- `consul.acl.blocked.<check|node|service>.registration` |
+ `consul.acl.blocked..registration` |
This increments whenever a registration fails for an entity (check, node or service) is blocked by an ACL |
requests |
counter |
diff --git a/website/source/docs/agent/watches.html.md b/website/source/docs/agent/watches.html.md
index 2cc02cfe64..6fd9795fae 100644
--- a/website/source/docs/agent/watches.html.md
+++ b/website/source/docs/agent/watches.html.md
@@ -165,7 +165,7 @@ Here is an example configuration:
{
"type": "keyprefix",
"prefix": "foo/",
- "args": ["/usr/bin/my-service-handler.sh", "-redis"]
+ "args": ["/usr/bin/my-prefix-handler.sh", "-redis"]
}
```
@@ -384,7 +384,7 @@ events. These are fired using the [consul event](/docs/commands/event.html) comm
It takes only a single optional "name" parameter which restricts
the watch to only events with the given name.
-This maps to the `v1/event/list` API internally.
+This maps to the `/v1/event/list` API internally.
Here is an example configuration:
@@ -392,13 +392,13 @@ Here is an example configuration:
{
"type": "event",
"name": "web-deploy",
- "args": ["/usr/bin/my-service-handler.sh", "-web-deploy"]
+ "args": ["/usr/bin/my-event-handler.sh", "-web-deploy"]
}
```
Or, using the watch command:
- $ consul watch -type=event -name=web-deploy /usr/bin/my-deploy-handler.sh -web-deploy
+ $ consul watch -type=event -name=web-deploy /usr/bin/my-event-handler.sh -web-deploy
An example of the output of this command:
diff --git a/website/source/docs/connect/connect-internals.html.md b/website/source/docs/connect/connect-internals.html.md
index 846f394766..ff2f4c03e1 100644
--- a/website/source/docs/connect/connect-internals.html.md
+++ b/website/source/docs/connect/connect-internals.html.md
@@ -96,7 +96,7 @@ in multiple datacenters (such as the [geo failover](https://learn.hashicorp.com/
[Intentions](/docs/connect/intentions.html) verify connections between services by
source and destination name seamlessly across datacenters.
-Connections can be made via gateways to enable when communciating across
+Connections can be made via gateways to enable when communicating across
network topologies allowing connections between services in each datacenter
without externally routable IPs at the service level.
diff --git a/website/source/docs/connect/registration/service-registration.html.md b/website/source/docs/connect/registration/service-registration.html.md
index b000bf3601..279f1a8ba8 100644
--- a/website/source/docs/connect/registration/service-registration.html.md
+++ b/website/source/docs/connect/registration/service-registration.html.md
@@ -210,7 +210,7 @@ registrations](/docs/agent/services.html#service-definition-parameter-case).
}
```
-#### Direct to a Remote/Ingress in a Remote Dataceter
+#### Direct to a Remote/Ingress in a Remote Datacenter
```json
{
"mode": "remote"
diff --git a/website/source/docs/platform/k8s/index.html.md b/website/source/docs/platform/k8s/index.html.md
index 942b8df4e0..740e1d499c 100644
--- a/website/source/docs/platform/k8s/index.html.md
+++ b/website/source/docs/platform/k8s/index.html.md
@@ -61,7 +61,7 @@ There are several ways to try Consul with Kubernetes in different environments.
https://learn.hashicorp.com/consul/day-1-operations/kubernetes-reference?utm_source=consul.io&utm_medium=docs) guide provides recommended practices for production.
- The [Consul and Kubernetes Deployment](
- https://learn.hashicorp.com/consul/day-1-operations/kubernetes-deployment-guide?utm_source=consul.io&utm_medium=docs) guide covers the necssary steps to install and configure a new Consul cluster on Kubernetes in production.
+ https://learn.hashicorp.com/consul/day-1-operations/kubernetes-deployment-guide?utm_source=consul.io&utm_medium=docs) guide covers the necessary steps to install and configure a new Consul cluster on Kubernetes in production.
## "consul-k8s" Project
diff --git a/website/source/docs/platform/k8s/service-sync.html.md b/website/source/docs/platform/k8s/service-sync.html.md
index 0f2ce91ac1..b211b6eafd 100644
--- a/website/source/docs/platform/k8s/service-sync.html.md
+++ b/website/source/docs/platform/k8s/service-sync.html.md
@@ -255,7 +255,7 @@ metadata:
## Consul to Kubernetes
This syncs Consul services into first-class Kubernetes services.
-The sync service will creat an [`ExternalName`](https://kubernetes.io/docs/concepts/services-networking/service/#externalname)
+The sync service will create an [`ExternalName`](https://kubernetes.io/docs/concepts/services-networking/service/#externalname)
`Service` for each Consul service. The "external name" will be
the Consul DNS name.