Remove a few more vault.rocks usages
This commit is contained in:
parent
a1d5defe01
commit
e8fc0a11ce
|
@ -160,7 +160,7 @@ concepts](/docs/concepts/tokens.html) page.
|
|||
### `VAULT_ADDR`
|
||||
|
||||
Address of the Vault server expressed as a URL and port, for example:
|
||||
`https://vault.rocks:8200/`.
|
||||
`https://127.0.0.1:8200/`.
|
||||
|
||||
### `VAULT_CACERT`
|
||||
|
||||
|
|
|
@ -33,7 +33,7 @@ Force a Vault to resign leadership in a cluster:
|
|||
|
||||
```text
|
||||
$ vault operator step-down
|
||||
Success! Stepped down: https://vault.rocks
|
||||
Success! Stepped down: https://127.0.0.1:8200
|
||||
```
|
||||
|
||||
Rotate Vault's underlying encryption key:
|
||||
|
|
|
@ -188,7 +188,7 @@ path, and passed the secret engine type ("database") in the request payload.
|
|||
$ curl --header "X-Vault-Token: ..." \
|
||||
--request POST \
|
||||
--data '{"type":"database"}' \
|
||||
https://$ vault.rocks/v1/sys/mounts/database
|
||||
https://127.0.0.1:8200/v1/sys/mounts/database
|
||||
```
|
||||
|
||||
**NOTE:** It is possible to mount your database secret engines at any location.
|
||||
|
|
Loading…
Reference in a new issue