`consul.http..` |
- This tracks how long it takes to service the given HTTP request for the given verb and path. Note that paths do not include details like service or key names, for these an underscore will be present as a placeholder (eg. `consul.http.GET.v1.kv._`) |
+ This tracks how long it takes to service the given HTTP request for the given verb and path. Paths do not include details like service or key names, for these an underscore will be present as a placeholder (eg. `consul.http.GET.v1.kv._`) |
ms |
timer |
diff --git a/website/source/docs/commands/event.html.markdown b/website/source/docs/commands/event.html.markdown
index a3d5b5b93c..51a3831eeb 100644
--- a/website/source/docs/commands/event.html.markdown
+++ b/website/source/docs/commands/event.html.markdown
@@ -17,6 +17,7 @@ or perform any other orchestration action. Events can be handled by
[using a watch](/docs/agent/watches.html).
Under the hood, events are propagated using the [gossip protocol](/docs/internals/gossip.html).
+
While the details are not important for using events, an understanding of
the semantics is useful. The gossip layer will make a best-effort to deliver
the event, but there is **no guaranteed delivery**. Unlike most Consul data, which is
@@ -42,7 +43,7 @@ The list of available flags are:
* `-http-addr` - Address to the HTTP server of the agent you want to contact
to send this command. If this isn't specified, the command will contact
- "127.0.0.1:8500" which is the default HTTP address of a Consul agent.
+ `127.0.0.1:8500` which is the default HTTP address of a Consul agent.
* `-datacenter` - Datacenter to query. Defaults to that of agent.
@@ -54,7 +55,7 @@ The list of available flags are:
* `-tag` - Regular expression to filter to only nodes with a service that has
a matching tag. This must be used with `-service`. As an example, you may
- do "-service mysql -tag slave".
+ do `-service mysql -tag secondary`.
* `-token` - The ACL token to use when firing the event. This token must have
write-level privileges for the event specified. Defaults to that of the agent.
diff --git a/website/source/docs/commands/exec.html.markdown b/website/source/docs/commands/exec.html.markdown
index b9d1c26381..89ba0d62e0 100644
--- a/website/source/docs/commands/exec.html.markdown
+++ b/website/source/docs/commands/exec.html.markdown
@@ -34,20 +34,20 @@ could make the cluster unavailable.
Usage: `consul exec [options] [-|command...]`
The only required option is a command to execute. This is either given
-as trailing arguments, or by specifying '-'; stdin will be read to
+as trailing arguments, or by specifying `-`; STDIN will be read to
completion as a script to evaluate.
The list of available flags are:
* `-http-addr` - Address to the HTTP server of the agent you want to contact
to send this command. If this isn't specified, the command will contact
- "127.0.0.1:8500" which is the default HTTP address of a Consul agent.
+ `127.0.0.1:8500` which is the default HTTP address of a Consul agent.
* `-datacenter` - Datacenter to query. Defaults to that of agent. In version
0.4, that is the only supported value.
* `-prefix` - Key prefix in the KV store to use for storing request data.
- Defaults to "_rexec".
+ Defaults to `_rexec`.
* `-node` - Regular expression to filter nodes which should evaluate the event.
@@ -55,7 +55,7 @@ The list of available flags are:
* `-tag` - Regular expression to filter to only nodes with a service that has
a matching tag. This must be used with `-service`. As an example, you may
- do "-service mysql -tag slave".
+ do `-service mysql -tag secondary`.
* `-wait` - Specifies the period of time in which no agent's respond before considering
the job finished. This is basically the quiescent time required to assume completion.
@@ -64,10 +64,10 @@ The list of available flags are:
* `-wait-repl` - Period to wait after writing the job specification for replication.
This is a heuristic value and enables agents to do a stale read of the job. Defaults
- to 200msec.
+ to 200 msec.
* `-verbose` - Enables verbose output.
* `-token` - The ACL token to use during requests. This token must have access
- to the prefix in the KV store as well as exec "write" access for the _rexec
+ to the prefix in the KV store as well as exec "write" access for the `_rexec`
event. Defaults to that of the agent.
diff --git a/website/source/docs/commands/force-leave.html.markdown b/website/source/docs/commands/force-leave.html.markdown
index 165bae82fa..2c07c233c2 100644
--- a/website/source/docs/commands/force-leave.html.markdown
+++ b/website/source/docs/commands/force-leave.html.markdown
@@ -3,7 +3,7 @@ layout: "docs"
page_title: "Commands: Force Leave"
sidebar_current: "docs-commands-forceleave"
description: |-
- The `force-leave` command forces a member of a Consul cluster to enter the left state. Note that if the member is still actually alive, it will eventually rejoin the cluster. The true purpose of this method is to force remove failed nodes.
+ The `force-leave` command forces a member of a Consul cluster to enter the left state. If the member is still actually alive, it will eventually rejoin the cluster. The true purpose of this method is to force remove failed nodes.
---
# Consul Force Leave
@@ -11,7 +11,7 @@ description: |-
Command: `consul force-leave`
The `force-leave` command forces a member of a Consul cluster to enter the
-"left" state. Note that if the member is still actually alive, it will
+"left" state. If the member is still actually alive, it will
eventually rejoin the cluster. The true purpose of this method is to force
remove "failed" nodes.
@@ -33,6 +33,6 @@ Every option is optional:
* `-rpc-addr` - Address to the RPC server of the agent you want to contact
to send this command. If this isn't specified, the command checks the
- CONSUL_RPC_ADDR env variable. If this isn't set, the default RPC
- address will be set to "127.0.0.1:8400".
+ `CONSUL_RPC_ADDR` env variable. If this isn't set, the default RPC
+ address will be set to `127.0.0.1:8400`.
diff --git a/website/source/docs/commands/kv/put.html.markdown.erb b/website/source/docs/commands/kv/put.html.markdown.erb
index eaf4c3f24c..2a7858c10c 100644
--- a/website/source/docs/commands/kv/put.html.markdown.erb
+++ b/website/source/docs/commands/kv/put.html.markdown.erb
@@ -110,7 +110,7 @@ $ consul kv put -flags=42 redis/config/password s3cr3t
Success! Data written to: redis/config/password
```
-To create or tune a lock, use the `-acquire` and `-session` flags. Note that the session must already exist (this command will not create it or manage it):
+To create or tune a lock, use the `-acquire` and `-session` flags. The session must already exist (this command will not create it or manage it):
```
$ consul kv put -acquire -session=abc123 redis/lock/update
diff --git a/website/source/docs/commands/rtt.html.markdown b/website/source/docs/commands/rtt.html.markdown
index fc5425cfec..19441ac652 100644
--- a/website/source/docs/commands/rtt.html.markdown
+++ b/website/source/docs/commands/rtt.html.markdown
@@ -21,8 +21,8 @@ for more information on how these coordinates are computed.
Usage: `consul rtt [options] node1 [node2]`
At least one node name is required. If the second node name isn't given, it
-is set to the agent's node name. Note that these are node names as known to
-Consul as `consul members` would show, not IP addresses.
+is set to the agent's node name. These are the node names as known to
+Consul as the `consul members` command would show, not IP addresses.
The list of available flags are:
diff --git a/website/source/docs/compatibility.html.markdown b/website/source/docs/compatibility.html.markdown
index 6c67ff5931..a06dd3a465 100644
--- a/website/source/docs/compatibility.html.markdown
+++ b/website/source/docs/compatibility.html.markdown
@@ -18,8 +18,9 @@ compatible with _at least_ one prior version. Concretely: version 0.5 can
speak to 0.4 (and vice versa) but may not be able to speak to 0.1.
Backwards compatibility is automatic unless otherwise noted. Consul agents by
-default will speak the latest protocol but can understand earlier ones. Note:
-if speaking an earlier protocol, _new features may not be available_.
+default will speak the latest protocol but can understand earlier ones.
+
+-> **Note:** If speaking an earlier protocol, _new features may not be available_.
The ability for an agent to speak an earlier protocol is to ensure that any agent
can be upgraded without cluster disruption. Consul agents can be updated one
diff --git a/website/source/docs/guides/bootstrapping.html.markdown b/website/source/docs/guides/bootstrapping.html.markdown
index 93e79c4d26..94ffc31277 100644
--- a/website/source/docs/guides/bootstrapping.html.markdown
+++ b/website/source/docs/guides/bootstrapping.html.markdown
@@ -70,19 +70,22 @@ Since a join operation is symmetric, it does not matter which node initiates it.
[INFO] consul: cluster leadership acquired
```
-As a sanity check, the [`consul info`](/docs/commands/info.html) command is a useful tool. It can be used to
-verify `raft.num_peers` is now 2, and you can view the latest log index under `raft.last_log_index`.
-When running [`consul info`](/docs/commands/info.html) on the followers, you should see `raft.last_log_index`
-converge to the same value once the leader begins replication. That value represents the last
-log entry that has been stored on disk.
+As a sanity check, the [`consul info`](/docs/commands/info.html) command
+is a useful tool. It can be used to verify `raft.num_peers` is now 2,
+and you can view the latest log index under `raft.last_log_index`. When
+running [`consul info`](/docs/commands/info.html) on the followers, you
+should see `raft.last_log_index` converge to the same value once the
+leader begins replication. That value represents the last log entry that
+has been stored on disk.
-Now that the servers are all started and replicating to each other, all the remaining
-clients can be joined. Clients are much easier as they can join against any existing node.
-All nodes participate in a gossip protocol to perform basic discovery, so once joined to any
-member of the cluster, new clients will automatically find the servers and register themselves.
+Now that the servers are all started and replicating to each other, all
+the remaining clients can be joined. Clients are much easier as they can
+join against any existing node. All nodes participate in a gossip
+protocol to perform basic discovery, so once joined to any member of the
+cluster, new clients will automatically find the servers and register
+themselves.
-Note: it is not strictly necessary to start the server nodes before the clients; however, most
-operations will fail until the servers are available.
+-> **Note:** It is not strictly necessary to start the server nodes before the clients; however, most operations will fail until the servers are available.
## Manual Bootstrapping
diff --git a/website/source/docs/guides/forwarding.html.markdown b/website/source/docs/guides/forwarding.html.markdown
index 88e7dc7eae..7785853858 100644
--- a/website/source/docs/guides/forwarding.html.markdown
+++ b/website/source/docs/guides/forwarding.html.markdown
@@ -8,26 +8,29 @@ description: |-
# Forwarding DNS
-By default, DNS is served from port 53. On most operating systems, this
+By default, DNS is served from port 53. On most operating systems, this
requires elevated privileges. Instead of running Consul with an administrative
or root account, it is possible to instead forward appropriate queries to Consul,
running on an unprivileged port, from another DNS server or port redirect.
-In this guide, we will demonstrate forwarding from [BIND](https://www.isc.org/downloads/bind/)
-as well as [dnsmasq](http://www.thekelleys.org.uk/dnsmasq/doc.html) and [iptables](http://www.netfilter.org/).
-For the sake of simplicity, BIND and Consul are running on the same machine in this example. For iptables the
-rules must be set on the same host as the Consul instance and relay hosts should not be on the same host or
-the redirects will intercept the traffic.
+In this guide, we will demonstrate forwarding from
+[BIND](https://www.isc.org/downloads/bind/) as well as
+[dnsmasq](http://www.thekelleys.org.uk/dnsmasq/doc.html) and
+[iptables](http://www.netfilter.org/). For the sake of simplicity, BIND
+and Consul are running on the same machine in this example. For iptables
+the rules must be set on the same host as the Consul instance and relay
+hosts should not be on the same host or the redirects will intercept the
+traffic.
It is worth mentioning that, by default, Consul does not resolve DNS
records outside the `.consul.` zone unless the
[recursors](/docs/agent/options.html#recursors) configuration option
-has been set. As an example of how this changes Consul's behavior,
+has been set. As an example of how this changes Consul's behavior,
suppose a Consul DNS reply includes a CNAME record pointing outside
the `.consul` TLD. The DNS reply will only include CNAME records by
default. By contrast, when `recursors` is set and the upstream resolver is
functioning correctly, Consul will try to resolve CNAMEs and include
-any records (e.g. A, AAAA, PTR) for them in its DNS reply.
+any records (e.g. A, AAAA, PTR) for them in its DNS reply.
You can either do one of the following:
@@ -61,7 +64,7 @@ include "/etc/named/consul.conf";
### Zone File
-Then we set up a zone for our Consul managed records in consul.conf:
+Then we set up a zone for our Consul managed records in `consul.conf`:
```text
zone "consul" IN {
@@ -129,15 +132,20 @@ for additional details):
### iptables Setup
-On Linux systems that support it, incoming requests and requests to localhost can use `iptables`
-to forward ports on the same machine without a secondary service. Since Consul, by default, only
-resolves the `.consul` TDL, it is especially important to use the `recursors` option if you wish the
-`iptables` setup to resolve for other domains. The recursors should not include the localhost as the
-redirects would just intercept the requests. The iptables method is suited for situations where an
-external DNS service is already running in your infrastructure and is used as the recursor or if you want
-to use an existing DNS server as your query endpoint and forward requests for the consul domain to the
-consul server. In both of those cases you may want to query the consul server but not need the overhead
-of a separate service on the consul host.
+On Linux systems that support it, incoming requests and requests to
+the local host can use `iptables` to forward ports on the same machine
+without a secondary service. Since Consul, by default, only resolves
+the `.consul` TDL, it is especially important to use the `recursors`
+option if you wish the `iptables` setup to resolve for other domains.
+The recursors should not include the local host as the redirects would
+just intercept the requests.
+
+The iptables method is suited for situations where an external DNS
+service is already running in your infrastructure and is used as the
+recursor or if you want to use an existing DNS server as your query
+endpoint and forward requests for the consul domain to the Consul
+server. In both of those cases you may want to query the Consul server
+but not need the overhead of a separate service on the Consul host.
```
[root@localhost ~]# iptables -t nat -A PREROUTING -p udp -m udp --dport 53 -j REDIRECT --to-ports 8600
@@ -151,9 +159,9 @@ of a separate service on the consul host.
First, perform a DNS query against Consul directly to be sure that the record exists:
```text
-[root@localhost ~]# dig @localhost -p 8600 master.redis.service.dc-1.consul. A
+[root@localhost ~]# dig @localhost -p 8600 primary.redis.service.dc-1.consul. A
-; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.32.amzn1 <<>> @localhost master.redis.service.dc-1.consul. A
+; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.32.amzn1 <<>> @localhost primary.redis.service.dc-1.consul. A
; (1 server found)
;; global options: +cmd
;; Got answer:
@@ -161,10 +169,10 @@ First, perform a DNS query against Consul directly to be sure that the record ex
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
-;master.redis.service.dc-1.consul. IN A
+;primary.redis.service.dc-1.consul. IN A
;; ANSWER SECTION:
-master.redis.service.dc-1.consul. 0 IN A 172.31.3.234
+primary.redis.service.dc-1.consul. 0 IN A 172.31.3.234
;; Query time: 4 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
@@ -176,9 +184,9 @@ Then run the same query against your BIND instance and make sure you get a
valid result:
```text
-[root@localhost ~]# dig @localhost -p 53 master.redis.service.dc-1.consul. A
+[root@localhost ~]# dig @localhost -p 53 primary.redis.service.dc-1.consul. A
-; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.32.amzn1 <<>> @localhost master.redis.service.dc-1.consul. A
+; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.23.rc1.32.amzn1 <<>> @localhost primary.redis.service.dc-1.consul. A
; (1 server found)
;; global options: +cmd
;; Got answer:
@@ -186,10 +194,10 @@ valid result:
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
-;master.redis.service.dc-1.consul. IN A
+;primary.redis.service.dc-1.consul. IN A
;; ANSWER SECTION:
-master.redis.service.dc-1.consul. 0 IN A 172.31.3.234
+primary.redis.service.dc-1.consul. 0 IN A 172.31.3.234
;; Query time: 4 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
diff --git a/website/source/docs/guides/leader-election.html.markdown b/website/source/docs/guides/leader-election.html.markdown
index 48adf97926..1a97a627a7 100644
--- a/website/source/docs/guides/leader-election.html.markdown
+++ b/website/source/docs/guides/leader-election.html.markdown
@@ -17,8 +17,7 @@ cover all the possible methods. Instead, we will focus on using Consul's support
[sessions](/docs/internals/sessions.html). Sessions allow us to build a system that
can gracefully handle failures.
-Note that JSON output in this guide has been pretty-printed for easier
-reading. Actual values returned from the API will not be formatted.
+-> **Note:** JSON output in this guide has been pretty-printed for easier reading. Actual values returned from the API will not be formatted.
## Contending Nodes
@@ -50,7 +49,7 @@ This will return a JSON object containing the session ID:
The next step is to acquire a session for a given key from this node
using the PUT method on a [KV entry](/docs/agent/http/kv.html) with the
-"?acquire=\