mirror of
https://github.com/kemko/nomad.git
synced 2026-01-07 10:55:42 +03:00
* Move commands from docs to its own root-level directory * temporarily use modified dev-portal branch with nomad ia changes * explicitly clone nomad ia exp branch * retrigger build, fixed dev-portal broken build * architecture, concepts and get started individual pages * fix get started section destinations * reference section * update repo comment in website-build.sh to show branch * docs nav file update capitalization * update capitalization to force deploy * remove nomad-vs-kubernetes dir; move content to what is nomad pg * job section * Nomad operations category, deploy section * operations category, govern section * operations - manage * operations/scale; concepts scheduling fix * networking * monitor * secure section * remote auth-methods folder and move up pages to sso; linkcheck * Fix install2deploy redirects * fix architecture redirects * Job section: Add missing section index pages * Add section index pages so breadcrumbs build correctly * concepts/index fix front matter indentation * move task driver plugin config to new deploy section * Finish adding full URL to tutorials links in nav * change SSO to Authentication in nav and file system * Docs NomadIA: Move tutorials into NomadIA branch (#26132) * Move governance and policy from tutorials to docs * Move tutorials content to job-declare section * run jobs section * stateful workloads * advanced job scheduling * deploy section * manage section * monitor section * secure/acl and secure/authorization * fix example that contains an unseal key in real format * remove images from sso-vault * secure/traffic * secure/workload-identities * vault-acl change unseal key and root token in command output sample * remove lines from sample output * fix front matter * move nomad pack tutorials to tools * search/replace /nomad/tutorials links * update acl overview with content from deleted architecture/acl * fix spelling mistake * linkcheck - fix broken links * fix link to Nomad variables tutorial * fix link to Prometheus tutorial * move who uses Nomad to use cases page; move spec/config shortcuts add dividers * Move Consul out of Integrations; move namespaces to govern * move integrations/vault to secure/vault; delete integrations * move ref arch to docs; rename Deploy Nomad back to Install Nomad * address feedback * linkcheck fixes * Fixed raw_exec redirect * add info from /nomad/tutorials/manage-jobs/jobs * update page content with newer tutorial * link updates for architecture sub-folders * Add redirects for removed section index pages. Fix links. * fix broken links from linkcheck * Revert to use dev-portal main branch instead of nomadIA branch * build workaround: add intro-nav-data.json with single entry * fix content-check error * add intro directory to get around Vercel build error * workound for emtpry directory * remove mdx from /intro/ to fix content-check and git snafu * Add intro index.mdx so Vercel build should work --------- Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
91 lines
2.6 KiB
Plaintext
91 lines
2.6 KiB
Plaintext
---
|
|
layout: docs
|
|
page_title: 'nomad acl token create command reference'
|
|
description: |
|
|
The `nomad acl token create` command creates an access control list (ACL) token. Set name, client or management type, policy, role, time to live (TTL), and whether the policy should be global.
|
|
---
|
|
|
|
# `nomad acl token create` command reference
|
|
|
|
The `acl token create` command is used to create new ACL tokens.
|
|
|
|
## Usage
|
|
|
|
```plaintext
|
|
nomad acl token create [options]
|
|
```
|
|
|
|
The `acl token create` command requires no arguments.
|
|
|
|
## Create options
|
|
|
|
- `-name`: Sets the human readable name for the ACL token.
|
|
|
|
- `-type`: Sets the type of token. Must be one of "client" (default), or
|
|
"management".
|
|
|
|
- `-global`: Sets the global mode of the token. Global tokens are replicated
|
|
to all regions. This can not be changed after creation. Defaults to false.
|
|
|
|
- `-policy`: Specifies a policy to associate with the token. Can be specified
|
|
multiple times, but only with client type tokens.
|
|
|
|
- `-role-id`: ID of a role to use for this token. May be specified multiple
|
|
times.
|
|
|
|
- `-role-name`: Name of a role to use for this token. May be specified multiple
|
|
times.
|
|
|
|
- `-ttl`: Specifies the time-to-live of the created ACL token. This takes the
|
|
form of a time duration such as "5m" and "1h". By default, tokens will be
|
|
created without a TTL and therefore never expire.
|
|
|
|
- `-json`:Output the ACL token information in JSON format.
|
|
|
|
- `-t`: Format and display the ACL token information using a Go template.
|
|
|
|
## Examples
|
|
|
|
Create a new ACL token linked to an ACL Policy and Role:
|
|
|
|
```shell-session
|
|
$ nomad acl token create -name="example-acl-token" -policy=example-acl-policy -role-name=example-acl-role
|
|
Accessor ID = ef851ca0-b331-da5d-bbeb-7ede8f7c9151
|
|
Secret ID = 11d5348a-8768-5baa-6185-c154980e1488
|
|
Name = example-acl-token
|
|
Type = client
|
|
Global = false
|
|
Create Time = 2022-08-23 12:16:09.680699039 +0000 UTC
|
|
Expiry Time = <none>
|
|
Create Index = 140
|
|
Modify Index = 140
|
|
Policies = [example-acl-policy]
|
|
|
|
Roles
|
|
ID Name
|
|
2fe0c403-4502-e99d-4c79-a2821355e66d example-acl-policy
|
|
```
|
|
|
|
Create a new ACL token with an expiry:
|
|
|
|
```shell-session
|
|
$ nomad acl token create -name="example-acl-token" -policy=example-acl-policy -ttl=8h
|
|
Accessor ID = 1b60edc8-e4ed-08ef-208d-ecc18a90ccc3
|
|
Secret ID = e4c7c80e-870b-c6a6-43d2-dbfa90130c06
|
|
Name = example-acl-token
|
|
Type = client
|
|
Global = false
|
|
Create Time = 2022-08-23 12:17:35.45067293 +0000 UTC
|
|
Expiry Time = 2022-08-23 20:17:35.45067293 +0000 UTC
|
|
Create Index = 142
|
|
Modify Index = 142
|
|
Policies = [example-acl-policy]
|
|
|
|
Roles
|
|
<none>
|
|
```
|
|
|
|
## General options
|
|
|
|
@include 'general_options_no_namespace.mdx'
|