From 472b7165fdfe00d4a06598a090beed242381ed30 Mon Sep 17 00:00:00 2001 From: Matt Keeler Date: Wed, 30 Jan 2019 17:47:32 -0500 Subject: [PATCH] Fix some docs formatting around DNS SOA RR configuration (#5297) --- website/source/docs/agent/options.html.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/website/source/docs/agent/options.html.md b/website/source/docs/agent/options.html.md index 842742453..3fb84f534 100644 --- a/website/source/docs/agent/options.html.md +++ b/website/source/docs/agent/options.html.md @@ -551,9 +551,9 @@ default will automatically work with some tooling. ACLs are a blacklist: any operation not specifically prohibited is allowed. In "deny" mode, ACLs are a whitelist: any operation not specifically allowed is blocked. *Note*: this will not take effect until you've enabled ACLs. - - * `enable_key_list` - Either "enabled" or "disabled", defaults to "disabled". When enabled, the `list` permission will be required on the prefix being recursively read from the KV store. Regardless of being enabled, the full set of KV entries under the prefix will be filtered to remove any entries that the request's ACL token does not grant at least read persmissions. This option is only available in Consul 1.0 and newer. - + + * `enable_key_list` - Either "enabled" or "disabled", defaults to "disabled". When enabled, the `list` permission will be required on the prefix being recursively read from the KV store. Regardless of being enabled, the full set of KV entries under the prefix will be filtered to remove any entries that the request's ACL token does not grant at least read persmissions. This option is only available in Consul 1.0 and newer. + * `enable_token_replication` - By default secondary Consul datacenters will perform replication of only ACL policies. Setting this configuration will also enable ACL token replication. @@ -1053,10 +1053,10 @@ default will automatically work with some tooling. * `soa` Allow to tune the setting set up in SOA. Non specified values fallback to their default values, all values are integers and expressed as seconds. - +

The following settings are available: - * expire - + * `expire` - Configure SOA Expire duration in seconds, default value is 86400, ie: 24 hours. * `min_ttl` - @@ -1065,10 +1065,10 @@ default will automatically work with some tooling. negative cache TTL in most implementations. Default value is 0, ie: no minimum delay or negative TTL. - * refresh - + * `refresh` - Configure SOA Refresh duration in seconds, default value is `3600`, ie: 1 hour. - * retry - + * `retry` - Configures the Retry duration expressed in seconds, default value is 600, ie: 10 minutes.