diff --git a/README.md b/README.md index 73e4217..027e171 100644 --- a/README.md +++ b/README.md @@ -147,7 +147,7 @@ Get the Vault command-line client via [vaultproject.io/downloads](https://www.va Log in to Vault with `userpass` and the `zabbix` account from above, get the account's token and lastly double-check that `zabbix` with its token can read a secret: ``` curl --silent --location --header 'X-Vault-Token: <token>' \ - "${VAULT_ADDR}"'v1/kv/data/for_rbacgroup_zabbix/some/secret' \ + 'https://fully.qualified.domain.name/v1/kv/data/for_rbacgroup_zabbix/some/secret' \ | jq '.data.data' ``` @@ -157,7 +157,7 @@ Get the Vault command-line client via [vaultproject.io/downloads](https://www.va ``` # Look up a token's own attributes curl --silent --location --header 'X-Vault-Token: <token>' \ - "${VAULT_ADDR}"'v1/auth/token/lookup-self' \ + 'https://fully.qualified.domain.name/v1/auth/token/lookup-self' \ | jq '.data.ttl' # .data.ttl will show remaining validity in secs: @@ -168,7 +168,7 @@ Get the Vault command-line client via [vaultproject.io/downloads](https://www.va Their `list` permission only begins one lever deeper at `kv/list/for_rbacgroup_zabbix`. It may make sense to communicate an entrypoint link to end users that - in this case - will look like: ``` - "${VAULT_ADDR}"'/ui/vault/secrets/kv/list/for_rbacgroup_zabbix/' + https://fully.qualified.domain.name/ui/vault/secrets/kv/list/for_rbacgroup_zabbix/ ``` ## Clean-up