--- layout: docs page_title: Restore a snapshot description: >- Restore a Vault snapshot. --- > [!IMPORTANT] > **Documentation Update:** Product documentation, which were located in this repository under `/website`, are now located in [`hashicorp/web-unified-docs`](https://github.com/hashicorp/web-unified-docs), colocated with all other product documentation. Contributions to this content should be done in the `web-unified-docs` repo, and not this one. Changes made to `/website` content in this repo will not be reflected on the developer.hashicorp.com website. # Restore a Vault snapshot Manually restore data for a Vault cluster leader node with a saved snapshot. ## Before you start - **You must a working knowledge of how Vault saves data**. - **You must have a valid Vault cluster configuration using integratd storage**. - **You must know, and be able to contact your unseal/recovery key holders**. In addition to the new root token generated during reinitalization, you need the original cluster unseal keys to unseal Vault after restoring the snapshot. - **You must have permission to access encrypted data in backed storage**. ## Step 1: Bring your Vault cluster back online Your Vault cluster must be online to restore a snapshot. Resolve the circumstances that required you to restore from backup, reinitialize your Vault cluster with new storage, and authenticate with the new initial root token generated during re-initialization. The new root token is temporary as you will overwrite the cluster state with the snapshot data. ## Step 2: Copy the snapshot file to the cluster You must save your snapshot file as a local file on the cluster to restore the data. To restore a snapshot to a disaster recovery replication cluster, you must copy your Vault snapshot files for the primary and DR replica clusters onto restored members of the respective clusters. To restore a snapshot to a performance replication cluster, you must copy your Vault snapshot files for the primary and secondary performance replica clusters onto restored members of the respective clusters. ## Step 3: Force a snapshot restore You must use force the snapshot restore since the auto-unseal or Shamir keys are not consistent with the snapshot data, which came from a different cluster. Run [`vault operator raft snapshot restore`](/vault/docs/commands/operator/raft#snapshot-restore) with the local snapshot file path and the `-force` flag: ```shell-session $ vault operator raft snapshot restore -force ``` For example: ```shell-session $ vault operator raft snapshot restore -force /tmp/snapshots/backup.snap ``` Call the [`/v1/sys/storage/raft/snapshot-force`](/vault/api-docs/system/storage/raft#force-restore-raft-using-a-snapshot) endpoint with the local snapshot file path: ```shell-session $ curl \ --request POST \ --header "X-Vault-Token: ${VAULT_TOKEN}" \ --data-binary @ \ ${VAULT_ADDR}/v1/sys/storage/raft/snapshot-force ``` For example: ```shell-session $ curl \ --request POST \ --header "X-Vault-Token: ${VAULT_TOKEN}" \ --data-binary /tmp/snapshots/backup.snap \ ${VAULT_ADDR}/v1/sys/storage/raft/snapshot-force ``` ## Step 4: Unseal Vault Have each person with an unseal key share run `vault operator unseal` with their original unseal key until reaching the number of key shares required by your origial quroum configuration to unseal your Vault cluster: ```shell-session $ vault operator unseal ``` Enter the unseal key when prompted: ```plaintext Unseal Key (will be hidden): ``` Have each person with an unseal key share run [`v1/sys/unseal`](/vault/api-docs/system/unseal) with their original unseal key until reaching the number of key shares required by your origial quorum configuration to unseal your Vault cluster: ```shell-session $ curl \ --request POST \ --header "X-Vault-Token: ${VAULT_TOKEN}" \ --data '{"key": ""}' \ ${VAULT_ADDR}/v1/sys/unseal ```