docs: update acl token generation with uuidgen (#12821)

* update acl token generation with uuidgen
This commit is contained in:
Kyle Schochenmaier 2022-04-21 12:17:24 -05:00 committed by GitHub
parent 0ac00c75e4
commit 16e8dea375
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 13 additions and 13 deletions

View File

@ -25,12 +25,12 @@ To use an ACL bootstrap token stored in Vault, we will follow the steps outlined
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
## One time setup in Vault
### Store the Secret in Vault
### Generate and Store the Secret in Vault
First, store the ACL bootstrap token in Vault:
First, generate and store the ACL bootstrap token in Vault:
```shell-session
$ vault kv put secret/consul/boostrap-token token="<ACL bootstrap Token>"
$ vault kv put secret/consul/bootstrap-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
```
### Create a Vault policy that authorizes the desired level of access to the secret

View File

@ -24,12 +24,12 @@ To use an ACL partition token stored in Vault, we will follow the steps outlined
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
## One time setup in Vault
### Store the Secret in Vault
### Generate and Store the Secret in Vault
First, store the ACL partition token in Vault:
First, generate and store the ACL partition token in Vault:
```shell-session
$ vault kv put secret/consul/partition-token token="<ACL partition Token>"
$ vault kv put secret/consul/partition-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
```
### Create a Vault policy that authorizes the desired level of access to the secret

View File

@ -24,12 +24,12 @@ To use an ACL replication token stored in Vault, we will follow the steps outlin
1. Configure the Vault Kubernetes auth role in the Consul on Kubernetes helm chart.
## One time setup in Vault
### Store the Secret in Vault
### Generate and Store the Secret in Vault
First, store the ACL replication token in Vault:
First, generate and store the ACL replication token in Vault:
```shell-session
$ vault kv put secret/consul/replication-token token="<ACL replication Token>"
$ vault kv put secret/consul/replication-token token="$(uuidgen | tr '[:upper:]' '[:lower:]')"
```
### Create a Vault policy that authorizes the desired level of access to the secret