docs: update acl token generation with uuidgen (#12821)
* update acl token generation with uuidgen
This commit is contained in:
parent
0ac00c75e4
commit
16e8dea375
|
@ -25,12 +25,12 @@ To use an ACL bootstrap token stored in Vault, we will follow the steps outlined
|
||||||
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
|
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
|
||||||
|
|
||||||
## One time setup in Vault
|
## One time setup in Vault
|
||||||
### Store the Secret in Vault
|
### Generate and Store the Secret in Vault
|
||||||
|
|
||||||
First, store the ACL bootstrap token in Vault:
|
First, generate and store the ACL bootstrap token in Vault:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ vault kv put secret/consul/boostrap-token token="<ACL bootstrap Token>"
|
$ vault kv put secret/consul/bootstrap-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
|
||||||
```
|
```
|
||||||
|
|
||||||
### Create a Vault policy that authorizes the desired level of access to the secret
|
### Create a Vault policy that authorizes the desired level of access to the secret
|
||||||
|
|
|
@ -24,12 +24,12 @@ To use an ACL partition token stored in Vault, we will follow the steps outlined
|
||||||
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
|
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
|
||||||
|
|
||||||
## One time setup in Vault
|
## One time setup in Vault
|
||||||
### Store the Secret in Vault
|
### Generate and Store the Secret in Vault
|
||||||
|
|
||||||
First, store the ACL partition token in Vault:
|
First, generate and store the ACL partition token in Vault:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ vault kv put secret/consul/partition-token token="<ACL partition Token>"
|
$ vault kv put secret/consul/partition-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
|
||||||
```
|
```
|
||||||
|
|
||||||
### Create a Vault policy that authorizes the desired level of access to the secret
|
### Create a Vault policy that authorizes the desired level of access to the secret
|
||||||
|
|
|
@ -24,12 +24,12 @@ To use an ACL replication token stored in Vault, we will follow the steps outlin
|
||||||
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
|
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
|
||||||
|
|
||||||
## One time setup in Vault
|
## One time setup in Vault
|
||||||
### Store the Secret in Vault
|
### Generate and Store the Secret in Vault
|
||||||
|
|
||||||
First, store the ACL replication token in Vault:
|
First, generate and store the ACL replication token in Vault:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ vault kv put secret/consul/replication-token token="<ACL replication Token>"
|
$ vault kv put secret/consul/replication-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
|
||||||
```
|
```
|
||||||
|
|
||||||
### Create a Vault policy that authorizes the desired level of access to the secret
|
### Create a Vault policy that authorizes the desired level of access to the secret
|
||||||
|
|
Loading…
Reference in New Issue