mirror of
https://github.com/status-im/consul.git
synced 2025-01-25 21:19:12 +00:00
Breaks the operator HTTP doc into sections.
This commit is contained in:
parent
ade31f247a
commit
f8a4a873cf
@ -23,13 +23,11 @@ these capabilities are used. For a CLI to perform these operations manually, ple
|
|||||||
see the documentation for the [`consul operator`](/docs/commands/operator.html)
|
see the documentation for the [`consul operator`](/docs/commands/operator.html)
|
||||||
command.
|
command.
|
||||||
|
|
||||||
The following endpoints are supported:
|
The following types of endpoints are supported:
|
||||||
|
|
||||||
* [`/v1/operator/raft/configuration`](#raft-configuration): Inspects the Raft configuration
|
* [Autopilot](#autopilot): Automatically manage Consul servers
|
||||||
* [`/v1/operator/raft/peer`](#raft-peer): Operates on Raft peers
|
* [Keyring](#keyring): Manage gossip encryption keyring
|
||||||
* [`/v1/operator/keyring`](#keyring): Operates on gossip keyring
|
* [Raft](#raft): Manage Raft consensus subsystem
|
||||||
* [`/v1/operator/autopilot/configuration`](#autopilot-configuration): Operates on the Autopilot configuration
|
|
||||||
* [`/v1/operator/autopilot/health`](#autopilot-health): Returns the health of the servers
|
|
||||||
|
|
||||||
Not all endpoints support blocking queries and all consistency modes,
|
Not all endpoints support blocking queries and all consistency modes,
|
||||||
see details in the sections below.
|
see details in the sections below.
|
||||||
@ -37,229 +35,16 @@ see details in the sections below.
|
|||||||
The operator endpoints support the use of ACL Tokens. See the
|
The operator endpoints support the use of ACL Tokens. See the
|
||||||
[ACL](/docs/internals/acl.html#operator) internals guide for more information.
|
[ACL](/docs/internals/acl.html#operator) internals guide for more information.
|
||||||
|
|
||||||
### <a name="raft-configuration"></a> /v1/operator/raft/configuration
|
## Autopilot
|
||||||
|
|
||||||
The Raft configuration endpoint supports the `GET` method.
|
Autopilot is a set of new features added in Consul 0.8 to allow for automatic
|
||||||
|
operator-friendly management of Consul servers. Please see the
|
||||||
|
[Autopilot Guide](/docs/guides/autopilot.html) for more details.
|
||||||
|
|
||||||
#### GET Method
|
The following endpoints are supported:
|
||||||
|
|
||||||
When using the `GET` method, the request will be forwarded to the cluster
|
* [`/v1/operator/autopilot/configuration`](#autopilot-configuration): Read or update Autopilot configuration
|
||||||
leader to retrieve its latest Raft peer configuration.
|
* [`/v1/operator/autopilot/health`](#autopilot-health): Read server health as determined by Autopilot
|
||||||
|
|
||||||
If the cluster doesn't currently have a leader an error will be returned. You
|
|
||||||
can use the `?stale` query parameter to read the Raft configuration from any
|
|
||||||
of the Consul servers.
|
|
||||||
|
|
||||||
By default, the datacenter of the agent is queried; however, the `dc` can be
|
|
||||||
provided using the `?dc=` query parameter.
|
|
||||||
|
|
||||||
If ACLs are enabled, the client will need to supply an ACL Token with
|
|
||||||
[`operator`](/docs/internals/acl.html#operator) read privileges.
|
|
||||||
|
|
||||||
A JSON body is returned that looks like this:
|
|
||||||
|
|
||||||
```javascript
|
|
||||||
{
|
|
||||||
"Servers": [
|
|
||||||
{
|
|
||||||
"ID": "127.0.0.1:8300",
|
|
||||||
"Node": "alice",
|
|
||||||
"Address": "127.0.0.1:8300",
|
|
||||||
"Leader": true,
|
|
||||||
"Voter": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"ID": "127.0.0.2:8300",
|
|
||||||
"Node": "bob",
|
|
||||||
"Address": "127.0.0.2:8300",
|
|
||||||
"Leader": false,
|
|
||||||
"Voter": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"ID": "127.0.0.3:8300",
|
|
||||||
"Node": "carol",
|
|
||||||
"Address": "127.0.0.3:8300",
|
|
||||||
"Leader": false,
|
|
||||||
"Voter": true
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"Index": 22
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
The `Servers` array has information about the servers in the Raft peer
|
|
||||||
configuration:
|
|
||||||
|
|
||||||
`ID` is the ID of the server. This is the same as the `Address` in Consul 0.7
|
|
||||||
but may be upgraded to a GUID in a future version of Consul.
|
|
||||||
|
|
||||||
`Node` is the node name of the server, as known to Consul, or "(unknown)" if
|
|
||||||
the node is stale and not known.
|
|
||||||
|
|
||||||
`Address` is the IP:port for the server.
|
|
||||||
|
|
||||||
`Leader` is either "true" or "false" depending on the server's role in the
|
|
||||||
Raft configuration.
|
|
||||||
|
|
||||||
`Voter` is "true" or "false", indicating if the server has a vote in the Raft
|
|
||||||
configuration. Future versions of Consul may add support for non-voting servers.
|
|
||||||
|
|
||||||
The `Index` value is the Raft corresponding to this configuration. The latest configuration may not yet be committed if changes are in flight.
|
|
||||||
|
|
||||||
### <a name="raft-peer"></a> /v1/operator/raft/peer
|
|
||||||
|
|
||||||
The Raft peer endpoint supports the `DELETE` method.
|
|
||||||
|
|
||||||
#### DELETE Method
|
|
||||||
|
|
||||||
Using the `DELETE` method, this endpoint will remove the Consul server with
|
|
||||||
given address from the Raft configuration.
|
|
||||||
|
|
||||||
There are rare cases where a peer may be left behind in the Raft configuration
|
|
||||||
even though the server is no longer present and known to the cluster. This
|
|
||||||
endpoint can be used to remove the failed server so that it is no longer
|
|
||||||
affects the Raft quorum.
|
|
||||||
|
|
||||||
An `?address=` query parameter is required and should be set to the
|
|
||||||
`IP:port` for the server to remove. The port number is usually 8300, unless
|
|
||||||
configured otherwise. Nothing is required in the body of the request.
|
|
||||||
|
|
||||||
By default, the datacenter of the agent is targeted; however, the `dc` can be
|
|
||||||
provided using the `?dc=` query parameter.
|
|
||||||
|
|
||||||
If ACLs are enabled, the client will need to supply an ACL Token with
|
|
||||||
[`operator`](/docs/internals/acl.html#operator) write privileges.
|
|
||||||
|
|
||||||
The return code will indicate success or failure.
|
|
||||||
|
|
||||||
### <a name="keyring"></a> /v1/operator/keyring
|
|
||||||
|
|
||||||
Available in Consul 0.7.2 and later, the keyring endpoint supports the
|
|
||||||
`GET`, `POST`, `PUT` and `DELETE` methods.
|
|
||||||
|
|
||||||
This endpoint supports the use of ACL tokens using either the `X-CONSUL-TOKEN`
|
|
||||||
header or the `?token=` query parameter.
|
|
||||||
|
|
||||||
Added in Consul 0.7.4, this endpoint supports the `?relay-factor=` query parameter.
|
|
||||||
See the [Keyring Command](/docs/commands/keyring.html#_relay_factor) for more details.
|
|
||||||
|
|
||||||
#### GET Method
|
|
||||||
|
|
||||||
Using the `GET` method, this endpoint will list the gossip encryption keys
|
|
||||||
installed on both the WAN and LAN rings of every known datacenter. There is more
|
|
||||||
information on gossip encryption available
|
|
||||||
[here](/docs/agent/encryption.html#gossip-encryption).
|
|
||||||
|
|
||||||
If ACLs are enabled, the client will need to supply an ACL Token with
|
|
||||||
[`keyring`](/docs/internals/acl.html#keyring) read privileges.
|
|
||||||
|
|
||||||
A JSON body is returned that looks like this:
|
|
||||||
|
|
||||||
```javascript
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"WAN": true,
|
|
||||||
"Datacenter": "dc1",
|
|
||||||
"Keys": {
|
|
||||||
"0eK8RjnsGC/+I1fJErQsBA==": 1,
|
|
||||||
"G/3/L4yOw3e5T7NTvuRi9g==": 1,
|
|
||||||
"z90lFx3sZZLtTOkutXcwYg==": 1
|
|
||||||
},
|
|
||||||
"NumNodes": 1
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"WAN": false,
|
|
||||||
"Datacenter": "dc1",
|
|
||||||
"Keys": {
|
|
||||||
"0eK8RjnsGC/+I1fJErQsBA==": 1,
|
|
||||||
"G/3/L4yOw3e5T7NTvuRi9g==": 1,
|
|
||||||
"z90lFx3sZZLtTOkutXcwYg==": 1
|
|
||||||
},
|
|
||||||
"NumNodes": 1
|
|
||||||
}
|
|
||||||
]
|
|
||||||
```
|
|
||||||
|
|
||||||
`WAN` is true if the block refers to the WAN ring of that datacenter (rather than
|
|
||||||
LAN).
|
|
||||||
|
|
||||||
`Datacenter` is the datacenter the block refers to.
|
|
||||||
|
|
||||||
`Keys` is a map of each gossip key to the number of nodes it's currently installed
|
|
||||||
on.
|
|
||||||
|
|
||||||
`NumNodes` is the total number of nodes in the datacenter.
|
|
||||||
|
|
||||||
#### POST Method
|
|
||||||
|
|
||||||
Using the `POST` method, this endpoint will install a new gossip encryption key
|
|
||||||
into the cluster. There is more information on gossip encryption available
|
|
||||||
[here](/docs/agent/encryption.html#gossip-encryption).
|
|
||||||
|
|
||||||
The `POST` method expects a JSON request body to be submitted. The request
|
|
||||||
body must look like:
|
|
||||||
|
|
||||||
```javascript
|
|
||||||
{
|
|
||||||
"Key": "3lg9DxVfKNzI8O+IQ5Ek+Q=="
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
The `Key` field is mandatory and provides the encryption key to install into the
|
|
||||||
cluster.
|
|
||||||
|
|
||||||
If ACLs are enabled, the client will need to supply an ACL Token with
|
|
||||||
[`keyring`](/docs/internals/acl.html#keyring) write privileges.
|
|
||||||
|
|
||||||
The return code will indicate success or failure.
|
|
||||||
|
|
||||||
#### PUT Method
|
|
||||||
|
|
||||||
Using the `PUT` method, this endpoint will change the primary gossip encryption
|
|
||||||
key. The key must already be installed before this operation can succeed. There
|
|
||||||
is more information on gossip encryption available
|
|
||||||
[here](/docs/agent/encryption.html#gossip-encryption).
|
|
||||||
|
|
||||||
The `PUT` method expects a JSON request body to be submitted. The request
|
|
||||||
body must look like:
|
|
||||||
|
|
||||||
```javascript
|
|
||||||
{
|
|
||||||
"Key": "3lg9DxVfKNzI8O+IQ5Ek+Q=="
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
The `Key` field is mandatory and provides the primary encryption key to begin
|
|
||||||
using.
|
|
||||||
|
|
||||||
If ACLs are enabled, the client will need to supply an ACL Token with
|
|
||||||
[`keyring`](/docs/internals/acl.html#keyring) write privileges.
|
|
||||||
|
|
||||||
The return code will indicate success or failure.
|
|
||||||
|
|
||||||
#### DELETE Method
|
|
||||||
|
|
||||||
Using the `DELETE` method, this endpoint will remove a gossip encryption key from
|
|
||||||
the cluster. This operation may only be performed on keys which are not currently
|
|
||||||
the primary key. There is more information on gossip encryption available
|
|
||||||
[here](/docs/agent/encryption.html#gossip-encryption).
|
|
||||||
|
|
||||||
The `DELETE` method expects a JSON request body to be submitted. The request
|
|
||||||
body must look like:
|
|
||||||
|
|
||||||
```javascript
|
|
||||||
{
|
|
||||||
"Key": "3lg9DxVfKNzI8O+IQ5Ek+Q=="
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
The `Key` field is mandatory and provides the encryption key to remove from the
|
|
||||||
cluster.
|
|
||||||
|
|
||||||
If ACLs are enabled, the client will need to supply an ACL Token with
|
|
||||||
[`keyring`](/docs/internals/acl.html#keyring) write privileges.
|
|
||||||
|
|
||||||
The return code will indicate success or failure.
|
|
||||||
|
|
||||||
### <a name="autopilot-configuration"></a> /v1/operator/autopilot/configuration
|
### <a name="autopilot-configuration"></a> /v1/operator/autopilot/configuration
|
||||||
|
|
||||||
@ -422,4 +207,249 @@ The `Servers` list holds detailed health information on each server:
|
|||||||
|
|
||||||
- `Voter` is whether the server is a voting member of the Raft cluster.
|
- `Voter` is whether the server is a voting member of the Raft cluster.
|
||||||
|
|
||||||
- `StableSince` is the time this server has been in its current `Healthy` state.
|
- `StableSince` is the time this server has been in its current `Healthy` state.
|
||||||
|
|
||||||
|
## Keyring
|
||||||
|
|
||||||
|
The keyring endpoint allows management of the gossip encryption keyring. See
|
||||||
|
the [Gossip Protocol Guide](/docs/internals/gossip.html) for more details on the
|
||||||
|
gossip protocol and its use.
|
||||||
|
|
||||||
|
The following endpoint is supported:
|
||||||
|
|
||||||
|
* [`/v1/operator/keyring`](#keyring-endpoint): Operate on the gossip keyring
|
||||||
|
|
||||||
|
### <a name="keyring-endpoint"></a> /v1/operator/keyring
|
||||||
|
|
||||||
|
Available in Consul 0.7.2 and later, the keyring endpoint supports the
|
||||||
|
`GET`, `POST`, `PUT` and `DELETE` methods.
|
||||||
|
|
||||||
|
This endpoint supports the use of ACL tokens using either the `X-CONSUL-TOKEN`
|
||||||
|
header or the `?token=` query parameter.
|
||||||
|
|
||||||
|
Added in Consul 0.7.4, this endpoint supports the `?relay-factor=` query parameter.
|
||||||
|
See the [Keyring Command](/docs/commands/keyring.html#_relay_factor) for more details.
|
||||||
|
|
||||||
|
#### GET Method
|
||||||
|
|
||||||
|
Using the `GET` method, this endpoint will list the gossip encryption keys
|
||||||
|
installed on both the WAN and LAN rings of every known datacenter. There is more
|
||||||
|
information on gossip encryption available
|
||||||
|
[here](/docs/agent/encryption.html#gossip-encryption).
|
||||||
|
|
||||||
|
If ACLs are enabled, the client will need to supply an ACL Token with
|
||||||
|
[`keyring`](/docs/internals/acl.html#keyring) read privileges.
|
||||||
|
|
||||||
|
A JSON body is returned that looks like this:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"WAN": true,
|
||||||
|
"Datacenter": "dc1",
|
||||||
|
"Keys": {
|
||||||
|
"0eK8RjnsGC/+I1fJErQsBA==": 1,
|
||||||
|
"G/3/L4yOw3e5T7NTvuRi9g==": 1,
|
||||||
|
"z90lFx3sZZLtTOkutXcwYg==": 1
|
||||||
|
},
|
||||||
|
"NumNodes": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"WAN": false,
|
||||||
|
"Datacenter": "dc1",
|
||||||
|
"Keys": {
|
||||||
|
"0eK8RjnsGC/+I1fJErQsBA==": 1,
|
||||||
|
"G/3/L4yOw3e5T7NTvuRi9g==": 1,
|
||||||
|
"z90lFx3sZZLtTOkutXcwYg==": 1
|
||||||
|
},
|
||||||
|
"NumNodes": 1
|
||||||
|
}
|
||||||
|
]
|
||||||
|
```
|
||||||
|
|
||||||
|
`WAN` is true if the block refers to the WAN ring of that datacenter (rather than
|
||||||
|
LAN).
|
||||||
|
|
||||||
|
`Datacenter` is the datacenter the block refers to.
|
||||||
|
|
||||||
|
`Keys` is a map of each gossip key to the number of nodes it's currently installed
|
||||||
|
on.
|
||||||
|
|
||||||
|
`NumNodes` is the total number of nodes in the datacenter.
|
||||||
|
|
||||||
|
#### POST Method
|
||||||
|
|
||||||
|
Using the `POST` method, this endpoint will install a new gossip encryption key
|
||||||
|
into the cluster. There is more information on gossip encryption available
|
||||||
|
[here](/docs/agent/encryption.html#gossip-encryption).
|
||||||
|
|
||||||
|
The `POST` method expects a JSON request body to be submitted. The request
|
||||||
|
body must look like:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
{
|
||||||
|
"Key": "3lg9DxVfKNzI8O+IQ5Ek+Q=="
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
The `Key` field is mandatory and provides the encryption key to install into the
|
||||||
|
cluster.
|
||||||
|
|
||||||
|
If ACLs are enabled, the client will need to supply an ACL Token with
|
||||||
|
[`keyring`](/docs/internals/acl.html#keyring) write privileges.
|
||||||
|
|
||||||
|
The return code will indicate success or failure.
|
||||||
|
|
||||||
|
#### PUT Method
|
||||||
|
|
||||||
|
Using the `PUT` method, this endpoint will change the primary gossip encryption
|
||||||
|
key. The key must already be installed before this operation can succeed. There
|
||||||
|
is more information on gossip encryption available
|
||||||
|
[here](/docs/agent/encryption.html#gossip-encryption).
|
||||||
|
|
||||||
|
The `PUT` method expects a JSON request body to be submitted. The request
|
||||||
|
body must look like:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
{
|
||||||
|
"Key": "3lg9DxVfKNzI8O+IQ5Ek+Q=="
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
The `Key` field is mandatory and provides the primary encryption key to begin
|
||||||
|
using.
|
||||||
|
|
||||||
|
If ACLs are enabled, the client will need to supply an ACL Token with
|
||||||
|
[`keyring`](/docs/internals/acl.html#keyring) write privileges.
|
||||||
|
|
||||||
|
The return code will indicate success or failure.
|
||||||
|
|
||||||
|
#### DELETE Method
|
||||||
|
|
||||||
|
Using the `DELETE` method, this endpoint will remove a gossip encryption key from
|
||||||
|
the cluster. This operation may only be performed on keys which are not currently
|
||||||
|
the primary key. There is more information on gossip encryption available
|
||||||
|
[here](/docs/agent/encryption.html#gossip-encryption).
|
||||||
|
|
||||||
|
The `DELETE` method expects a JSON request body to be submitted. The request
|
||||||
|
body must look like:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
{
|
||||||
|
"Key": "3lg9DxVfKNzI8O+IQ5Ek+Q=="
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
The `Key` field is mandatory and provides the encryption key to remove from the
|
||||||
|
cluster.
|
||||||
|
|
||||||
|
If ACLs are enabled, the client will need to supply an ACL Token with
|
||||||
|
[`keyring`](/docs/internals/acl.html#keyring) write privileges.
|
||||||
|
|
||||||
|
The return code will indicate success or failure.
|
||||||
|
|
||||||
|
## Raft
|
||||||
|
|
||||||
|
The Raft endpoint provides tools for Management of Raft the consensus subsystem
|
||||||
|
and cluster quorum. See the [Consensus Protocol Guide](/docs/internals/consensus.html)
|
||||||
|
for more information about Raft consensus protocol and its use.
|
||||||
|
|
||||||
|
The following endpoints are supported:
|
||||||
|
|
||||||
|
* [`/v1/operator/raft/configuration`](#raft-configuration): Inspect the Raft configuration
|
||||||
|
* [`/v1/operator/raft/peer`](#raft-peer): Remove a server from the Raft configuration
|
||||||
|
|
||||||
|
### <a name="raft-configuration"></a> /v1/operator/raft/configuration
|
||||||
|
|
||||||
|
The Raft configuration endpoint supports the `GET` method.
|
||||||
|
|
||||||
|
#### GET Method
|
||||||
|
|
||||||
|
When using the `GET` method, the request will be forwarded to the cluster
|
||||||
|
leader to retrieve its latest Raft peer configuration.
|
||||||
|
|
||||||
|
If the cluster doesn't currently have a leader an error will be returned. You
|
||||||
|
can use the `?stale` query parameter to read the Raft configuration from any
|
||||||
|
of the Consul servers.
|
||||||
|
|
||||||
|
By default, the datacenter of the agent is queried; however, the `dc` can be
|
||||||
|
provided using the `?dc=` query parameter.
|
||||||
|
|
||||||
|
If ACLs are enabled, the client will need to supply an ACL Token with
|
||||||
|
[`operator`](/docs/internals/acl.html#operator) read privileges.
|
||||||
|
|
||||||
|
A JSON body is returned that looks like this:
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
{
|
||||||
|
"Servers": [
|
||||||
|
{
|
||||||
|
"ID": "127.0.0.1:8300",
|
||||||
|
"Node": "alice",
|
||||||
|
"Address": "127.0.0.1:8300",
|
||||||
|
"Leader": true,
|
||||||
|
"Voter": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"ID": "127.0.0.2:8300",
|
||||||
|
"Node": "bob",
|
||||||
|
"Address": "127.0.0.2:8300",
|
||||||
|
"Leader": false,
|
||||||
|
"Voter": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"ID": "127.0.0.3:8300",
|
||||||
|
"Node": "carol",
|
||||||
|
"Address": "127.0.0.3:8300",
|
||||||
|
"Leader": false,
|
||||||
|
"Voter": true
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"Index": 22
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
The `Servers` array has information about the servers in the Raft peer
|
||||||
|
configuration:
|
||||||
|
|
||||||
|
`ID` is the ID of the server. This is the same as the `Address` in Consul 0.7
|
||||||
|
but may be upgraded to a GUID in a future version of Consul.
|
||||||
|
|
||||||
|
`Node` is the node name of the server, as known to Consul, or "(unknown)" if
|
||||||
|
the node is stale and not known.
|
||||||
|
|
||||||
|
`Address` is the IP:port for the server.
|
||||||
|
|
||||||
|
`Leader` is either "true" or "false" depending on the server's role in the
|
||||||
|
Raft configuration.
|
||||||
|
|
||||||
|
`Voter` is "true" or "false", indicating if the server has a vote in the Raft
|
||||||
|
configuration. Future versions of Consul may add support for non-voting servers.
|
||||||
|
|
||||||
|
The `Index` value is the Raft corresponding to this configuration. The latest configuration may not yet be committed if changes are in flight.
|
||||||
|
|
||||||
|
### <a name="raft-peer"></a> /v1/operator/raft/peer
|
||||||
|
|
||||||
|
The Raft peer endpoint supports the `DELETE` method.
|
||||||
|
|
||||||
|
#### DELETE Method
|
||||||
|
|
||||||
|
Using the `DELETE` method, this endpoint will remove the Consul server with
|
||||||
|
given address from the Raft configuration.
|
||||||
|
|
||||||
|
There are rare cases where a peer may be left behind in the Raft configuration
|
||||||
|
even though the server is no longer present and known to the cluster. This
|
||||||
|
endpoint can be used to remove the failed server so that it is no longer
|
||||||
|
affects the Raft quorum.
|
||||||
|
|
||||||
|
An `?address=` query parameter is required and should be set to the
|
||||||
|
`IP:port` for the server to remove. The port number is usually 8300, unless
|
||||||
|
configured otherwise. Nothing is required in the body of the request.
|
||||||
|
|
||||||
|
By default, the datacenter of the agent is targeted; however, the `dc` can be
|
||||||
|
provided using the `?dc=` query parameter.
|
||||||
|
|
||||||
|
If ACLs are enabled, the client will need to supply an ACL Token with
|
||||||
|
[`operator`](/docs/internals/acl.html#operator) write privileges.
|
||||||
|
|
||||||
|
The return code will indicate success or failure.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user