Skip to content

Commit fb600b4

Browse files
Make a small grammar change to also pick up whitespace changes necessary for formatting
1 parent d65060e commit fb600b4

File tree

1 file changed

+31
-31
lines changed
  • website/content/docs/k8s/deployment-configurations/vault/data-integration

1 file changed

+31
-31
lines changed

website/content/docs/k8s/deployment-configurations/vault/data-integration/webhook-certs.mdx

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ To use Vault as the controller and connect inject Webhook Certificate Provider,
2323

2424
These following steps will be repeated for each datacenter:
2525
1. Create a Vault policy that authorizes the desired level of access to the secret.
26-
1. (Added) Create Vault PKI roles for controller and connect inject each that establish the domains that each is allowed to issue certificates for.
26+
1. (Added) Create Vault PKI roles for controller and connect inject that each establish the domains that each is allowed to issue certificates for.
2727
1. Create Vault Kubernetes auth roles that link the policy to each Consul on Kubernetes service account that requires access.
2828
1. Configure the Vault Kubernetes auth roles in the Consul on Kubernetes helm chart.
2929

@@ -74,44 +74,44 @@ Issue the following commands to enable and configure the PKI Secrets Engine to s
7474
1. Create a policy that allows `["create", "update"]` access to the
7575
[certificate issuing URL](/vault/api-docs/secret/pki) so Consul controller and connect inject can fetch a new certificate/key pair and provide it to the Kubernetes `mutatingwebhookconfiguration`.
7676

77-
The path to the secret referenced in the `path` resource is the same value that you will configure in the `global.secretsBackend.vault.controller.tlsCert.secretName` and `global.secretsBackend.vault.connectInject.tlsCert.secretName` Helm configuration (refer to [Update Consul on Kubernetes Helm chart](#update-consul-on-kubernetes-helm-chart)).
77+
The path to the secret referenced in the `path` resource is the same value that you will configure in the `global.secretsBackend.vault.controller.tlsCert.secretName` and `global.secretsBackend.vault.connectInject.tlsCert.secretName` Helm configuration (refer to [Update Consul on Kubernetes Helm chart](#update-consul-on-kubernetes-helm-chart)).
7878

79-
```shell-session
80-
$ vault policy write controller-tls-policy - <<EOF
81-
path controller/issue/controller-role {
82-
capabilities = ["create", "update"]
83-
}
84-
EOF
85-
```
79+
```shell-session
80+
$ vault policy write controller-tls-policy - <<EOF
81+
path controller/issue/controller-role {
82+
capabilities = ["create", "update"]
83+
}
84+
EOF
85+
```
8686

87-
```shell-session
88-
$ vault policy write connect-inject-policy - <<EOF
89-
path connect-inject/issue/connect-inject-role {
90-
capabilities = ["create", "update"]
91-
}
92-
EOF
93-
```
87+
```shell-session
88+
$ vault policy write connect-inject-policy - <<EOF
89+
path connect-inject/issue/connect-inject-role {
90+
capabilities = ["create", "update"]
91+
}
92+
EOF
93+
```
9494

9595
1. Create a policy that allows `["read"]` access to the [CA URL](/vault/api-docs/secret/pki#read-certificate),
9696
this is required for the Consul components to communicate with the Consul servers in order to fetch their auto-encryption certificates.
9797

98-
The path to the secret referenced in the `path` resource is the same values that you will configure in the `global.secretsBackend.vault.controller.caCert.secretName` and `global.secretsBackend.vault.connectInject.caCert.secretName` Helm configuration (refer to [Update Consul on Kubernetes Helm chart](#update-consul-on-kubernetes-helm-chart)).
98+
The path to the secret referenced in the `path` resource is the same values that you will configure in the `global.secretsBackend.vault.controller.caCert.secretName` and `global.secretsBackend.vault.connectInject.caCert.secretName` Helm configuration (refer to [Update Consul on Kubernetes Helm chart](#update-consul-on-kubernetes-helm-chart)).
9999

100-
```shell-session
101-
$ vault policy write controller-ca-policy - <<EOF
102-
path controller/cert/ca {
103-
capabilities = ["read"]
104-
}
105-
EOF
106-
```
100+
```shell-session
101+
$ vault policy write controller-ca-policy - <<EOF
102+
path controller/cert/ca {
103+
capabilities = ["read"]
104+
}
105+
EOF
106+
```
107107

108-
```shell-session
109-
$ vault policy write connect-inject-ca-policy - <<EOF
110-
path connect-inject/cert/ca {
111-
capabilities = ["read"]
112-
}
113-
EOF
114-
```
108+
```shell-session
109+
$ vault policy write connect-inject-ca-policy - <<EOF
110+
path connect-inject/cert/ca {
111+
capabilities = ["read"]
112+
}
113+
EOF
114+
```
115115

116116
1. Configure allowed domains for PKI certificates.
117117

0 commit comments

Comments
 (0)