diff --git a/website/content/docs/discovery/checks.mdx b/website/content/docs/discovery/checks.mdx index 401f447c6..20aba4b9a 100644 --- a/website/content/docs/discovery/checks.mdx +++ b/website/content/docs/discovery/checks.mdx @@ -151,7 +151,7 @@ A script check: ```hcl check = { id = "mem-util" - name = "Memory utilization" + name = "Memory utilization" args = ["/usr/local/bin/check_mem.py", "-limit", "256MB"] interval = "10s" timeout = "1s" @@ -186,12 +186,12 @@ check = { tls_skip_verify = false method = "POST" header = { - Content-Type = ["application/json"] + Content-Type = ["application/json"] } body = "{\"method\":\"health\"}" disable_redirects = true - interval = "10s" - timeout = "1s" + interval = "10s" + timeout = "1s" } ``` @@ -248,11 +248,11 @@ A TTL check: ```hcl -check = { +check = { id = "web-app" name = "Web App Status" notes = "Web app does a curl internally every 10 seconds" - ttl = "30s" + ttl = "30s" } ``` @@ -305,11 +305,11 @@ A gRPC check for the whole application: ```hcl check = { - id = "mem-util" + id = "mem-util" name = "Service health status" - grpc = "127.0.0.1:12345" + grpc = "127.0.0.1:12345" grpc_use_tls = true - interval = "10s" + interval = "10s" } ``` @@ -482,11 +482,11 @@ health check definition, like so: ```hcl -check = { - "id": "mem", - "args": ["/bin/check_mem", "-limit", "256MB"] - "interval": "10s" - "status": "passing" +check = { + id = "mem" + args = ["/bin/check_mem", "-limit", "256MB"] + interval = "10s" + status = "passing" } ``` @@ -516,10 +516,10 @@ provided by adding a `service_id` field to a check configuration: ```hcl -check = { +check = { id = "web-app" - name = "Web App Status" - service_id = "web-app" + name = "Web App Status" + service_id = "web-app" ttl = "30s" } ``` @@ -635,7 +635,7 @@ checks = [ name = "HTTP TCP on port 80" tcp = "localhost:80" interval = "10s" - timeout = "1s" + timeout = "1s" success_before_passing = 3 failures_before_warning = 1 failures_before_critical = 3 diff --git a/website/content/docs/security/acl/acl-policies.mdx b/website/content/docs/security/acl/acl-policies.mdx index f97d8dcc1..7c5286e0b 100644 --- a/website/content/docs/security/acl/acl-policies.mdx +++ b/website/content/docs/security/acl/acl-policies.mdx @@ -460,19 +460,19 @@ In the following example, Vault is registered as a service and provided access t ```hcl # Provide KV visibility to all agents. agent_prefix "" { - "policy" = "read" + policy = "read" } # Enable resources prefixed with 'vault/' to write to the KV key_prefix "vault/" { - "policy" = "write" + policy = "write" } # Enable the vault service to write to the KV service "vault" { - "policy" = "write" + policy = "write" } # Enable the agent to initialize a new session. session_prefix "" { - "policy" = "write" + policy = "write" } ``` diff --git a/website/content/docs/security/acl/acl-tokens.mdx b/website/content/docs/security/acl/acl-tokens.mdx index fcb0abe57..1267aafbf 100644 --- a/website/content/docs/security/acl/acl-tokens.mdx +++ b/website/content/docs/security/acl/acl-tokens.mdx @@ -38,12 +38,12 @@ Specify the value of the `SecretID` attribute with the `token` parameter when co ```hcl -"service" = { - "id" = "redis" - "name" = "redis" +service = { + id = "redis" + name = "redis" ... - "namespace" = "foo" - "token" = "233b604b-b92e-48c8-a253-5f11514e4b50" + namespace = "foo" + token = "233b604b-b92e-48c8-a253-5f11514e4b50" } ``` @@ -86,8 +86,8 @@ In the following example, the agent is configured to use a default token: ```hcl -"tokens" = { - "default" = "233b604b-b92e-48c8-a253-5f11514e4b50" +tokens = { + default = "233b604b-b92e-48c8-a253-5f11514e4b50" } ```