T17:44:03.512076447Z","creation_path":"auth/approle/login","wrapped_accessor":"QLuyTSjh0lLbBhsiO8RwbIrl"} | |
2022-09-06T17:44:03.548Z [WARN] vault.read(kv/foo): failed to check if kv/foo is KVv2, assume not: Error making API request. | |
URL: GET https://localhost:8200/v1/sys/internal/ui/mounts/kv/foo | |
Code: 403. Errors: | |
* permission denied | |
2022-09-06T17:44:03.550Z [WARN] (view) vault.read(kv/foo): vault.read(kv/foo): Error making API request. | |
URL: GET https://localhost:8200/v1/kv/foo | |
Code: 403. Errors: | |
* permission denied (retry attempt 1 after "250ms") | |
2022-09-06T17:44:03.661Z [DEBUG] (runner) initiating run | |
2022-09-06T17:44:03.661Z [DEBUG] (runner) checking template 75cd85d01ab2b9d5a01ad2444c22f248 | |
2022-09-06T17:44:03.662Z [DEBUG] (runner) missing data for 1 dependencies | |
2022-09-06T17:44:03.662Z [DEBUG] (runner) missing dependency: vault.read(kv/foo) | |
2022-09-06T17:44:03.662Z [DEBUG] (runner) missing data for 1 dependencies | |
2022-09-06T17:44:03.663Z [DEBUG] (runner) diffing and updating dependencies | |
2022-09-06T17:44:03.663Z [DEBUG] (runner) vault.read(kv/foo) is still needed | |
2022-09-06T17:44:03.663Z [DEBUG] (runner) watching 3 dependencies | |
2022-09-06T17:44:03.802Z [XXXX] read token - {"token":"hvs.CAESIM8DEODxMF121lSFeqtynHr_kOqbbxQBNJJz0Gh3cM0kGh4KHGh2cy5tMVdUUm5xdkQ0UkJEazFPS1UyS0pVQlA","accessor":"3PWAl4fIw2bBYV9igOcJtvCm","ttl":300,"creation_time":"2022-09-06T17:44:03.512076447Z","creation_path":"auth/approle/login","wrapped_accessor":"QLuyTSjh0lLbBhsiO8RwbIrl"} | |
2022-09-06T17:44:03.804Z [WARN] (view) vault.read(kv/foo): vault.read(kv/foo): Error making API request. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment