mirror of https://github.com/status-im/consul.git
docs: Document datacenter limitations for admin partitions (#11425)
This commit is contained in:
parent
fa293362be
commit
ff6a33511e
|
@ -61,7 +61,7 @@ Usage: consul admin-partition <subcommand> [options] [args]
|
|||
|
||||
## Subcommands
|
||||
|
||||
You can issue the folloing subcommands with the `consul admin-partition` command.
|
||||
You can issue the following subcommands with the `consul admin-partition` command.
|
||||
|
||||
### `create`
|
||||
|
||||
|
@ -216,11 +216,11 @@ consul admin-partition delete webdev
|
|||
|
||||
Admin partitions are managed exclusively through the HTTP API and the Consul CLI. The HTTP API accepts only JSON formatted definitions while the CLI will parse either JSON or HCL.
|
||||
|
||||
The following parameters are supported in admin partition defintion files:
|
||||
The following parameters are supported in admin partition definition files:
|
||||
|
||||
| Option | Description | Default | Required |
|
||||
| --- | --- | --- | --- |
|
||||
| `Name` | String value that specifies the name of partiion you are creating or writing. <br/> The value must be valid DNS hostname value. | none | Required |
|
||||
| `Name` | String value that specifies the name of partition you are creating or writing. <br/> The value must be valid DNS hostname value. | none | Required |
|
||||
| `Description` | String value that specifies a description for the partition you are creating or writing. <br/> The value should provide human-readable information to help other users understand the purpose of the partition. | none | Optional |
|
||||
|
||||
### Example Definition File
|
||||
|
@ -242,6 +242,6 @@ You can include the following options to interact with the HTTP API when using t
|
|||
| `-ca-path` | Specifies the path to a client certificate file when TLS is enabled. <br/> You can also specify `CONSUL_CAPATH` as the value if the environment variable is configured. | none | Required if TLS is enabled |
|
||||
| `-client-cert` | Specifies the path to a client certificate file when TLS and the `verify_incoming` option are enabled. <br/> You can also specify `CONSUL_CLIENT_CERT` as the value if the environment variable is configured. | none | Required if TLS and `verify_incoming` are enabled |
|
||||
| `-client-key` | Specifies the path to a client key file when TLS and the `verify_incoming` option are enabled. <br/> You can also specify `CONSUL_CLIENT_KEY` as the value if the environment variable is configured. | none | Required if TLS and `verify_incoming` are enabled |
|
||||
| `-datacenter` | Specifies the name of the datacenter to query. | Datacenter of the queried agent | Optional |
|
||||
| `-datacenter` | Specifies the name of the datacenter to query. <br/> Non-default admin partitions are only supported in the primary datacenter. | Datacenter of the queried agent | Required if the agent is in a non-primary datacenter. |
|
||||
| `-http-addr` | Specifies the address and port number of the Consul HTTP agent. <br/>IP and DNS addresses are supported. The address must also include the port. <br/>You can also specify `CONSUL_HTTP_ADDR` if the environment variable is configured. <br/>To use an HTTPS address, set the `CONSUL_HTTP_SSL` environment variable to `true`. | `http://127.0.0.1:8500` | Optional |
|
||||
| `-stale` | Boolean value that enables any Consul server (non-leader) to respond to the request. <br/>This switch can lower latency and increase throughput, but may result in stale data. This option has no effect on non-read operations. | `false` | Optional |
|
||||
|
|
|
@ -43,8 +43,7 @@ Within a single datacenter, a namespace in one admin partition is logically sepa
|
|||
|
||||
### Cross-datacenter Replication
|
||||
|
||||
Only resources in the default admin partition will be replicated to secondary datacenters.
|
||||
|
||||
Only resources in the default admin partition will be replicated to secondary datacenters. Non-default partitions are currently not supported in secondary datacenters.
|
||||
|
||||
### DNS Queries
|
||||
|
||||
|
@ -234,3 +233,4 @@ You can use create and manage admin partitions through the CLI. Refer to the [ad
|
|||
|
||||
* Gossip between nodes in different admin partitions must be constrained. You can accomplish this with through the use of [network segments](network-segments).
|
||||
* Cross-partition communication is not currently supported.
|
||||
* Partitions can only be created in the primary datacenter.
|
||||
|
|
Loading…
Reference in New Issue