mirror of https://github.com/status-im/consul.git
website: minor acl guide fixes (#5214)
This commit is contained in:
parent
2e97a4858f
commit
4db60f8243
|
@ -83,8 +83,8 @@ On the server where the `bootstrap` command was issued we should see the followi
|
||||||
2018/12/11 15:30:23 [DEBUG] http: Request PUT /v1/acl/bootstrap (2.347965ms) from=127.0.0.1:40566
|
2018/12/11 15:30:23 [DEBUG] http: Request PUT /v1/acl/bootstrap (2.347965ms) from=127.0.0.1:40566
|
||||||
```
|
```
|
||||||
|
|
||||||
Since ACLs have been enabled, we will need it use it to complete any additional operations.
|
Since ACLs have been enabled, we will need to use it to complete any additional operations.
|
||||||
For example, even checking the memeber list will require a token.
|
For example, even checking the member list will require a token.
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
$ consul members -token "4411f091-a4c9-48e6-0884-1fcb092da1c8"
|
$ consul members -token "4411f091-a4c9-48e6-0884-1fcb092da1c8"
|
||||||
|
@ -109,7 +109,7 @@ Note, the bootstrap token can only be created once, bootstrapping will be disabl
|
||||||
|
|
||||||
## Step 3: Create an Agent Token Policy
|
## Step 3: Create an Agent Token Policy
|
||||||
|
|
||||||
Before we can create a token, we will need to create its associated policy. A policy is a set of rules that can used to specify granular permissions. To learn more about rules, read the ACL rule specification [documentation](/docs/agent/acl-rules.html).
|
Before we can create a token, we will need to create its associated policy. A policy is a set of rules that can be used to specify granular permissions. To learn more about rules, read the ACL rule specification [documentation](/docs/agent/acl-rules.html).
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# agent-policy.hcl contains the following:
|
# agent-policy.hcl contains the following:
|
||||||
|
@ -262,7 +262,7 @@ it has write privileges to an empty `node` prefix, meaning it has access to all
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ CONSUL_HTTP_TOKEN=4411f091-a4c9-48e6-0884-1fcb092da1c8 consul members
|
$ CONSUL_HTTP_TOKEN=4411f091-a4c9-48e6-0884-1fcb092da1c8 consul members
|
||||||
Node Address Status Type Build Protocol DC
|
Node Address Status Type Build Protocol DC Segment
|
||||||
fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all>
|
fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all>
|
||||||
bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all>
|
bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all>
|
||||||
wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all>
|
wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all>
|
||||||
|
@ -305,7 +305,7 @@ The anonymous token is implicitly used if no token is supplied, so now we can ru
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
$ consul members
|
$ consul members
|
||||||
Node Address Status Type Build Protocol DC
|
Node Address Status Type Build Protocol DC Segment
|
||||||
fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all>
|
fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all>
|
||||||
bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all>
|
bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all>
|
||||||
wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all>
|
wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all>
|
||||||
|
|
Loading…
Reference in New Issue