File tree 1 file changed +11
-5
lines changed
website/source/docs/config
1 file changed +11
-5
lines changed Original file line number Diff line number Diff line change @@ -69,11 +69,17 @@ sending a SIGHUP to the server process. These are denoted below.
69
69
lease duration for tokens and secrets. This is a string value using a suffix,
70
70
e.g. "720h". Default value is 30 days.
71
71
72
- In production, you should only consider setting the ` disable_mlock ` option
73
- on Linux systems that only use encrypted swap or do not use swap at all.
74
- Vault does not currently support memory locking on Mac OS X and Windows
75
- and so the feature is automatically disabled on those platforms. To give
76
- the Vault executable access to the ` mlock ` syscall on Linux systems:
72
+ In production it is a risk to run Vault on systems where ` mlock ` is
73
+ unavailable or the setting has been disabled via the ` disable_mlock ` .
74
+ Disabling ` mlock ` is not recommended unless the systems running Vault only
75
+ use encrypted swap or do not use swap at all. Vault only supports memory
76
+ locking on UNIX-like systems (Linux, FreeBSD, Darwin, etc). Non-UNIX like
77
+ systems (e.g. Windows, NaCL, Android) lack the primitives to keep a process's
78
+ entire memory address space from spilling disk and is therefore automatically
79
+ disabled on unsupported platforms.
80
+
81
+ On Linux, to give the Vault executable the ability to use the ` mlock ` syscall
82
+ without running the process as root, run:
77
83
78
84
``` shell
79
85
sudo setcap cap_ipc_lock=+ep $( readlink -f $( which vault) )
You can’t perform that action at this time.
0 commit comments