docs: update acl token generation with uuidgen (#12821)

* update acl token generation with uuidgen
This commit is contained in:
Kyle Schochenmaier 2022-04-21 12:17:24 -05:00 committed by GitHub
parent 0ac00c75e4
commit 16e8dea375
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 13 additions and 13 deletions

View File

@ -25,12 +25,12 @@ To use an ACL bootstrap token stored in Vault, we will follow the steps outlined
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart. 1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
## One time setup in Vault ## One time setup in Vault
### Store the Secret in Vault ### Generate and Store the Secret in Vault
First, store the ACL bootstrap token in Vault: First, generate and store the ACL bootstrap token in Vault:
```shell-session ```shell-session
$ vault kv put secret/consul/boostrap-token token="<ACL bootstrap Token>" $ vault kv put secret/consul/bootstrap-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
``` ```
### Create a Vault policy that authorizes the desired level of access to the secret ### Create a Vault policy that authorizes the desired level of access to the secret

View File

@ -24,12 +24,12 @@ To use an ACL partition token stored in Vault, we will follow the steps outlined
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart. 1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
## One time setup in Vault ## One time setup in Vault
### Store the Secret in Vault ### Generate and Store the Secret in Vault
First, store the ACL partition token in Vault: First, generate and store the ACL partition token in Vault:
```shell-session ```shell-session
$ vault kv put secret/consul/partition-token token="<ACL partition Token>" $ vault kv put secret/consul/partition-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
``` ```
### Create a Vault policy that authorizes the desired level of access to the secret ### Create a Vault policy that authorizes the desired level of access to the secret

View File

@ -24,12 +24,12 @@ To use an ACL replication token stored in Vault, we will follow the steps outlin
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart. 1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
## One time setup in Vault ## One time setup in Vault
### Store the Secret in Vault ### Generate and Store the Secret in Vault
First, store the ACL replication token in Vault: First, generate and store the ACL replication token in Vault:
```shell-session ```shell-session
$ vault kv put secret/consul/replication-token token="<ACL replication Token>" $ vault kv put secret/consul/replication-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
``` ```
### Create a Vault policy that authorizes the desired level of access to the secret ### Create a Vault policy that authorizes the desired level of access to the secret