When Vault is first launched from an official Marketplace AMI, it will come up in an uninitialized state and must be initialized via the API, CLI, or UI. The Marketplace AMI listens on port 8200 by default. It is recommended to restrict ingress networking to the Vault instance as much as possible when initially deploying Vault (through EC2 security groups or otherwise) because anyone with network access to Vault will be able to initialize it. To learn more about the default listener configuration, or to make changes, please see the Vault Deployment Guide.
Additionally on first launch, a new self-signed certificate and key (unique to the EC2 instance) will be generated to secure Vault traffic using TLS. This is provided as a “more secure” (vs. unencrypted TCP traffic) temporary solution, but it is strongly recommended to replace these with your own certificate and key. Please note that when using a self-signed certificate, Vault clients will need to skip the verification of Vault’s certificate, which voids Vault’s security model.
The Vault UI is enabled by default. You can view the UI by navigating to
https://VAULT_INSTANCE_PUBLIC_IP:8200/ in a web browser. Please note that your web browser will likely show a security warning that the default self-signed TLS certificate
(Organization: HashiCorp, Common Name: Vault) is not trusted, and that this can be ignored at your own risk until Vault’s certificate and key are replaced with your own valid ones.
New Vault AMIs are added to the AWS Marketplace listing regularly and contain the latest versions of Vault and updated operating system packages. However, new AMIs are not built and tested to support in-place upgrades of your existing Vault installation.
To upgrade a Vault instance launched from an official AWS Marketplace AMI, please follow the normal upgrade instructions for a non-HA installation.
HashiCorp’s AWS Marketplace offerings provide an easy way to deploy Vault in a single-instance configuration using the Filesystem storage backend, but for production use, we recommend running Vault on AWS with the same general architecture as running it anywhere else. While the Filesystem storage backend is officially supported by HashiCorp, it does not support High Availability. Because Vault data is stored on disk in this configuration, it is subject to the durability and availability of Amazon Elastic Block Store (EBS) and should be backed up accordingly.
For additional guidance on best practices for running Vault in production, please refer to the Production Hardening tutorial.
For the Community Vault AMI, support can be obtained through the community channels
For customers that purchase the Enterprise Vault AMI through the AWS Marketplace, Enterprise Support is also available from HashiCorp. To learn more, see our support website