From 30d27d835654105d9c1d9d0d1ba204f6cd33235e Mon Sep 17 00:00:00 2001 From: Jeff Escalante Date: Thu, 26 Jul 2018 19:30:24 -0400 Subject: [PATCH] fix a couple html errors (#4456) --- website/source/api/query.html.md | 2 +- .../source/docs/agent/cloud-auto-join.html.md | 10 +- website/source/docs/agent/options.html.md | 18 +- website/source/docs/agent/telemetry.html.md | 177 +++++++++--------- website/source/docs/compatibility.html.md | 2 +- website/source/docs/guides/autopilot.html.md | 2 +- .../docs/guides/manual-bootstrap.html.md | 2 +- website/source/docs/upgrade-specific.html.md | 3 +- 8 files changed, 107 insertions(+), 109 deletions(-) diff --git a/website/source/api/query.html.md b/website/source/api/query.html.md index bbd5469ecd..695b962075 100644 --- a/website/source/api/query.html.md +++ b/website/source/api/query.html.md @@ -103,7 +103,7 @@ populate the query before it is executed. All of the string fields inside the } } ``` - This will map all names of the form "<service>.query.consul" over DNS to a query + This will map all names of the form `.query.consul` over DNS to a query that will select an instance of the service in the agent's own network segment. Using templates, it is possible to apply prepared query behaviors to many diff --git a/website/source/docs/agent/cloud-auto-join.html.md b/website/source/docs/agent/cloud-auto-join.html.md index 22bdc36408..c91e306560 100644 --- a/website/source/docs/agent/cloud-auto-join.html.md +++ b/website/source/docs/agent/cloud-auto-join.html.md @@ -67,7 +67,7 @@ $ consul agent -retry-join "provider=aws tag_key=... tag_value=..." - `access_key_id` (optional) - the AWS access key for authentication (see below for more information about authenticating). - `secret_access_key` (optional) - the AWS secret access key for authentication (see below for more information about authenticating). -#### Authentication & Precedence +#### Authentication & Precedence - Static credentials `access_key_id=... secret_access_key=...` - Environment variables (`AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`) @@ -134,7 +134,7 @@ $ consul agent -retry-join "provider=gce project_name=... tag_value=..." - `zone_pattern` (optional) - the list of zones can be restricted through an RE2 compatible regular expression. If omitted, servers in all zones are returned. - `credentials_file` (optional) - the credentials file for authentication. See below for more information. -#### Authentication & Precedence +#### Authentication & Precedence - Use credentials from `credentials_file`, if provided. - Use JSON file from `GOOGLE_APPLICATION_CREDENTIALS` environment variable. @@ -164,7 +164,7 @@ $ consul agent -retry-join "provider=softlayer datacenter=... tag_value=... user ``` - `provider` (required) - the name of the provider ("softlayer" in this case). -- datacenter (required) - the name of the datacenter to auto-join in. +- datacenter (required) - the name of the datacenter to auto-join in. - `tag_value` (required) - the value of the tag to auto-join on. - `username` (required) - the username to use for auth. - `api_key` (required) - the api key to use for auth. @@ -284,7 +284,7 @@ $ consul agent -retry-join "provider=triton account=testaccount url=https://us-s - `tag_value` (optional) - the tag value to use. -### vSphere +### vSphere This returns the first private IP address of all servers for the given region with the given `tag_name` and `category_name`. @@ -325,4 +325,4 @@ $ consul agent -retry-join "provider=packet auth_token=token project=uuid url=.. - `project` (required) - the UUID of packet project - `auth_token` (required) - the authentication token for packet - `url` (optional) - a REST URL for packet -- `address_type` (optional) - the type of address to check for in this provider ("private_v4", "public_v4" or "public_v6". Defaults to "private_v4") \ No newline at end of file +- `address_type` (optional) - the type of address to check for in this provider ("private_v4", "public_v4" or "public_v6". Defaults to "private_v4") diff --git a/website/source/docs/agent/options.html.md b/website/source/docs/agent/options.html.md index 6cd75d605b..81459b67a0 100644 --- a/website/source/docs/agent/options.html.md +++ b/website/source/docs/agent/options.html.md @@ -691,7 +691,7 @@ Consul will not enable TLS for the HTTP API unless the `https` port has been ass * `ca_provider` Controls which CA provider to use for Connect's CA. Currently only the `consul` and `vault` providers - are supported. This is only used when initially bootstrapping the cluster. For an existing + are supported. This is only used when initially bootstrapping the cluster. For an existing cluster, use the [Update CA Configuration Endpoint](/api/connect/ca.html#update-ca-configuration). * `ca_config` An object which @@ -711,7 +711,7 @@ Consul will not enable TLS for the HTTP API unless the `https` port has been ass #### Vault CA Provider (`ca_provider = "vault"`) - * `address` The address of the Vault + * `address` The address of the Vault server to connect to. * `token` The Vault token to use. @@ -722,10 +722,10 @@ Consul will not enable TLS for the HTTP API unless the `https` port has been ass The Vault token given above must have `sudo` access to this backend, as well as permission to mount the backend at this path if it is not already mounted. - * `intermediate_pki_path` + * `intermediate_pki_path` The path to use for the temporary intermediate CA pki backend in Vault. *Connect will overwrite any data - at this path in order to generate a temporary intermediate CA*. The Vault token given above must have - `write` access to this backend, as well as permission to mount the backend at this path if it is not + at this path in order to generate a temporary intermediate CA*. The Vault token given above must have + `write` access to this backend, as well as permission to mount the backend at this path if it is not already mounted. #### Common CA Config Options @@ -870,7 +870,7 @@ Consul will not enable TLS for the HTTP API unless the `https` port has been ass [RFC 6724](https://tools.ietf.org/html/rfc6724) and as a result it should be increasingly uncommon to need to change this value with modern resolvers). - + * `enable_additional_node_meta_txt` - When set to true, Consul will add TXT records for Node metadata into the Additional section of the DNS responses for several query types such as SRV queries. When set to false those records are not emitted. This does not impact the behavior of those @@ -1257,10 +1257,10 @@ Consul will not enable TLS for the HTTP API unless the `https` port has been ass * `circonus_check_search_tag` A special tag which, when coupled with the instance id, helps to narrow down the search results when neither a Submission URL or Check ID is provided. By default, this is set to service:application name (e.g. "service:consul"). - * `circonus_check_display_name` + * `circonus_check_display_name` Specifies a name to give a check when it is created. This name is displayed in the Circonus UI Checks list. Available in Consul 0.7.2 and later. - * `circonus_check_tags` + * `circonus_check_tags` Comma separated list of additional tags to add to a check when it is created. Available in Consul 0.7.2 and later. * `circonus_broker_id` @@ -1352,7 +1352,7 @@ Consul will not enable TLS for the HTTP API unless the `https` port has been ass `tls_prefer_server_cipher_suites` Added in Consul 0.8.2, this will cause Consul to prefer the server's ciphersuite over the client ciphersuites. -* `translate_wan_addrs` If +* `translate_wan_addrs` If set to true, Consul will prefer a node's configured WAN address when servicing DNS and HTTP requests for a node in a remote datacenter. This allows the node to be reached within its own datacenter using its local address, and reached from other datacenters diff --git a/website/source/docs/agent/telemetry.html.md b/website/source/docs/agent/telemetry.html.md index 04d257af44..404ef006e7 100644 --- a/website/source/docs/agent/telemetry.html.md +++ b/website/source/docs/agent/telemetry.html.md @@ -373,14 +373,12 @@ These metrics are used to monitor the health of the Consul servers. ms timer - `consul.raft.fsm.apply` This metric gives the number of logs committed since the last interval. commit logs / interval counter - `consul.raft.fsm.restore` This metric measures the time taken by the FSM to restore its state from a snapshot. @@ -449,17 +447,17 @@ These metrics are used to monitor the health of the Consul servers. counter - `consul.raft.verify_leader` - This metric counts the number of times an agent checks whether it is still the leader or not - checks / interval - Counter + `consul.raft.verify_leader` + This metric counts the number of times an agent checks whether it is still the leader or not + checks / interval + Counter - `consul.raft.restore` - This metric counts the number of times the restore operation has been performed by the agent. Here, restore refers to the action of raft consuming an external snapshot to restore its state. - operation invoked / interval - counter - + `consul.raft.restore` + This metric counts the number of times the restore operation has been performed by the agent. Here, restore refers to the action of raft consuming an external snapshot to restore its state. + operation invoked / interval + counter + `consul.raft.commitTime` This measures the time it takes to commit a new entry to the Raft log on the leader. @@ -479,70 +477,70 @@ These metrics are used to monitor the health of the Consul servers. timer - `consul.raft.state.follower` - This metric counts the number of times an agent has entered the follower mode. This happens when a new agent joins the cluster or after the end of a leader election. - follower state entered / interval - counter + `consul.raft.state.follower` + This metric counts the number of times an agent has entered the follower mode. This happens when a new agent joins the cluster or after the end of a leader election. + follower state entered / interval + counter - `consul.raft.transistion.heartbeat_timeout` - This metric gives the number of times an agent has transitioned to the Candidate state, after receive no heartbeat messages from the last known leader. - timeouts / interval - counter + `consul.raft.transistion.heartbeat_timeout` + This metric gives the number of times an agent has transitioned to the Candidate state, after receive no heartbeat messages from the last known leader. + timeouts / interval + counter - `consul.raft.restoreUserSnapshot` - This metric measures the time taken by the agent to restore the FSM state from a user's snapshot - ms - timer + `consul.raft.restoreUserSnapshot` + This metric measures the time taken by the agent to restore the FSM state from a user's snapshot + ms + timer - `consul.raft.rpc.processHeartBeat` - This metric measures the time taken to process a heartbeat request. - ms - timer + `consul.raft.rpc.processHeartBeat` + This metric measures the time taken to process a heartbeat request. + ms + timer - `consul.raft.rpc.appendEntries` - This metric measures the time taken to process an append entries RPC call from an agent. - ms - timer + `consul.raft.rpc.appendEntries` + This metric measures the time taken to process an append entries RPC call from an agent. + ms + timer - `consul.raft.rpc.appendEntries.storeLogs` - This metric measures the time taken to add any outstanding logs for an agent, since the last appendEntries was invoked - ms - timer + `consul.raft.rpc.appendEntries.storeLogs` + This metric measures the time taken to add any outstanding logs for an agent, since the last appendEntries was invoked + ms + timer - `consul.raft.rpc.appendEntries.processLogs` - This metric measures the time taken to process the outstanding log entries of an agent. - ms - timer + `consul.raft.rpc.appendEntries.processLogs` + This metric measures the time taken to process the outstanding log entries of an agent. + ms + timer - - `consul.raft.rpc.requestVote` - This metric measures the time taken to process the request vote RPC call. - ms - timer + `consul.raft.rpc.requestVote` + This metric measures the time taken to process the request vote RPC call. + ms + timer - `consul.raft.rpc.installSnapshot` - This metric measures the time taken to process the installSnapshot RPC call. This metric should only be seen on agents which are currently in the follower state. - ms - timer - - `consul.raft.replication.appendEntries.rpc` - This metric measures the time taken by the append entries RFC, to replicate the log entries of a leader agent onto its follower agent(s) - ms - timer + `consul.raft.rpc.installSnapshot` + This metric measures the time taken to process the installSnapshot RPC call. This metric should only be seen on agents which are currently in the follower state. + ms + timer - `consul.raft.replication.appendEntries.logs` - This metric measures the number of logs replicated to an agent, to bring it upto speed with the leader's logs. - logs appended/ interval - counter + `consul.raft.replication.appendEntries.rpc` + This metric measures the time taken by the append entries RFC, to replicate the log entries of a leader agent onto its follower agent(s) + ms + timer + + + `consul.raft.replication.appendEntries.logs` + This metric measures the number of logs replicated to an agent, to bring it upto speed with the leader's logs. + logs appended/ interval + counter `consul.raft.leader.lastContact` @@ -784,6 +782,7 @@ These metrics are used to monitor the health of the Consul servers. ms timer + `consul.txn.read` This measures the time spent returning a read transaction. ms @@ -803,28 +802,28 @@ These metrics give insight into the health of the cluster as a whole. Type - `consul.memberlist.degraded.probe` - This metric counts the number of times the agent has performed failure detection on an other agent at a slower probe rate. The agent uses its own health metric as an indicator to perform this action. (If its health score is low, means that the node is healthy, and vice versa.) - probes / interval - counter + `consul.memberlist.degraded.probe` + This metric counts the number of times the agent has performed failure detection on an other agent at a slower probe rate. The agent uses its own health metric as an indicator to perform this action. (If its health score is low, means that the node is healthy, and vice versa.) + probes / interval + counter - `consul.memberlist.degraded.timeout` - This metric counts the number of times an agent was marked as a dead node, whilst not getting enough confirmations from a randomly selected list of agent nodes in an agent's membership. - occurrence / interval - counter + `consul.memberlist.degraded.timeout` + This metric counts the number of times an agent was marked as a dead node, whilst not getting enough confirmations from a randomly selected list of agent nodes in an agent's membership. + occurrence / interval + counter - `consul.memberlist.msg.dead` - This metric counts the number of times an agent has marked another agent to be a dead node. - messages / interval - counter + `consul.memberlist.msg.dead` + This metric counts the number of times an agent has marked another agent to be a dead node. + messages / interval + counter - `consul.memberlist.health.score` - This metric describes a node's perception of its own health based on how well it is meeting the soft real-time requirements of the protocol. This metric ranges from 0 to 8, where 0 indicates "totally healthy". This health score is used to scale the time between outgoing probes, and higher scores translate into longer probing intervals. For more details see section IV of the Lifeguard paper: https://arxiv.org/pdf/1707.00788.pdf - score - gauge + `consul.memberlist.health.score` + This metric describes a node's perception of its own health based on how well it is meeting the soft real-time requirements of the protocol. This metric ranges from 0 to 8, where 0 indicates "totally healthy". This health score is used to scale the time between outgoing probes, and higher scores translate into longer probing intervals. For more details see section IV of the Lifeguard paper: https://arxiv.org/pdf/1707.00788.pdf + score + gauge `consul.memberlist.msg.suspect` @@ -833,28 +832,28 @@ These metrics give insight into the health of the cluster as a whole. counter - `consul.memberlist.tcp.accept` - This metric counts the number of times an agent has accepted an incoming TCP stream connection. - connections accepted / interval - counter + `consul.memberlist.tcp.accept` + This metric counts the number of times an agent has accepted an incoming TCP stream connection. + connections accepted / interval + counter - `consul.memberlist.udp.sent/received` - This metric measures the total number of bytes sent/received by an agent through the UDP protocol. - bytes sent or bytes received / interval - counter + `consul.memberlist.udp.sent/received` + This metric measures the total number of bytes sent/received by an agent through the UDP protocol. + bytes sent or bytes received / interval + counter - `consul.memberlist.tcp.connect` - This metric counts the number of times an agent has initiated a push/pull sync with an other agent. - push/pull initiated / interval - counter + `consul.memberlist.tcp.connect` + This metric counts the number of times an agent has initiated a push/pull sync with an other agent. + push/pull initiated / interval + counter - `consul.memberlist.tcp.sent` - This metric measures the total number of bytes sent by an agent through the TCP protocol - bytes sent / interval - counter + `consul.memberlist.tcp.sent` + This metric measures the total number of bytes sent by an agent through the TCP protocol + bytes sent / interval + counter `consul.memberlist.gossip` diff --git a/website/source/docs/compatibility.html.md b/website/source/docs/compatibility.html.md index e6a752392e..3d871c5658 100644 --- a/website/source/docs/compatibility.html.md +++ b/website/source/docs/compatibility.html.md @@ -39,6 +39,7 @@ For more details on the specifics of upgrading, see the [upgrading page](/docs/u 0.1 - 0.3 1 + 0.4 1, 2 @@ -57,4 +58,3 @@ For more details on the specifics of upgrading, see the [upgrading page](/docs/u -> **Note:** Raft Protocol is versioned separately, but maintains compatibility with at least one prior version. See [here](https://www.consul.io/docs/upgrade-specific.html#raft-protocol-version-compatibility) for details. - diff --git a/website/source/docs/guides/autopilot.html.md b/website/source/docs/guides/autopilot.html.md index 41f79fd831..5f42d564cd 100644 --- a/website/source/docs/guides/autopilot.html.md +++ b/website/source/docs/guides/autopilot.html.md @@ -85,7 +85,7 @@ with the `-cleanup-dead-servers=false` option. ## Server Health Checking An internal health check runs on the leader to track the stability of servers. -
A server is considered healthy if all of the following conditions are true: +
A server is considered healthy if all of the following conditions are true: - It has a SerfHealth status of 'Alive' - The time since its last contact with the current leader is below diff --git a/website/source/docs/guides/manual-bootstrap.html.md b/website/source/docs/guides/manual-bootstrap.html.md index 6d4b9ecbfc..97876f7835 100644 --- a/website/source/docs/guides/manual-bootstrap.html.md +++ b/website/source/docs/guides/manual-bootstrap.html.md @@ -38,7 +38,7 @@ options, but it is recommended to have 3 or 5 total servers per datacenter. A single server deployment is _**highly**_ discouraged as data loss is inevitable in a failure scenario. We start the next servers **without** specifying `-bootstrap`. This is critical, since only one server should ever be running in -bootstrap mode*. Once `Node B` and `Node C` are started, you should see a +bootstrap mode. Once `Node B` and `Node C` are started, you should see a message to the effect of: ```text diff --git a/website/source/docs/upgrade-specific.html.md b/website/source/docs/upgrade-specific.html.md index 508c5c563d..90aad85133 100644 --- a/website/source/docs/upgrade-specific.html.md +++ b/website/source/docs/upgrade-specific.html.md @@ -67,7 +67,7 @@ As part of supporting the [HCL](https://github.com/hashicorp/hcl#syntax) format #### Deprecated Options Have Been Removed -All of Consul's previously deprecated command line flags and config options have been removed, so these will need to be mapped to their equivalents before upgrading. Here's the complete list of removed options and their equivalents: +All of Consul's previously deprecated command line flags and config options have been removed, so these will need to be mapped to their equivalents before upgrading. Here's the complete list of removed options and their equivalents: | Removed Option | Equivalent | | -------------- | ---------- | @@ -585,4 +585,3 @@ fails for some reason, it is not fatal. The older version of the server will simply panic and stop. At that point, you can upgrade to the new version and restart the agent. There will be no data loss and the cluster will resume operations. -