Update kubernetes.mdx (#19567)

Correct 2 typos
This commit is contained in:
Mark Lewis
2023-03-31 00:42:25 +01:00
committed by GitHub
parent 78ebaf14f6
commit b3d333b67a

View File

@@ -39,7 +39,7 @@ management tool.
It's necessary to ensure that the service account Vault uses will have permissions to manage
service account tokens, and optionally manage service accounts, roles, and role bindings. These
permissions can be managed using a Kuberentes role or cluster role. The role is attached to the
permissions can be managed using a Kubernetes role or cluster role. The role is attached to the
Vault service account with a role binding or cluster role binding.
For example, a minimal cluster role to create service account tokens is:
@@ -321,7 +321,7 @@ $ vault write kubernetes/roles/auto-managed-sa-role \
~> **Note**: Vault's service account will also need access to the resources it is granting
access to. This can be done for the examples above with `kubectl -n test create rolebinding --role test-role-list-pods --serviceaccount=vault:vault vault-test-role-abilities`.
This is how Kuberentes prevents privilege escalation.
This is how Kubernetes prevents privilege escalation.
You can read more in the
[Kubernetes RBAC documentation](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#privilege-escalation-prevention-and-bootstrapping).