docs: CLI page descriptions for automated checker (#16056)

* ACL

* ACL

* Catalog

* consul config

* consul connect

* top-level updates

* consul intention

* consul kv

* consul namespace

* consul peering

* consul peering delete

* consul services

* consul snapshot

* consul tls

* consul acl auth-method

* acl binding-rule

* acl policy

* acl role

* acl token

* fix

* standardization

* Update website/content/commands/snapshot/save.mdx

Co-authored-by: Bryce Kalow <bkalow@hashicorp.com>

* consul debug
consul keyring

Co-authored-by: Bryce Kalow <bkalow@hashicorp.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
This commit is contained in:
Jeff Boruszak 2023-01-26 12:42:13 -06:00 committed by GitHub
parent 30f5404c89
commit fe2f650240
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
84 changed files with 168 additions and 8 deletions

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Auth Method Create'
description: |
The `consul acl auth-method create` command creates a new auth method according to defined parameters.
---
# Consul ACL Auth Method Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Auth Method Delete'
description: |
The `consul acl auth-method delete` command deletes an individually specified auth method.
---
# Consul ACL Auth Method Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Auth Methods'
description: |
The `consul acl auth-method` command interacts with Consul's ACL auth methods. It exposes top-level commands for creating, updating, reading, deleting, and listing auth methods.
---
# Consul ACL Auth Methods

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Auth Method List'
description: |
The `consul acl auth-method list` command outputs a list of active auth methods.
---
# Consul ACL Auth Method List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Auth Method Read'
description: |
The `consul acl auth-method read` command outputs configuration details for a specified auth method.
---
# Consul ACL Auth Method Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Auth Method Update'
description: |
The `consul acl auth-method update` command updates auth method configuration information.
---
# Consul ACL Auth Method Update

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Binding Rule Create'
description: |
The `consul acl binding-rule create` command creates new ACL binding rules. These rules bind auth methods to specific services or roles.
---
# Consul ACL Binding Rule Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Binding Rule Delete'
description: |
The `consul acl binding-rule delete` command deletes an ACL binding rule according to a specified ID. These rules bind auth methods to specific services or roles.
---
# Consul ACL Binding Rule Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Binding Rule'
description: |
The `consul acl binding-rule` command interacts with Consul's ACL binding rules. It exposes commands for creating, updating, reading, deleting, and listing rules that bind auth methods to a specific service or role.
---
# Consul ACL Binding Rules

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Binding Rule List'
description: |
The `consul acl binding-rule list` command lists names and details for all ACL binding rules.
---
# Consul ACL Binding Rule List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Binding Rule Read'
description: |
The `consul acl binding-rule read` command outputs the details of an ACL binding rule of a specified ID.
---
# Consul ACL Binding Rule Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Binding Rule Update'
description: |
The `consul acl binding-rule update` command updates existing ACL binding rules. These rules bind auth methods to specific services or roles.
---
# Consul ACL Binding Rule Update

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Bootstrap'
description: >-
The `consul acl bootstrap` command generates a new token with unlimited privileges to use for management purposes and outputs the token's details.
---
# Consul ACL Bootstrap

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL'
description: >-
The `consul acl` command exposes top-level commands for bootstrapping the ACL system, managing tokens and policies, translating legacy rules, and setting the tokens for use by an agent.
---
# Consul ACLs

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Policy Create'
description: |
The `consul acl policy create` command creates new ACL policies that authorize read and write access in the service mesh.
---
# Consul ACL Policy Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Policy Delete'
description: |
The `consul acl policy delete` command deletes ACL policies of a specified name, ID, or ID prefix.
---
# Consul ACL Policy Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Policy'
description: |
The `consul acl policy` command interacts with Consul's ACL policies. It exposes commands for creating, updating, reading, deleting, and listing policies.
---
# Consul ACL Policies

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Policy List'
description: |
The `consul acl policy list` command lists names and details for all ACL policies in the cluster.
---
# Consul ACL Policy List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Policy Read'
description: |
The `consul acl policy read` command outputs rules that make up an ACL policy of the specified ID.
---
# Consul ACL Policy Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Policy Update'
description: |
The `consul acl policy update` command updates existing ACL policies to change authorized read and write access in the service mesh.
---
# Consul ACL Policy Update

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Role Create'
description: |
The `consul acl role create` command creates a new role attached to one or more ACL policies.
---
# Consul ACL Role Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Role Delete'
description: |
The `consul acl role delete` command deletes the ACL role of the specified ID or name.
---
# Consul ACL Role Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Role'
description: |
The `consul acl role` command interacts with Consul's ACL roles. It exposes commands for creating, updating, reading, deleting, and listing roles. Roles consist of one or more ACL policies authorizing communication in the service mesh.
---
# Consul ACL Roles

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Role List'
description: |
The `consul acl role list` command outputs details for all ACL roles, including the policy IDs attached to each role.
---
# Consul ACL Role List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Role Read'
description: |
The `consul acl role read` command outputs details for the ACL role of the specified name or ID, including policies attached to the role.
---
# Consul ACL Role Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Role Update'
description: |
The `consul acl role update` command updates existing ACL roles. Roles consist of one or more ACL policies authorizing communication in the service mesh.
---
# Consul ACL Role Update

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Set Agent Token'
description: >-
The `consul acl set-agent-token` command updates an agent's ACL tokens to introduce the agent ACL tokens for the first time or to update tokens.
---
# Consul ACL Set Agent Token

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Token Clone'
description: |
The `consul acl token clone` command makes a copy of the ACL token of a specified ID.
---
# Consul ACL Token Clone

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Token Create'
description: |
The `consul acl token create` command creates new ACL tokens. Optional arguments can set TTL duration and attach new tokens to existing policies and roles.
---
# Consul ACL Token Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Token Delete'
description: |
The `consul acl token delete` command deletes an ACL token of a specified ID. Deleting a token affects the ACL policies and roles attached to the token.
---
# Consul ACL Token Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Token'
description: |
The `consul acl token` command interacts with Consul's ACL tokens. It exposes commands for creating, updating, reading, deleting, listing, and cloning tokens. Tokens include secrets that can be attached to policies to secure communication in the service mesh.
---
# Consul ACL Tokens

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Token List'
description: |
The `consul acl token list` command outputs details for all ACL tokens, including the global management bootstrap token and the anonymous token.
---
# Consul ACL Token List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Token Read'
description: |
The `consul acl token read` command outputs details for an ACL token of a specified ID.
---
# Consul ACL Token Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Token Update'
description: |
The `consul acl token update` command updates ACL token details such as attached policies, roles, and service identities. Some token details cannot be changed with this command.
---
# Consul ACL Token Update

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: ACL Translate Rules'
description: >-
The `consul acl translate-rules` command translates the legacy ACL rules into the new syntax when migrating from the legacy ACL system.
---
-> **Deprecated:** This command exists only as a convenience to make legacy ACL migration easier.

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Catalog List Datacenters'
description: >-
The `consul catalog datacenters` command returns a list of all known datacenters.
---
# Consul Catalog List Datacenters

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Catalog'
description: >-
The `consul catalog` command interacts with Consul's catalog of services and their registered locations. It exposes top-level commands for reading and filtering data from the registry.
---
# Consul Catalog

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Catalog List Nodes'
description: >-
The `consul catalog nodes` command returns all known nodes and metadata about them. It can also query nodes that host a particular service or contain specific metadata.
---
# Consul Catalog List Nodes

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Catalog List Services'
description: >-
The `consul catalog services` command returns all known services. It can also get a list of services on a particular node and query services that contain specific metadata.
---
# Consul Catalog List Services

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Config Delete'
description: >-
The `consul config delete` command deletes a configuration entry specified by kind and name.
---
# Consul Config Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Config'
description: >-
The `consul config` command interacts with configuration entries. It exposes top-level commands for global configurations of proxies, gateways, and services.
---
# Consul Config

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Config List'
description: >-
The `consul config list` command lists all configuration entries for each config entry kind.
---
# Consul Config List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Config Read'
description: >-
The `consul config read` outputs the JSON representation of a configuration entry identified by kind or name.
---
# Consul Config Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Config Write'
description: >-
The `consul config write` command creates or updates a configuration entry and applies it to your deployment.
---
# Consul Config Write

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Connect'
description: >-
The `consul connect` command interacts with Consul's service mesh features. It exposes top-level commands for interacting with the internal CA and service mesh proxies, exposing services through ingress gateways, and applying iptables rules.
---
# Consul Connect

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Debug'
description: >-
The `consul debug` command monitors an agent to capture a record its actions according to defined durations and intervals.
---
# Consul Debug

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Intention Check'
description: >-
The `consul intention check` command tests whether a connection between two services is authorized under the current set of intentions.
---
# Consul Intention Check

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Intention Create'
description: >-
The `consul intention create` command creates and updates L4 service intentions. It was deprecated in Consul v1.9.0; use `consul config` instead.
---
# Consul Intention Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Intention Delete'
description: >-
The `consul intention delete` command delete L4 service intentions that authorize two services to communicate. It was deprecated in Consul v1.9.0; use `consul config` instead.
---
# Consul Intention Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Intention Get'
description: >-
The `consul intention get` command returns information about a single L4 service intention that authorizes services to communicate. It was deprecated in Consul v1.9.0; use `consul config` instead.
---
# Consul Intention Get

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Intention'
description: >-
The `consul intention` command interacts with service intentions to secure service mesh traffic. It exposes top-level commands for interacting with intentions. It was deprecated in Consul v1.9.0. To interact with intentions, use `consul config` instead.
---
# Consul Intention

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Intention List'
description: >-
The `consul intention list` command returns all L4 service intentions, including a unique ID and intention precendence. It was deprecated in Consul v1.9.0; use `consul config` instead.
---
# Consul Intention List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Intention Match'
description: >-
The `consul intention match` command returns inbound and outbound service intentions for a specific service.
---
# Consul Intention Match

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Keyring'
description: >-
The `consul keyring` command lists active encryption keys used for gossip pools and enables you to rotate keys for large deployments automatically.
---
# Consul Keyring

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: KV Delete'
description: >-
The `consul kv delete` command removes a value from Consul's key/value store.
---
# Consul KV Delete

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: KV Export'
description: >-
The `consul kv export` command outputs KV pairs from Consul's key/value store in JSON to move trees between Consul clusters.
---
# Consul KV Export

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: KV Get'
description: >-
The `consul kv get` command retrieves data from Consul's key/value store.
---
# Consul KV Get

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: KV Import'
description: >-
The `consul kv import` command adds values to Consul's key/value store according to a JSON representation of the data.
---
# Consul KV Import

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: KV'
description: >-
The `consul kv` command interacts with Consul's key/value store. It exposes top level commands to insert, update, read, and delte data from the store.
---
# Consul KV

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: KV Put'
description: >-
The `consul kv put` command writes data to Consul's key/value store.
---
# Consul KV Put

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Namespace Create'
description: |
The `consul namespace create` command generates a new namespace in Consul Enterprise. Policies, roles, and metadata can be assigned when creating a namespace.
---
# Consul Namespace Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Namespace Delete'
description: |
The `consul namespace delete` command deletes a namespace in Consul Enterprise.
---
# Consul Namespace Delete

View File

@ -2,7 +2,7 @@
layout: commands
page_title: 'Commands: Namespace'
description: |
The namespace command provides management of Consul Enterprise namespaces.
The `consul namespace` command interacts with namespaces in Consul Enterprise. It exposes top-level commands to create and manage namespaces in Consul deployments.
---
# Consul Namespace

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Namespace List'
description: |
The `consul namespace list` command outputs all existing namespaces in Consul Enterprise.
---
# Consul Namespace List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Namespace Read'
description: |
The `consul namespace read` command outputs information about a single namespace in Consul Enterprise.
---
# Consul Namespace Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Namespace Update'
description: |
The `consul namespace update` command updates an individual namespace in Consul Enterprise. Policies, roles, namespace descriptions, and metadata can be updated.
---
# Consul Namespace Update

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Namespace Write'
description: |
The `consul namespace write` command creates or updates a namespace's configuration in Consul Enterprise.
---
# Consul Namespace Write

View File

@ -1,7 +1,8 @@
---
layout: commands
page_title: 'Commands: Peering Delete'
description: Learn how to use the consul peering delete command to remove a peering connection between Consul clusters.
description: |
The `consul peering delete` command ends a cluster peering connection with another cluster.
---
# Consul Peering Delete

View File

@ -1,7 +1,8 @@
---
layout: commands
page_title: 'Commands: Peering Establish'
description: Learn how to use the consul peering establish command to establish a peering connection between Consul clusters.
description: |
The `consul peering establish` command starts a cluster peering connection with another cluster after they exchange a peering token.
---
# Consul Peering Establish

View File

@ -1,7 +1,8 @@
---
layout: commands
page_title: 'Commands: Peering Generate Token'
description: Learn how to use the consul peering generate-token command to generate token that enables you to peer Consul clusters.
description: |
The `consul peering generate-token` command creates a peering token that clusters use to establish secure cluster peering connections.
---
# Consul Peering Generate Token

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Peering'
description: |
The `consul peering` command interacts cluster peering connections. It exposes top-level commands to generate peering tokens. establish connections, and manage connections.
---
# Consul Peering
@ -34,7 +36,4 @@ of the subcommand in the sidebar or one of the links below:
- [establish](/consul/commands/peering/establish)
- [generate-token](/consul/commands/peering/generate-token)
- [list](/consul/commands/peering/list)
- [read](/consul/commands/peering/read)
- [read](/consul/commands/peering/read)

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Peering List'
description: |
The `consul peering lists` command outputs a list of the local cluster's cluster peering connections, including imported and exported service counts and the connection state.
---
# Consul Peering List

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Peering Read'
description: |
The `consul peering read` command outputs information about an individual cluster peering connection.
---
# Consul Peering Read

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Services Deregister'
description: |
The `consul services deregister` command removes a service from the Consul catalog. Run the commeand on the agent that initially registered the service.
---
# Consul Agent Service Deregistration

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Services'
description: |
The `consul services` command interacts with services registered with the local agent. It exposes top-level commands for registering and deregistering services with the Consul catalog.
---
# Consul Agent Services

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Services Register'
description: |
The `consul services register` command registers services with the Consul catalog.
---
# Consul Agent Service Registration

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Snapshot Agent'
description: |
The `consul snapshot agent` command starts a process that takes snapshots of the state of the Consul servers in Consul Enterprise. It can capture server state once or it can run as daemon that captures snapshots at defined intervals.
---
# Consul Snapshot Agent

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Snapshot'
description: |
The `consul snapshot` command interacts with Consul's snapshot agent to support disaster recovery. It exposes top-level commands for saving, restoring, and inspecting the state of Consul servers.
---
# Consul Snapshot

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Snapshot Inspect'
description: |
The `consul snapshot inspect` command outputs an atomic, point-in-time snapshot of the state of the Consul servers. Output includes key/value entries, registered services in the catalog, prepared queries, sessions, and ACLs.
---
# Consul Snapshot Inspect

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Snapshot Restore'
description: |
The `consul snapshot restore` command restores the state of Consul servers after a disaster. A server can restore key/value entries, registered services in the catalog, prepared queries, sessions, and ACLs from a saved snapshot.
---
# Consul Snapshot Restore

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: Snapshot Save'
description: |
The `consul snapshot save` command retrieves a point-in-time snapshot of the state of the Consul servers and saves it to a specified location. Data saved in snapshots includes key/value entries, registered services in the catalog, prepared queries, sessions, and ACLs from a saved snapshot.
---
# Consul Snapshot Save

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: TLS CA Create'
description: |
The `consul tls ca create` command creates a self-signed certificate authority (CA) for TLS setup.
---
# Consul TLS CA Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: TLS Cert Create'
description: |
The `consul tls cert create` command creates certificates for servers, clients, and CLIs to secure their communication.
---
# Consul TLS Cert Create

View File

@ -1,6 +1,8 @@
---
layout: commands
page_title: 'Commands: TLS'
description: |
The `consul tls` command interacts with Consul's built in certificate authority. It exposes top-level commands for setting up the CA and generating certificates for agents.
---
# Consul TLS