File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -123,7 +123,7 @@ The recommended way to run Vault on Kubernetes is via the [Helm chart](https://d
123123 EOF
124124 ` ` `
125125
126- 4. Create a new ` lab-security` namespace (suffixed with your initials) :
126+ 4. Create a new ` lab-security` namespace:
127127 ` ` ` sh
128128 $ kubectl create namespace lab-security
129129 $ kubectl config set-context --current --namespace lab-security
@@ -273,25 +273,17 @@ Vault provides a [Kubernetes authentication](https://developer.hashicorp.com/vau
273273The Vault Kubernetes authentication role defined a Kubernetes service account named `internal-app-${INITIALS}`.
274274
275275A service account provides an identity for processes that run in a Pod. With this identity we will be able to run the application within the cluster.
276-
277- 1. Get all the service accounts in the lab-security-${INITIALS} namespace.
278-
279- $ kubectl get serviceaccounts
280- NAME SECRETS AGE
281- lab-security-ns 1 43m
282- vault 1 34m
283- vault-agent-injector 1 34m
284276
285277
286- 2 . Create a Kubernetes service account named `internal-app-${INITIALS}` in a new `lab-security-${INITIALS}` namespace.
278+ 1 . Create a Kubernetes service account named `internal-app-${INITIALS}` in a new `lab-security-${INITIALS}` namespace.
287279
288280 $ export INITIALS=ns # CHANGEME
289281 $ kubectl create namespace lab-security-${INITIALS}
290282 $ kubectl config set-context --current --namespace lab-security-${INITIALS}
291283 $ kubectl create sa internal-app-${INITIALS}
292284
293285
294- 3. Verify that the service account has been created.
286+ 2. Get all the service accounts in the lab-security-${INITIALS} namespace. Verify that the service account has been created.
295287
296288 $ kubectl get serviceaccounts
297289 NAME SECRETS AGE
You can’t perform that action at this time.
0 commit comments