vsatctl recover
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
vsatctl recover
Warning (Not supported for HSM-protected DEK): The vsatctl recover command is supported only for VSatellites using software-based DEK protection. Recovery using the CLI or UI is not supported for HSM-protected DEK deployments.
vsatctl recover [flags]
Allows you to pass in the DEK, the passphrase, and the recovery code to restore lost VSatellites.
Note: You must run this command with root privileges because it connects to the VSatellite cluster using credentials from a file that only root users can access.
Examples
You'll copy the full command from the Recovery wizard in Next-Gen Trust Security, because you need your unique recovery code. Be sure to edit the placeholder texts (in brackets#) before running the command.
sudo vsatctl recover \ --dek [path/to/dek] \ --passphrase [passphrase] \ --recovery-code ********-*****-*****-*****-***************
Options
--dek string Use to specify the path to where your backedup DEK key is stored. --passphrase string Passphrase to decrypt Data Encryption Key set payload. --recovery-code Code you copy from the recovery wizard in Next-Gen Trust Security. -h, --help Help for recover.