Fetch AWS Credentials using generic secrets

I’ve been trying to use the secrets:vault section in my ci-file to get AWS credentials. According to the doco . I keep getting this error:

Running with gitlab-runner 17.0.0 (44feccdf)
  on edp-runner 8yyn2txBZ, system ID: s_7509523efb45
Resolving secrets
Resolving secret "access_key"...
Using "vault" secret resolver...
ERROR: Job failed (system failure): resolving secrets: initializing Vault service: preparing authenticated client: checking Vault server health: Get "https://vault.aajolly.local/v1/sys/health?drsecondarycode=299&performancestandbycode=299&sealedcode=299&standbycode=299&uninitcode=299": dial tcp 10.0.0.30:443: connect: connection refused

Below is my pipeline configuration

stages:
  - secret

variables:
    AWS_DEFAULT_REGION: "ap-southeast-2"
    VAULT_SERVER_URL: "https://vault.aajolly.local:8200"
    VAULT_NAMESPACE: "edp"
    VAULT_AUTH_ROLE: "cicd-rw-role"

job_using_vault:
  stage: secret
  image: aajolly/terraform:latest
  tags:
    - prod-runner
  id_tokens:
    VAULT_ID_TOKEN:
      aud: $VAULT_SERVER_URL
  secrets:
    access_key:
      vault:
        engine:
          name: generic
          path: aws
        path: creds/deployrole-382637260386
        field: access_key
      file: false
  script:
    - echo $access_key

Questions

  1. Why is the CI job attempting to use TCP/443 for the Vault server when I’ve specified 8200 in the VAULT_SERVER_URL variable?
  2. Is my configuration for attaining AWS credentials correct? I can’t find any examples in the documentation.