Skip to content

Instantly share code, notes, and snippets.

@ChrisLundquist
Last active November 11, 2016 21:34
Show Gist options
  • Save ChrisLundquist/8c9d9093ada98cb139b07de29fcdbbc8 to your computer and use it in GitHub Desktop.
Save ChrisLundquist/8c9d9093ada98cb139b07de29fcdbbc8 to your computer and use it in GitHub Desktop.
vault step-down sig quit
root@vault-1:~# sudo -u vault /usr/local/bin/vault server -config=/etc/vault.d
_t: _p: 15954 _n: __logxi _l: ERR _m: Could not get working directory
==> Vault server configuration:
Backend: consul (HA available)
Cluster Address: https://10.170.131.69:8201
Listener 1: tcp (addr: "0.0.0.0:8200", cluster address: "", tls: "disabled")
Log Level: info
Mlock: supported: true, enabled: false
Redirect Address: http://10.170.131.69:8200
Version: Vault v0.6.2
==> Vault server started! Log data will stream in below:
2016/11/11 19:14:32.877847 [WARN ] physical/consul: appending trailing forward slash to path
2016/11/11 19:15:23.495920 [INFO ] core: vault is unsealed
2016/11/11 19:15:23.495948 [WARN ] physical/consul: Concurrent sealed state change notify dropped
2016/11/11 19:15:23.496039 [INFO ] core: entering standby mode
2016/11/11 19:15:29.387718 [INFO ] core: acquired lock, enabling active operation
2016/11/11 19:15:29.484186 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 19:15:29.484214 [INFO ] core: post-unseal setup starting
2016/11/11 19:15:29.488202 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 19:15:29.488268 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 19:15:29.488317 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 19:15:29.488360 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 19:15:29.488408 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 19:15:29.488463 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 19:15:29.488525 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 19:15:29.488643 [INFO ] rollback: starting rollback manager
2016/11/11 19:15:29.506607 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 19:15:29.507890 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 19:15:29.507938 [INFO ] core: pre-seal teardown starting
2016/11/11 19:15:29.507955 [INFO ] core/stopClusterListener: stopping listeners
SIGQUIT: quit
PC=0x45a983 m=1
goroutine 0 [idle]:
runtime.futex(0x1df4058, 0x0, 0xc42003de80, 0x0, 0xc400000000, 0x45a6a6, 0x3c, 0x0, 0xc42003dec8, 0x40d5cb, ...)
/goroot/src/runtime/sys_linux_amd64.s:388 +0x23
runtime.futexsleep(0x1df4058, 0x0, 0xdf8475800)
/goroot/src/runtime/os_linux.go:62 +0xd7
runtime.notetsleep_internal(0x1df4058, 0xdf8475800, 0x1)
/goroot/src/runtime/lock_futex.go:174 +0xeb
runtime.notetsleep(0x1df4058, 0xdf8475800, 0x52f39369ce301)
/goroot/src/runtime/lock_futex.go:194 +0x56
runtime.sysmon()
/goroot/src/runtime/proc.go:3618 +0x14c
runtime.mstart1()
/goroot/src/runtime/proc.go:1126 +0x11e
runtime.mstart()
/goroot/src/runtime/proc.go:1096 +0x64
goroutine 1 [select, 1 minutes]:
github.com/hashicorp/vault/command.(*ServerCommand).Run(0xc4201880f0, 0xc42000a110, 0x1, 0x1, 0x0)
/gopath/src/github.com/hashicorp/vault/command/server.go:576 +0x34c9
github.com/hashicorp/vault/vendor/github.com/mitchellh/cli.(*CLI).Run(0xc4202bc0c0, 0xc4202bc0c0, 0x27, 0x15ecaa0)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/mitchellh/cli/cli.go:154 +0x24e
github.com/hashicorp/vault/cli.RunCustom(0xc42000a100, 0x2, 0x2, 0xc4202ba900, 0x0)
/gopath/src/github.com/hashicorp/vault/cli/main.go:44 +0x4e7
github.com/hashicorp/vault/cli.Run(0xc42000a100, 0x2, 0x2, 0xc4200001a0)
/gopath/src/github.com/hashicorp/vault/cli/main.go:11 +0x56
main.main()
/gopath/src/github.com/hashicorp/vault/main.go:10 +0x66
goroutine 5 [syscall, 1 minutes]:
os/signal.signal_recv(0x0)
/goroot/src/runtime/sigqueue.go:116 +0x157
os/signal.loop()
/goroot/src/os/signal/signal_unix.go:22 +0x22
created by os/signal.init.1
/goroot/src/os/signal/signal_unix.go:28 +0x41
goroutine 27 [IO wait]:
net.runtime_pollWait(0x7f427d317d80, 0x72, 0x0)
/goroot/src/runtime/netpoll.go:160 +0x59
net.(*pollDesc).wait(0xc420250290, 0x72, 0xc4201f9db0, 0xc4200141b0)
/goroot/src/net/fd_poll_runtime.go:73 +0x38
net.(*pollDesc).waitRead(0xc420250290, 0x1db2bc0, 0xc4200141b0)
/goroot/src/net/fd_poll_runtime.go:78 +0x34
net.(*netFD).accept(0xc420250230, 0x0, 0x1dafc40, 0xc4206c4b60)
/goroot/src/net/fd_unix.go:419 +0x238
net.(*TCPListener).accept(0xc4204fa140, 0x29e8d60800, 0x0, 0x0)
/goroot/src/net/tcpsock_posix.go:132 +0x2e
net.(*TCPListener).AcceptTCP(0xc4204fa140, 0xc4201f9ed8, 0xc4201f9ee0, 0xc4201f9ed0)
/goroot/src/net/tcpsock.go:209 +0x49
github.com/hashicorp/vault/command/server.tcpKeepAliveListener.Accept(0xc4204fa140, 0x15ef780, 0xc420089780, 0x1db9cc0, 0xc4200ba990)
/gopath/src/github.com/hashicorp/vault/command/server/listener_tcp.go:38 +0x2f
net/http.(*Server).Serve(0xc420186a80, 0x1db8c00, 0xc4204fa140, 0x0, 0x0)
/goroot/src/net/http/server.go:2273 +0x1ce
created by github.com/hashicorp/vault/command.(*ServerCommand).Run
/gopath/src/github.com/hashicorp/vault/command/server.go:558 +0x3104
goroutine 26 [select]:
github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer(0xc4201e2160, 0xc42024f9e0, 0xc42006e360, 0xc420151c80, 0x19, 0xc42024f9f0, 0xc42024fa00)
/gopath/src/github.com/hashicorp/vault/physical/consul.go:478 +0x7e3
created by github.com/hashicorp/vault/physical.(*ConsulBackend).RunServiceDiscovery
/gopath/src/github.com/hashicorp/vault/physical/consul.go:444 +0xd1
goroutine 34 [select, 1 minutes, locked to thread]:
runtime.gopark(0x15efde8, 0x0, 0x14e8d6a, 0x6, 0x18, 0x2)
/goroot/src/runtime/proc.go:259 +0x13a
runtime.selectgoImpl(0xc420248730, 0x0, 0x18)
/goroot/src/runtime/select.go:423 +0x11d9
runtime.selectgo(0xc420248730)
/goroot/src/runtime/select.go:238 +0x1c
runtime.ensureSigM.func1()
/goroot/src/runtime/signal1_unix.go:304 +0x2f3
runtime.goexit()
/goroot/src/runtime/asm_amd64.s:2086 +0x1
goroutine 35 [chan receive, 1 minutes]:
github.com/hashicorp/vault/command.MakeShutdownCh.func1(0xc42006e3c0, 0xc42006e360)
/gopath/src/github.com/hashicorp/vault/command/server.go:954 +0x40
created by github.com/hashicorp/vault/command.MakeShutdownCh
/gopath/src/github.com/hashicorp/vault/command/server.go:956 +0x143
goroutine 36 [chan receive, 1 minutes]:
github.com/hashicorp/vault/command.MakeSighupCh.func1(0xc42006e5a0, 0xc42006e540)
/gopath/src/github.com/hashicorp/vault/command/server.go:970 +0x40
created by github.com/hashicorp/vault/command.MakeSighupCh
/gopath/src/github.com/hashicorp/vault/command/server.go:973 +0x119
goroutine 37 [semacquire, 1 minutes]:
sync.runtime_notifyListWait(0xc4202bc1c0, 0x0)
/goroot/src/runtime/sema.go:267 +0x122
sync.(*Cond).Wait(0xc4202bc1b0)
/goroot/src/sync/cond.go:57 +0x80
io.(*pipe).read(0xc4202bc180, 0xc4201d0000, 0x1000, 0x1000, 0x0, 0x0, 0x0)
/goroot/src/io/pipe.go:47 +0x102
io.(*PipeReader).Read(0xc420166220, 0xc4201d0000, 0x1000, 0x1000, 0x1000, 0x1000, 0x101010101020302)
/goroot/src/io/pipe.go:129 +0x4c
bufio.(*Scanner).Scan(0xc420168a00, 0x0)
/goroot/src/bufio/scan.go:208 +0x50f
github.com/hashicorp/vault/meta.(*Meta).FlagSet.func1(0xc420168a00, 0xc420188120)
/gopath/src/github.com/hashicorp/vault/meta/meta.go:151 +0x2f
created by github.com/hashicorp/vault/meta.(*Meta).FlagSet
/gopath/src/github.com/hashicorp/vault/meta/meta.go:154 +0x49b
goroutine 38 [select, 1 minutes]:
github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*InmemSignal).run(0xc42024b480)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:63 +0x10b
created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.NewInmemSignal
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:37 +0x1c5
goroutine 39 [sleep]:
time.Sleep(0x3b9aca00)
/goroot/src/runtime/time.go:59 +0xe1
github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*Metrics).collectStats(0xc420013e50)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/metrics.go:67 +0x2f
created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.New
/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/start.go:61 +0xf4
goroutine 45 [select]:
github.com/hashicorp/vault/vault.(*RollbackManager).run(0xc4203f2480)
/gopath/src/github.com/hashicorp/vault/vault/rollback.go:97 +0x21c
created by github.com/hashicorp/vault/vault.(*RollbackManager).Start
/gopath/src/github.com/hashicorp/vault/vault/rollback.go:74 +0x3f
goroutine 32 [IO wait]:
net.runtime_pollWait(0x7f427d317e40, 0x72, 0x5)
/goroot/src/runtime/netpoll.go:160 +0x59
net.(*pollDesc).wait(0xc42063a990, 0x72, 0xc42064e9d0, 0xc4200141b0)
/goroot/src/net/fd_poll_runtime.go:73 +0x38
net.(*pollDesc).waitRead(0xc42063a990, 0x1db2bc0, 0xc4200141b0)
/goroot/src/net/fd_poll_runtime.go:78 +0x34
net.(*netFD).Read(0xc42063a930, 0xc420430000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc4200141b0)
/goroot/src/net/fd_unix.go:243 +0x1a1
net.(*conn).Read(0xc42002c0a8, 0xc420430000, 0x1000, 0x1000, 0x0, 0x0, 0x0)
/goroot/src/net/net.go:173 +0x70
net/http.(*persistConn).Read(0xc42016a300, 0xc420430000, 0x1000, 0x1000, 0xb486c0, 0xc42064eb58, 0x40363d)
/goroot/src/net/http/transport.go:1261 +0x154
bufio.(*Reader).fill(0xc42017ab40)
/goroot/src/bufio/bufio.go:97 +0x10c
bufio.(*Reader).Peek(0xc42017ab40, 0x1, 0xc42064ebbd, 0x1, 0x0, 0xc42069f3e0, 0x0)
/goroot/src/bufio/bufio.go:129 +0x62
net/http.(*persistConn).readLoop(0xc42016a300)
/goroot/src/net/http/transport.go:1418 +0x1a1
created by net/http.(*Transport).dialConn
/goroot/src/net/http/transport.go:1062 +0x4e9
goroutine 15 [semacquire]:
sync.runtime_Semacquire(0xc42007278c)
/goroot/src/runtime/sema.go:47 +0x30
sync.(*RWMutex).RLock(0xc420072780)
/goroot/src/sync/rwmutex.go:43 +0x5d
github.com/hashicorp/vault/vault.(*Core).periodicCheckKeyUpgrade(0xc420072700, 0xc4201a8ae0, 0xc4201a8b40)
/gopath/src/github.com/hashicorp/vault/vault/core.go:1339 +0x10c
created by github.com/hashicorp/vault/vault.(*Core).runStandby
/gopath/src/github.com/hashicorp/vault/vault/core.go:1217 +0x15f
goroutine 78 [semacquire]:
sync.runtime_Semacquire(0xc42007278c)
/goroot/src/runtime/sema.go:47 +0x30
sync.(*RWMutex).RLock(0xc420072780)
/goroot/src/sync/rwmutex.go:43 +0x5d
github.com/hashicorp/vault/vault.(*Core).Leader(0xc420072700, 0xc4201e0e00, 0x0, 0x0, 0x0, 0x0)
/gopath/src/github.com/hashicorp/vault/vault/core.go:614 +0x9e
github.com/hashicorp/vault/command.(*ServerCommand).Run.func4(0xe)
/gopath/src/github.com/hashicorp/vault/command/server.go:494 +0x2a
github.com/hashicorp/vault/physical.(*ConsulBackend).reconcileConsul(0xc4201e2160, 0xc4204be680, 0x18, 0xc42024f9f0, 0xc42024fa00, 0x0, 0x20002, 0xc4201e0fa4, 0xc4201e0fa0)
/gopath/src/github.com/hashicorp/vault/physical/consul.go:568 +0x3f
github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func1(0xc42024fb20, 0xc42024fab4, 0xc4201e2160, 0xc42024fb10, 0xc42024f9f0, 0xc42024fa00)
/gopath/src/github.com/hashicorp/vault/physical/consul.go:496 +0xc7
created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer
/gopath/src/github.com/hashicorp/vault/physical/consul.go:511 +0x637
goroutine 59 [chan send]:
github.com/hashicorp/vault/vault.(*Core).stopClusterListener(0xc420072700)
/gopath/src/github.com/hashicorp/vault/vault/cluster.go:323 +0xf4
github.com/hashicorp/vault/vault.(*Core).preSeal(0xc420072700, 0x0, 0x0)
/gopath/src/github.com/hashicorp/vault/vault/core.go:1178 +0x6c9
github.com/hashicorp/vault/vault.(*Core).postUnseal.func1(0xc420749d00, 0xc420072700)
/gopath/src/github.com/hashicorp/vault/vault/core.go:1100 +0x42
github.com/hashicorp/vault/vault.(*Core).postUnseal(0xc420072700, 0x1dac7c0, 0xc420165120)
/gopath/src/github.com/hashicorp/vault/vault/core.go:1147 +0x4e5
github.com/hashicorp/vault/vault.(*Core).runStandby(0xc420072700, 0xc42017b680, 0xc42017b6e0, 0xc42017b740)
/gopath/src/github.com/hashicorp/vault/vault/core.go:1277 +0x7d5
created by github.com/hashicorp/vault/vault.(*Core).Unseal
/gopath/src/github.com/hashicorp/vault/vault/core.go:822 +0x58f
goroutine 61 [semacquire]:
sync.runtime_Semacquire(0xc42007278c)
/goroot/src/runtime/sema.go:47 +0x30
sync.(*RWMutex).RLock(0xc420072780)
/goroot/src/sync/rwmutex.go:43 +0x5d
github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420072700, 0xae6400, 0x0, 0x0)
/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
github.com/hashicorp/vault/command.(*ServerCommand).Run.func5(0x20)
/gopath/src/github.com/hashicorp/vault/command/server.go:501 +0x2a
github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func2(0xc42024fab8, 0xc42024fab4, 0xc42024fa00, 0xc4201e2160)
/gopath/src/github.com/hashicorp/vault/physical/consul.go:522 +0x7f
created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer
/gopath/src/github.com/hashicorp/vault/physical/consul.go:532 +0x73b
goroutine 60 [select]:
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Session).RenewPeriodic(0xc420174338, 0x14e538d, 0x3, 0xc4202eede0, 0x24, 0x0, 0xc42017baa0, 0x10, 0x410165)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/session.go:161 +0x31f
created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:151 +0xa18
goroutine 28 [select, 1 minutes]:
net/http.(*persistConn).roundTrip(0xc42016a900, 0xc420326240, 0x0, 0x0, 0x0)
/goroot/src/net/http/transport.go:1840 +0x93b
net/http.(*Transport).RoundTrip(0xc4201884b0, 0xc4203f4000, 0xc4201884b0, 0x0, 0x0)
/goroot/src/net/http/transport.go:380 +0x4ee
net/http.send(0xc4203f4000, 0x1daf4c0, 0xc4201884b0, 0x0, 0x0, 0x0, 0x8, 0xc4204efb00, 0xc420166460)
/goroot/src/net/http/client.go:256 +0x15f
net/http.(*Client).send(0xc4202bb620, 0xc4203f4000, 0x0, 0x0, 0x0, 0xc420166460, 0x0, 0x1)
/goroot/src/net/http/client.go:146 +0x102
net/http.(*Client).doFollowingRedirects(0xc4202bb620, 0xc4203f4000, 0x15ef928, 0x3, 0x58261801, 0x172ace3b)
/goroot/src/net/http/client.go:528 +0x5e5
net/http.(*Client).Do(0xc4202bb620, 0xc4203f4000, 0x1df3c20, 0x0, 0x1)
/goroot/src/net/http/client.go:184 +0x1ea
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Client).doRequest(0xc42006ef60, 0xc42015f0e0, 0xc4204efdf0, 0xc420326180, 0x16, 0xc42015f0e0)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/api.go:475 +0x8e
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).getInternal(0xc4204eff20, 0xc4201ff3f0, 0xf, 0x0, 0xc4204eff28, 0xc42011e240, 0xc420322060, 0x0, 0x0)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:163 +0x233
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).Get(0xc4204eff20, 0xc4201ff3f0, 0xf, 0xc4204eff28, 0x0, 0x0, 0x0, 0x0)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:97 +0x8c
github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).monitorLock(0xc4202312c0, 0xc4202eede0, 0x24, 0xc4202366c0)
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:362 +0xd8
created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock
/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:239 +0x5ae
goroutine 71 [IO wait, 1 minutes]:
net.runtime_pollWait(0x7f427d317c00, 0x72, 0x7)
/goroot/src/runtime/netpoll.go:160 +0x59
net.(*pollDesc).wait(0xc42025ee60, 0x72, 0xc4202fc9d0, 0xc4200141b0)
/goroot/src/net/fd_poll_runtime.go:73 +0x38
net.(*pollDesc).waitRead(0xc42025ee60, 0x1db2bc0, 0xc4200141b0)
/goroot/src/net/fd_poll_runtime.go:78 +0x34
net.(*netFD).Read(0xc42025ee00, 0xc4202f6000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc4200141b0)
/goroot/src/net/fd_unix.go:243 +0x1a1
net.(*conn).Read(0xc420174370, 0xc4202f6000, 0x1000, 0x1000, 0x0, 0x0, 0x0)
/goroot/src/net/net.go:173 +0x70
net/http.(*persistConn).Read(0xc42016a900, 0xc4202f6000, 0x1000, 0x1000, 0xb486c0, 0xc4202fcb58, 0x40363d)
/goroot/src/net/http/transport.go:1261 +0x154
bufio.(*Reader).fill(0xc420236540)
/goroot/src/bufio/bufio.go:97 +0x10c
bufio.(*Reader).Peek(0xc420236540, 0x1, 0xc4202fcbbd, 0x1, 0x0, 0xc4201a9620, 0x0)
/goroot/src/bufio/bufio.go:129 +0x62
net/http.(*persistConn).readLoop(0xc42016a900)
/goroot/src/net/http/transport.go:1418 +0x1a1
created by net/http.(*Transport).dialConn
/goroot/src/net/http/transport.go:1062 +0x4e9
goroutine 72 [select, 1 minutes]:
net/http.(*persistConn).writeLoop(0xc42016a900)
/goroot/src/net/http/transport.go:1646 +0x3bd
created by net/http.(*Transport).dialConn
/goroot/src/net/http/transport.go:1063 +0x50e
goroutine 81 [select]:
net/http.(*persistConn).writeLoop(0xc42016a300)
/goroot/src/net/http/transport.go:1646 +0x3bd
created by net/http.(*Transport).dialConn
/goroot/src/net/http/transport.go:1063 +0x50e
goroutine 79 [semacquire]:
sync.runtime_Semacquire(0xc42007278c)
/goroot/src/runtime/sema.go:47 +0x30
sync.(*RWMutex).RLock(0xc420072780)
/goroot/src/sync/rwmutex.go:43 +0x5d
github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420072700, 0x0, 0x0, 0x0)
/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420072700, 0x1db8a40, 0xc42067ea90, 0xc420660870)
/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42067ea90, 0xc420660870)
/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
net/http.HandlerFunc.ServeHTTP(0xc42024fa30, 0x1db8a40, 0xc42067ea90, 0xc420660870)
/goroot/src/net/http/server.go:1726 +0x44
net/http.(*ServeMux).ServeHTTP(0xc4200ba8a0, 0x1db8a40, 0xc42067ea90, 0xc420660870)
/goroot/src/net/http/server.go:2022 +0x7f
github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42067ea90, 0xc420660870)
/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
net/http.HandlerFunc.ServeHTTP(0xc42011c2c0, 0x1db8a40, 0xc42067ea90, 0xc420660870)
/goroot/src/net/http/server.go:1726 +0x44
net/http.serverHandler.ServeHTTP(0xc420186a80, 0x1db8a40, 0xc42067ea90, 0xc420660870)
/goroot/src/net/http/server.go:2202 +0x7d
net/http.(*conn).serve(0xc420089780, 0x1db9c00, 0xc42022ee40)
/goroot/src/net/http/server.go:1579 +0x4b7
created by net/http.(*Server).Serve
/goroot/src/net/http/server.go:2293 +0x44d
rax 0xfffffffffffffffc
rbx 0x0
rcx 0x45a983
rdx 0x0
rdi 0x1df4058
rsi 0x0
rbp 0xc42003de90
rsp 0xc42003de48
r8 0x0
r9 0x0
r10 0xc42003de80
r11 0x246
r12 0x42da00
r13 0xf3
r14 0x30
r15 0x3
rip 0x45a983
rflags 0x246
cs 0x33
fs 0x0
gs 0x0
root@vault-1:~/go/src/github.com/hashicorp/vault# sudo -u vault /usr/local/bin/vault server -config=/etc/vault.d
==> Vault server configuration:
Backend: consul (HA available)
Cluster Address: https://10.170.131.69:8201
Listener 1: tcp (addr: "0.0.0.0:8200", cluster address: "", tls: "disabled")
Log Level: info
Mlock: supported: true, enabled: false
Redirect Address: http://10.170.131.69:8200
Version: Vault v0.6.2
==> Vault server started! Log data will stream in below:
2016/11/11 21:31:38.216102 [WARN ] physical/consul: appending trailing forward slash to path
2016/11/11 21:31:44.725644 [INFO ] core: vault is unsealed
2016/11/11 21:31:44.725690 [WARN ] physical/consul: Concurrent sealed state change notify dropped
2016/11/11 21:31:44.725791 [INFO ] core: entering standby mode
2016/11/11 21:32:03.849120 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:03.971987 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:03.972022 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:03.980978 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:03.981028 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:03.981098 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:03.981160 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:03.981283 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:03.981430 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:03.981536 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:03.981678 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:04.003086 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:04.004799 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:04.004842 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:04.004860 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:04.004909 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:04.004959 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:04.005011 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:04.331195 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:04.447182 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:04.447227 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:04.452113 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:04.452155 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:04.452217 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:04.452264 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:04.452346 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:04.452404 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:04.452455 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:04.452608 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:04.472462 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:04.474315 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:04.474346 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:04.474356 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:04.474378 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:04.474409 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:04.474440 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:04.750671 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:04.859331 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:04.859367 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:04.864044 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:04.864089 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:04.864125 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:04.864175 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:04.864232 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:04.864270 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:04.864321 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:04.864412 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:04.886311 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:04.888215 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:04.888266 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:04.888289 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:04.888350 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:04.888401 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:04.888446 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:05.157961 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:05.280781 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:05.280820 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:05.285645 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:05.285699 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:05.285761 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:05.285801 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:05.285867 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:05.285906 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:05.285979 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:05.286089 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:05.306861 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:05.308842 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:05.308886 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:05.308899 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:05.308921 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:05.308953 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:05.308971 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:05.580404 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:05.701274 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:05.701299 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:05.706445 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:05.706479 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:05.706513 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:05.706539 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:05.706572 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:05.706620 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:05.706678 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:05.706781 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:05.728614 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:05.730727 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:05.730769 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:05.730799 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:05.730837 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:05.730867 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:05.730890 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:05.975635 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:06.084132 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:06.084158 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:06.090157 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:06.090203 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:06.090249 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:06.090286 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:06.090342 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:06.090391 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:06.090436 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:06.090555 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:06.111169 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:06.113060 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:06.113088 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:06.113102 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:06.113125 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:06.113166 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:06.113199 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:06.393183 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:06.498188 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:06.498222 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:06.503276 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:06.503320 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:06.503365 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:06.503400 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:06.503474 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:06.503537 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:06.503604 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:06.503718 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:06.522924 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:06.524764 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:06.524807 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:06.524829 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:06.524865 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:06.524914 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:06.524943 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:06.792855 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:06.901628 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:06.901659 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:06.907236 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:06.907286 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:06.907332 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:06.907370 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:06.907418 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:06.907469 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:06.907551 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:06.907682 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:06.930282 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:06.932169 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:06.932209 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:06.932229 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:06.932256 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:06.932293 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:06.932316 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:07.226526 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:07.346688 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:07.346719 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:07.350856 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:07.350902 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:07.350946 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:07.350984 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:07.351021 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:07.351058 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:07.351102 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:07.351159 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:07.369244 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:07.371028 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:07.371069 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:07.371082 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:07.371112 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:07.371150 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:07.371172 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:07.627816 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:07.765988 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:07.766010 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:07.772715 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:07.772832 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:07.773025 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:07.773134 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:07.773274 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:07.773402 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:07.773495 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:07.773586 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:07.796576 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:07.798670 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:07.798708 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:07.798725 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:07.798755 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:07.798784 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:07.798808 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:08.066911 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:08.178004 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:08.178042 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:08.183682 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:08.183719 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:08.183755 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:08.183792 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:08.183838 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:08.183881 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:08.183949 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:08.184066 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:08.202323 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:08.204381 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:08.204408 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:08.204417 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:08.204438 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:08.204468 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:08.204486 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:08.472658 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:08.585298 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:08.585326 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:08.590293 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:08.590397 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:08.590482 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:08.590540 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:08.590625 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:08.590749 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:08.590872 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:08.591027 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:08.613419 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:08.615807 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:08.615830 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:08.615838 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:08.615853 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:08.615872 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:08.615888 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:08.838031 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:08.938503 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:08.938554 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:08.943786 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:08.943830 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:08.943875 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:08.943908 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:08.943970 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:08.944045 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:08.944105 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:08.944232 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:08.963955 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:08.966013 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:08.966049 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:08.966063 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:08.966092 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:08.966128 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:08.966148 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:09.261155 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:09.386290 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:09.386337 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:09.392069 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:09.392119 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:09.392172 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:09.392222 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:09.392305 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:09.392383 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:09.392447 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:09.392581 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:09.413503 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:09.415404 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:09.415437 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:09.415450 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:09.415476 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:09.415512 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:09.415536 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:09.684939 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:09.800808 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:09.800845 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:09.808958 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:09.808998 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:09.809032 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:09.809060 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:09.809098 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:09.809135 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:09.809166 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:09.809273 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:09.828184 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:09.830087 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:09.830132 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:09.830151 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:09.830179 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:09.830215 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:09.830243 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:10.110530 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:10.239271 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:10.239302 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:10.244559 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:10.244601 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:10.244645 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:10.244677 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:10.244719 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:10.244756 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:10.244801 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:10.244929 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:10.261159 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:10.262644 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:10.262667 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:10.262674 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:10.262691 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:10.262723 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:10.262744 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:10.534976 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:10.655900 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:10.655941 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:10.660563 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:10.660606 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:10.660646 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:10.660695 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:10.660763 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:10.660826 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:10.660891 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:10.661014 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:10.681732 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:10.683842 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:10.683877 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:10.683892 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:10.683919 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:10.683965 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:10.683989 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:10.962020 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:11.067962 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:11.068001 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:11.073683 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:11.073730 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:11.073777 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:11.073813 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:11.073868 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:11.073940 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:11.074001 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:11.074115 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:11.099147 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:11.101221 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:11.101268 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:11.101292 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:11.101318 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:11.101359 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:11.101392 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:11.367472 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:11.487590 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:11.487620 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:11.492234 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:11.492281 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:11.492354 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:11.492418 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:11.492474 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:11.492513 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:11.492565 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:11.492676 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:11.510792 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:11.512401 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:11.512434 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:11.512459 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:11.512508 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:11.512560 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:11.512578 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:11.787332 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:11.886308 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:11.886338 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:11.890085 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:11.890123 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:11.890164 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:11.890202 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:11.890249 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:11.890290 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:11.890329 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:11.890389 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:11.904492 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:11.905882 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:11.905909 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:11.905949 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:11.905976 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:11.906004 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:11.906026 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:12.191713 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:12.297408 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:12.297457 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:12.303110 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:12.303159 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:12.303232 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:12.303272 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:12.303325 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:12.303368 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:12.303414 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:12.303514 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:12.325830 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:12.327537 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:12.327565 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:12.327576 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:12.327598 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:12.327627 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:12.327645 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:12.663149 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:12.787833 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:12.787858 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:12.794276 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:12.794314 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:12.794351 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:12.794395 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:12.794453 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:12.794541 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:12.794623 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:12.794762 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:12.815183 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:12.816960 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:12.816995 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:12.817009 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:12.817034 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:12.817063 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:12.817087 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:13.102452 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:13.212733 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:13.212763 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:13.218601 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:13.218659 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:13.218727 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:13.218790 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:13.218862 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:13.218922 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:13.218993 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:13.219129 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:13.243331 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:13.245414 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:13.245451 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:13.245465 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:13.245492 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:13.245521 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:13.245543 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
2016/11/11 21:32:13.484876 [INFO ] core: acquired lock, enabling active operation
2016/11/11 21:32:13.612940 [WARN ] physical/consul: Concurrent state change notify dropped
2016/11/11 21:32:13.612985 [INFO ] core: post-unseal setup starting
2016/11/11 21:32:13.618747 [INFO ] core: successfully mounted backend: type=system path=sys/
2016/11/11 21:32:13.618795 [INFO ] core: successfully mounted backend: type=cubbyhole path=cubbyhole/
2016/11/11 21:32:13.618841 [INFO ] core: successfully mounted backend: type=consul path=consul/
2016/11/11 21:32:13.618882 [INFO ] core: successfully mounted backend: type=generic path=secret/
2016/11/11 21:32:13.618934 [INFO ] core: successfully mounted backend: type=mysql path=mysql/
2016/11/11 21:32:13.618991 [INFO ] core: successfully mounted backend: type=mysql path=db/crash-worker/
2016/11/11 21:32:13.619044 [INFO ] core: successfully mounted backend: type=mysql path=db/collab-service/
2016/11/11 21:32:13.619155 [INFO ] rollback: starting rollback manager
2016/11/11 21:32:13.640089 [INFO ] expire: leases restored: restored_lease_count=4
2016/11/11 21:32:13.642003 [ERROR] core: failed to create audit entry: path=file/ error=sanity check failed; unable to open /var/log/vault/audit.log for writing: mkdir /var/log/vault: permission denied
2016/11/11 21:32:13.642038 [INFO ] core: pre-seal teardown starting
2016/11/11 21:32:13.642054 [INFO ] core/stopClusterListener: listeners not running
2016/11/11 21:32:13.642079 [INFO ] rollback: stopping rollback manager
2016/11/11 21:32:13.642108 [INFO ] core: pre-seal teardown complete
2016/11/11 21:32:13.642126 [ERROR] core: post-unseal setup failed: error=failed to setup audit table
Nov 11 03:34:01 vault-2 vault[8535]: SIGQUIT: quit
Nov 11 03:34:01 vault-2 vault[8535]: PC=0x45a983 m=1
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 0 [idle]:
Nov 11 03:34:01 vault-2 vault[8535]: runtime.futex(0x1df4058, 0x0, 0xc42002de80, 0x0, 0xc400000000, 0x45a6a6, 0x3c, 0x0, 0xc42002dec8, 0x40d5cb, ...)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sys_linux_amd64.s:388 +0x23
Nov 11 03:34:01 vault-2 vault[8535]: runtime.futexsleep(0x1df4058, 0x0, 0xdf8475800)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/os_linux.go:62 +0xd7
Nov 11 03:34:01 vault-2 vault[8535]: runtime.notetsleep_internal(0x1df4058, 0xdf8475800, 0x1)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/lock_futex.go:174 +0xeb
Nov 11 03:34:01 vault-2 vault[8535]: runtime.notetsleep(0x1df4058, 0xdf8475800, 0x4fbe120db7301)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/lock_futex.go:194 +0x56
Nov 11 03:34:01 vault-2 vault[8535]: runtime.sysmon()
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:3618 +0x14c
Nov 11 03:34:01 vault-2 vault[8535]: runtime.mstart1()
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:1126 +0x11e
Nov 11 03:34:01 vault-2 vault[8535]: runtime.mstart()
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:1096 +0x64
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 1 [select, 72 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.(*ServerCommand).Run(0xc4201100f0, 0xc42000a140, 0x1, 0x1, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:576 +0x34c9
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/mitchellh/cli.(*CLI).Run(0xc4202480c0, 0xc4202480c0, 0x27, 0x15ecaa0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/mitchellh/cli/cli.go:154 +0x24e
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/cli.RunCustom(0xc42000a130, 0x2, 0x2, 0xc4201b9380, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/cli/main.go:44 +0x4e7
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/cli.Run(0xc42000a130, 0x2, 0x2, 0xc4200001a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/cli/main.go:11 +0x56
Nov 11 03:34:01 vault-2 vault[8535]: main.main()
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/main.go:10 +0x66
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 17 [syscall, 72 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: os/signal.signal_recv(0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sigqueue.go:116 +0x157
Nov 11 03:34:01 vault-2 vault[8535]: os/signal.loop()
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/os/signal/signal_unix.go:22 +0x22
Nov 11 03:34:01 vault-2 vault[8535]: created by os/signal.init.1
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/os/signal/signal_unix.go:28 +0x41
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 9 [chan receive, 72 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.MakeShutdownCh.func1(0xc420074420, 0xc4200743c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:954 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/command.MakeShutdownCh
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:956 +0x143
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 8 [select, 72 minutes, locked to thread]:
Nov 11 03:34:01 vault-2 vault[8535]: runtime.gopark(0x15efde8, 0x0, 0x14e8d6a, 0x6, 0x18, 0x2)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/proc.go:259 +0x13a
Nov 11 03:34:01 vault-2 vault[8535]: runtime.selectgoImpl(0xc4201ff730, 0x0, 0x18)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/select.go:423 +0x11d9
Nov 11 03:34:01 vault-2 vault[8535]: runtime.selectgo(0xc4201ff730)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/select.go:238 +0x1c
Nov 11 03:34:01 vault-2 vault[8535]: runtime.ensureSigM.func1()
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/signal1_unix.go:304 +0x2f3
Nov 11 03:34:01 vault-2 vault[8535]: runtime.goexit()
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/asm_amd64.s:2086 +0x1
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 10 [chan receive, 72 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.MakeSighupCh.func1(0xc420074600, 0xc4200745a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:970 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/command.MakeSighupCh
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:973 +0x119
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 11 [semacquire, 72 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_notifyListWait(0xc4202481c0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:267 +0x122
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*Cond).Wait(0xc4202481b0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/cond.go:57 +0x80
Nov 11 03:34:01 vault-2 vault[8535]: io.(*pipe).read(0xc420248180, 0xc4200aa000, 0x1000, 0x1000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/io/pipe.go:47 +0x102
Nov 11 03:34:01 vault-2 vault[8535]: io.(*PipeReader).Read(0xc4200a8250, 0xc4200aa000, 0x1000, 0x1000, 0x1000, 0x1000, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/io/pipe.go:129 +0x4c
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Scanner).Scan(0xc4200b8a00, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/scan.go:208 +0x50f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/meta.(*Meta).FlagSet.func1(0xc4200b8a00, 0xc420110120)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/meta/meta.go:151 +0x2f
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/meta.(*Meta).FlagSet
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/meta/meta.go:154 +0x49b
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 12 [select, 72 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*InmemSignal).run(0xc4203a56c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:63 +0x10b
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.NewInmemSignal
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/inmem_signal.go:37 +0x1c5
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 13 [sleep]:
Nov 11 03:34:01 vault-2 vault[8535]: time.Sleep(0x3b9aca00)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/time.go:59 +0xe1
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.(*Metrics).collectStats(0xc4200ac230)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/metrics.go:67 +0x2f
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/armon/go-metrics.New
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/armon/go-metrics/start.go:61 +0xf4
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 61 [semacquire, 71 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206aea90, 0xc420676d20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206aea90, 0xc420676d20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206aea90, 0xc420676d20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206aea90, 0xc420676d20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206aea90, 0xc420676d20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206aea90, 0xc420676d20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206aea90, 0xc420676d20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc420069b80, 0x1db9c00, 0xc4204f9f00)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 76 [select, 5 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).roundTrip(0xc420170700, 0xc420525ea0, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1840 +0x93b
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Transport).RoundTrip(0xc4201104b0, 0xc42066f0e0, 0xc4201104b0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:380 +0x4ee
Nov 11 03:34:01 vault-2 vault[8535]: net/http.send(0xc42066f0e0, 0x1daf4c0, 0xc4201104b0, 0x0, 0x0, 0x0, 0x8, 0xc420395b00, 0xc42001c388)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:256 +0x15f
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Client).send(0xc4201bc0c0, 0xc42066f0e0, 0x0, 0x0, 0x0, 0xc42001c388, 0x0, 0x1)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:146 +0x102
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Client).doFollowingRedirects(0xc4201bc0c0, 0xc42066f0e0, 0x15ef928, 0x3, 0x58253b01, 0x22669fe9)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:528 +0x5e5
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Client).Do(0xc4201bc0c0, 0xc42066f0e0, 0x1df3c20, 0x0, 0x1)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/client.go:184 +0x1ea
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Client).doRequest(0xc420075020, 0xc4204fceb0, 0xc420395df0, 0xc420525de0, 0x16, 0xc4204fceb0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/api.go:475 +0x8e
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).getInternal(0xc420395f20, 0xc4204fac20, 0xf, 0x0, 0xc420395f28, 0xc4201c0870, 0xc420126bd0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:163 +0x233
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*KV).Get(0xc420395f20, 0xc4204fac20, 0xf, 0xc420395f28, 0x0, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/kv.go:97 +0x8c
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).monitorLock(0xc4203c8400, 0xc4203c0f00, 0x24, 0xc4203c3f80)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:362 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:239 +0x5ae
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 22 [select]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer(0xc4200b6580, 0xc4201e65d0, 0xc4200743c0, 0xc4201f1840, 0x19, 0xc4201e65e0, 0xc4201e65f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:478 +0x7e3
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/physical.(*ConsulBackend).RunServiceDiscovery
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:444 +0xd1
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 23 [IO wait, 3 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: net.runtime_pollWait(0x7f8f32dd4d80, 0x72, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/netpoll.go:160 +0x59
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).wait(0xc4201ea290, 0x72, 0xc420499db0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:73 +0x38
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).waitRead(0xc4201ea290, 0x1db2bc0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:78 +0x34
Nov 11 03:34:01 vault-2 vault[8535]: net.(*netFD).accept(0xc4201ea230, 0x0, 0x1dafc40, 0xc4204f2180)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_unix.go:419 +0x238
Nov 11 03:34:01 vault-2 vault[8535]: net.(*TCPListener).accept(0xc42001c2c0, 0x29e8d60800, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/tcpsock_posix.go:132 +0x2e
Nov 11 03:34:01 vault-2 vault[8535]: net.(*TCPListener).AcceptTCP(0xc42001c2c0, 0xc420499ed8, 0xc420499ee0, 0xc420499ed0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/tcpsock.go:209 +0x49
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command/server.tcpKeepAliveListener.Accept(0xc42001c2c0, 0x15ef780, 0xc4203c5080, 0x1db9cc0, 0xc4200c6030)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server/listener_tcp.go:38 +0x2f
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*Server).Serve(0xc420069280, 0x1db8c00, 0xc42001c2c0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2273 +0x1ce
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/command.(*ServerCommand).Run
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:558 +0x3104
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 67 [select]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Session).RenewPeriodic(0xc42001c550, 0x14e538d, 0x3, 0xc4203c0f00, 0x24, 0x0, 0xc4203c2f60, 0x10, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/session.go:161 +0x31f
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api.(*Lock).Lock
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vendor/github.com/hashicorp/consul/api/lock.go:151 +0xa18
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 46 [semacquire, 71 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).periodicCheckKeyUpgrade(0xc420052000, 0xc4203c27e0, 0xc4203c2840)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1339 +0x10c
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vault.(*Core).runStandby
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1217 +0x15f
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 52 [chan send, 71 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).stopClusterListener(0xc420052000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/cluster.go:323 +0xf4
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).preSeal(0xc420052000, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1178 +0x6c9
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).postUnseal.func1(0xc420393d10, 0xc420052000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1100 +0x42
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).postUnseal(0xc420052000, 0x1dac7c0, 0xc4202f72f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1147 +0x4e5
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).runStandby(0xc420052000, 0xc4203ce240, 0xc4203ce2a0, 0xc4203ce300)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:1277 +0x7d5
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vault.(*Core).Unseal
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:822 +0x58f
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 60 [semacquire, 71 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0xae6400, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.(*ServerCommand).Run.func5(0x20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:501 +0x2a
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func2(0xc4200935d0, 0xc420093528, 0xc4201e65f0, 0xc4200b6580)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:522 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:532 +0x73b
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 81 [select]:
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*RollbackManager).run(0xc4200b8c80)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/rollback.go:97 +0x21c
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/vault.(*RollbackManager).Start
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/rollback.go:74 +0x3f
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 62 [semacquire, 71 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Leader(0xc420052000, 0xc4203df900, 0x0, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:614 +0x9e
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/command.(*ServerCommand).Run.func4(0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/command/server.go:494 +0x2a
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).reconcileConsul(0xc4200b6580, 0xc4203ca000, 0x18, 0xc4201e65e0, 0xc4201e65f0, 0x0, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:568 +0x3f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer.func1(0xc4200935d8, 0xc420093528, 0xc4200b6580, 0xc4200935e0, 0xc4201e65e0, 0xc4201e65f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:496 +0xc7
Nov 11 03:34:01 vault-2 vault[8535]: created by github.com/hashicorp/vault/physical.(*ConsulBackend).runEventDemuxer
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/physical/consul.go:511 +0x637
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 82 [semacquire, 71 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206aec30, 0xc420677770)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206aec30, 0xc420677770)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206aec30, 0xc420677770)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206aec30, 0xc420677770)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206aec30, 0xc420677770)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206aec30, 0xc420677770)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206aec30, 0xc420677770)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5880, 0x1db9c00, 0xc4203c9dc0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 104 [semacquire, 69 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d1d40, 0xc4206c00f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d1d40, 0xc4206c00f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d1d40, 0xc4206c00f0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4280, 0x1db9c00, 0xc420522840)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 103 [semacquire, 71 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Leader(0xc420052000, 0x1512700, 0x0, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:614 +0x9e
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleRequestForwarding.func1(0x1db8a40, 0xc4206aed00, 0xc420677d10)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/handler.go:138 +0xd7
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e40, 0x1db8a40, 0xc4206aed00, 0xc420677d10)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206aed00, 0xc420677d10)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206aed00, 0xc420677d10)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206aed00, 0xc420677d10)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206aed00, 0xc420677d10)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5d00, 0x1db9c00, 0xc4205232c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 669 [IO wait]:
Nov 11 03:34:01 vault-2 vault[8535]: net.runtime_pollWait(0x7f8f32dd4c00, 0x72, 0x7)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/netpoll.go:160 +0x59
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).wait(0xc420536bc0, 0x72, 0xc4204989d0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:73 +0x38
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).waitRead(0xc420536bc0, 0x1db2bc0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:78 +0x34
Nov 11 03:34:01 vault-2 vault[8535]: net.(*netFD).Read(0xc420536b60, 0xc420505000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_unix.go:243 +0x1a1
Nov 11 03:34:01 vault-2 vault[8535]: net.(*conn).Read(0xc42001c408, 0xc420505000, 0x1000, 0x1000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/net.go:173 +0x70
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).Read(0xc420170500, 0xc420505000, 0x1000, 0x1000, 0xb486c0, 0xc420498b58, 0x40363d)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1261 +0x154
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).fill(0xc420509140)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:97 +0x10c
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).Peek(0xc420509140, 0x1, 0xc420498bbd, 0x1, 0x0, 0xc4205091a0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:129 +0x62
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).readLoop(0xc420170500)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1418 +0x1a1
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1062 +0x4e9
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 593 [semacquire, 17 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc42011d110, 0xc42066f4a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42011d110, 0xc42066f4a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc42011d110, 0xc42066f4a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc42011d110, 0xc42066f4a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42011d110, 0xc42066f4a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc42011d110, 0xc42066f4a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc42011d110, 0xc42066f4a0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5800, 0x1db9c00, 0xc42007db40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 556 [semacquire, 17 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42011c0d0, 0xc42066ec30)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42011c0d0, 0xc42066ec30)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc42011c0d0, 0xc42066ec30)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b9380, 0x1db9c00, 0xc4203c9000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 628 [IO wait, 5 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: net.runtime_pollWait(0x7f8f32dd4e40, 0x72, 0x8)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/netpoll.go:160 +0x59
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).wait(0xc4205423e0, 0x72, 0xc4203bc9d0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:73 +0x38
Nov 11 03:34:01 vault-2 vault[8535]: net.(*pollDesc).waitRead(0xc4205423e0, 0x1db2bc0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_poll_runtime.go:78 +0x34
Nov 11 03:34:01 vault-2 vault[8535]: net.(*netFD).Read(0xc420542380, 0xc420501000, 0x1000, 0x1000, 0x0, 0x1db2bc0, 0xc42000e150)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/fd_unix.go:243 +0x1a1
Nov 11 03:34:01 vault-2 vault[8535]: net.(*conn).Read(0xc42001c318, 0xc420501000, 0x1000, 0x1000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/net.go:173 +0x70
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).Read(0xc420170700, 0xc420501000, 0x1000, 0x1000, 0xb486c0, 0xc4203bcb58, 0x40363d)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1261 +0x154
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).fill(0xc4203ceba0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:97 +0x10c
Nov 11 03:34:01 vault-2 vault[8535]: bufio.(*Reader).Peek(0xc4203ceba0, 0x1, 0xc4203bcbbd, 0x1, 0x0, 0xc4203cf860, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/bufio/bufio.go:129 +0x62
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).readLoop(0xc420170700)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1418 +0x1a1
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1062 +0x4e9
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 500 [semacquire, 25 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc420694410, 0xc42066eb40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc420694410, 0xc42066eb40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc420694410, 0xc42066eb40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc420694410, 0xc42066eb40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc420694410, 0xc42066eb40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc420694410, 0xc42066eb40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc420694410, 0xc42066eb40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4e00, 0x1db9c00, 0xc4204f9400)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 520 [semacquire, 23 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc420694340, 0xc42066e3c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc420694340, 0xc42066e3c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc420694340, 0xc42066e3c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc420694340, 0xc42066e3c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc420694340, 0xc42066e3c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc420694340, 0xc42066e3c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc420694340, 0xc42066e3c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b8c00, 0x1db9c00, 0xc420583dc0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 471 [semacquire, 25 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d1e10, 0xc42066e000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d1e10, 0xc42066e000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d1e10, 0xc42066e000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d1e10, 0xc42066e000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d1e10, 0xc42066e000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d1e10, 0xc42066e000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d1e10, 0xc42066e000)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b8180, 0x1db9c00, 0xc4206c2440)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 453 [semacquire, 29 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d0680, 0xc4206c03c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d0680, 0xc4206c03c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d0680, 0xc4206c03c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4180, 0x1db9c00, 0xc420583f40)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 472 [semacquire, 25 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4203d1ee0, 0xc42066e1e0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c4400, 0x1db9c00, 0xc4206c32c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 486 [semacquire, 27 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206940d0, 0xc4206c0960)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206940d0, 0xc4206c0960)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206940d0, 0xc4206c0960)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206940d0, 0xc4206c0960)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206940d0, 0xc4206c0960)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206940d0, 0xc4206c0960)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206940d0, 0xc4206c0960)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b9000, 0x1db9c00, 0xc4204ff700)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 670 [select]:
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).writeLoop(0xc420170500)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1646 +0x3bd
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1063 +0x50e
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 686 [semacquire, 3 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc4206945b0, 0xc42066f590)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc4206945b0, 0xc42066f590)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc4206945b0, 0xc42066f590)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc4206945b0, 0xc42066f590)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc4206945b0, 0xc42066f590)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc4206945b0, 0xc42066f590)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc4206945b0, 0xc42066f590)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4203c5080, 0x1db9c00, 0xc42007c1c0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 629 [select, 5 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*persistConn).writeLoop(0xc420170700)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1646 +0x3bd
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Transport).dialConn
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/transport.go:1063 +0x50e
Nov 11 03:34:01 vault-2 vault[8535]: goroutine 594 [semacquire, 15 minutes]:
Nov 11 03:34:01 vault-2 vault[8535]: sync.runtime_Semacquire(0xc42005208c)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/runtime/sema.go:47 +0x30
Nov 11 03:34:01 vault-2 vault[8535]: sync.(*RWMutex).RLock(0xc420052080)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/sync/rwmutex.go:43 +0x5d
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/vault.(*Core).Sealed(0xc420052000, 0x0, 0x0, 0x0)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/vault/core.go:600 +0x54
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatusRaw(0xc420052000, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:151 +0x40
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleSysSealStatus.func1(0x1db8a40, 0xc42011c8f0, 0xc42066ed20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/sys_seal.go:146 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201e6610, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*ServeMux).ServeHTTP(0xc4201eff20, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2022 +0x7f
Nov 11 03:34:01 vault-2 vault[8535]: github.com/hashicorp/vault/http.handleHelpHandler.func1(0x1db8a40, 0xc42011c8f0, 0xc42066ed20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/gopath/src/github.com/hashicorp/vault/http/help.go:18 +0xd8
Nov 11 03:34:01 vault-2 vault[8535]: net/http.HandlerFunc.ServeHTTP(0xc4201f1e80, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1726 +0x44
Nov 11 03:34:01 vault-2 vault[8535]: net/http.serverHandler.ServeHTTP(0xc420069280, 0x1db8a40, 0xc42011c8f0, 0xc42066ed20)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2202 +0x7d
Nov 11 03:34:01 vault-2 vault[8535]: net/http.(*conn).serve(0xc4200b9680, 0x1db9c00, 0xc4204ff180)
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:1579 +0x4b7
Nov 11 03:34:01 vault-2 vault[8535]: created by net/http.(*Server).Serve
Nov 11 03:34:01 vault-2 vault[8535]: #011/goroot/src/net/http/server.go:2293 +0x44d
Nov 11 03:34:01 vault-2 vault[8535]: rax 0xfffffffffffffffc
Nov 11 03:34:01 vault-2 vault[8535]: rbx 0x0
Nov 11 03:34:01 vault-2 vault[8535]: rcx 0x45a983
Nov 11 03:34:01 vault-2 vault[8535]: rdx 0x0
Nov 11 03:34:01 vault-2 vault[8535]: rdi 0x1df4058
Nov 11 03:34:01 vault-2 vault[8535]: rsi 0x0
Nov 11 03:34:01 vault-2 vault[8535]: rbp 0xc42002de90
Nov 11 03:34:01 vault-2 vault[8535]: rsp 0xc42002de48
Nov 11 03:34:01 vault-2 vault[8535]: r8 0x0
Nov 11 03:34:01 vault-2 vault[8535]: r9 0x0
Nov 11 03:34:01 vault-2 vault[8535]: r10 0xc42002de80
Nov 11 03:34:01 vault-2 vault[8535]: r11 0x246
Nov 11 03:34:01 vault-2 vault[8535]: r12 0x42da00
Nov 11 03:34:01 vault-2 vault[8535]: r13 0xf3
Nov 11 03:34:01 vault-2 vault[8535]: r14 0x30
Nov 11 03:34:01 vault-2 vault[8535]: r15 0x3
Nov 11 03:34:01 vault-2 vault[8535]: rip 0x45a983
Nov 11 03:34:01 vault-2 vault[8535]: rflags 0x246
Nov 11 03:34:01 vault-2 vault[8535]: cs 0x33
Nov 11 03:34:01 vault-2 vault[8535]: fs 0x0
Nov 11 03:34:01 vault-2 vault[8535]: gs 0x0
Nov 11 03:34:01 vault-2 systemd[1]: vault.service: Main process exited, code=exited, status=2/INVALIDARGUMENT
Nov 11 03:34:01 vault-2 systemd[1]: vault.service: Unit entered failed state.
Nov 11 03:34:01 vault-2 systemd[1]: vault.service: Failed with result 'exit-code'.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment