diff --git a/command/server.go b/command/server.go
index 09658b949..6687b6b3b 100644
--- a/command/server.go
+++ b/command/server.go
@@ -173,8 +173,8 @@ func (c *ServerCommand) Run(args []string) int {
}
// Ensure that a backend is provided
- if config.Backend == nil {
- c.Ui.Output("A physical backend must be specified")
+ if config.Storage == nil {
+ c.Ui.Output("A storage backend must be specified")
return 1
}
@@ -194,11 +194,11 @@ func (c *ServerCommand) Run(args []string) int {
// Initialize the backend
backend, err := physical.NewBackend(
- config.Backend.Type, c.logger, config.Backend.Config)
+ config.Storage.Type, c.logger, config.Storage.Config)
if err != nil {
c.Ui.Output(fmt.Sprintf(
- "Error initializing backend of type %s: %s",
- config.Backend.Type, err))
+ "Error initializing storage of type %s: %s",
+ config.Storage.Type, err))
return 1
}
@@ -224,7 +224,7 @@ func (c *ServerCommand) Run(args []string) int {
coreConfig := &vault.CoreConfig{
Physical: backend,
- RedirectAddr: config.Backend.RedirectAddr,
+ RedirectAddr: config.Storage.RedirectAddr,
HAPhysical: nil,
Seal: seal,
AuditBackends: c.AuditBackends,
@@ -244,39 +244,39 @@ func (c *ServerCommand) Run(args []string) int {
var disableClustering bool
- // Initialize the separate HA physical backend, if it exists
+ // Initialize the separate HA storage backend, if it exists
var ok bool
- if config.HABackend != nil {
+ if config.HAStorage != nil {
habackend, err := physical.NewBackend(
- config.HABackend.Type, c.logger, config.HABackend.Config)
+ config.HAStorage.Type, c.logger, config.HAStorage.Config)
if err != nil {
c.Ui.Output(fmt.Sprintf(
- "Error initializing backend of type %s: %s",
- config.HABackend.Type, err))
+ "Error initializing HA storage of type %s: %s",
+ config.HAStorage.Type, err))
return 1
}
if coreConfig.HAPhysical, ok = habackend.(physical.HABackend); !ok {
- c.Ui.Output("Specified HA backend does not support HA")
+ c.Ui.Output("Specified HA storage does not support HA")
return 1
}
if !coreConfig.HAPhysical.HAEnabled() {
- c.Ui.Output("Specified HA backend has HA support disabled; please consult documentation")
+ c.Ui.Output("Specified HA storage has HA support disabled; please consult documentation")
return 1
}
- coreConfig.RedirectAddr = config.HABackend.RedirectAddr
- disableClustering = config.HABackend.DisableClustering
+ coreConfig.RedirectAddr = config.HAStorage.RedirectAddr
+ disableClustering = config.HAStorage.DisableClustering
if !disableClustering {
- coreConfig.ClusterAddr = config.HABackend.ClusterAddr
+ coreConfig.ClusterAddr = config.HAStorage.ClusterAddr
}
} else {
if coreConfig.HAPhysical, ok = backend.(physical.HABackend); ok {
- coreConfig.RedirectAddr = config.Backend.RedirectAddr
- disableClustering = config.Backend.DisableClustering
+ coreConfig.RedirectAddr = config.Storage.RedirectAddr
+ disableClustering = config.Storage.DisableClustering
if !disableClustering {
- coreConfig.ClusterAddr = config.Backend.ClusterAddr
+ coreConfig.ClusterAddr = config.Storage.ClusterAddr
}
}
}
@@ -378,12 +378,12 @@ CLUSTER_SYNTHESIS_COMPLETE:
c.reloadFuncsLock = coreConfig.ReloadFuncsLock
// Compile server information for output later
- info["backend"] = config.Backend.Type
+ info["storage"] = config.Storage.Type
info["log level"] = logLevel
info["mlock"] = fmt.Sprintf(
"supported: %v, enabled: %v",
mlock.Supported(), !config.DisableMlock && mlock.Supported())
- infoKeys = append(infoKeys, "log level", "mlock", "backend")
+ infoKeys = append(infoKeys, "log level", "mlock", "storage")
if coreConfig.ClusterAddr != "" {
info["cluster address"] = coreConfig.ClusterAddr
@@ -394,16 +394,16 @@ CLUSTER_SYNTHESIS_COMPLETE:
infoKeys = append(infoKeys, "redirect address")
}
- if config.HABackend != nil {
- info["HA backend"] = config.HABackend.Type
- infoKeys = append(infoKeys, "HA backend")
+ if config.HAStorage != nil {
+ info["HA storage"] = config.HAStorage.Type
+ infoKeys = append(infoKeys, "HA storage")
} else {
- // If the backend supports HA, then note it
+ // If the storage supports HA, then note it
if coreConfig.HAPhysical != nil {
if coreConfig.HAPhysical.HAEnabled() {
- info["backend"] += " (HA available)"
+ info["storage"] += " (HA available)"
} else {
- info["backend"] += " (HA disabled)"
+ info["storage"] += " (HA disabled)"
}
}
}
diff --git a/command/server/config.go b/command/server/config.go
index 4ff9116e7..b766ea63b 100644
--- a/command/server/config.go
+++ b/command/server/config.go
@@ -21,8 +21,8 @@ import (
// Config is the configuration for the vault server.
type Config struct {
Listeners []*Listener `hcl:"-"`
- Backend *Backend `hcl:"-"`
- HABackend *Backend `hcl:"-"`
+ Storage *Storage `hcl:"-"`
+ HAStorage *Storage `hcl:"-"`
HSM *HSM `hcl:"-"`
@@ -51,7 +51,7 @@ func DevConfig(ha, transactional bool) *Config {
DisableCache: false,
DisableMlock: true,
- Backend: &Backend{
+ Storage: &Storage{
Type: "inmem",
},
@@ -75,11 +75,11 @@ func DevConfig(ha, transactional bool) *Config {
switch {
case ha && transactional:
- ret.Backend.Type = "inmem_transactional_ha"
+ ret.Storage.Type = "inmem_transactional_ha"
case !ha && transactional:
- ret.Backend.Type = "inmem_transactional"
+ ret.Storage.Type = "inmem_transactional"
case ha && !transactional:
- ret.Backend.Type = "inmem_ha"
+ ret.Storage.Type = "inmem_ha"
}
return ret
@@ -95,8 +95,8 @@ func (l *Listener) GoString() string {
return fmt.Sprintf("*%#v", *l)
}
-// Backend is the backend configuration for the server.
-type Backend struct {
+// Storage is the underlying storage configuration for the server.
+type Storage struct {
Type string
RedirectAddr string
ClusterAddr string
@@ -104,7 +104,7 @@ type Backend struct {
Config map[string]string
}
-func (b *Backend) GoString() string {
+func (b *Storage) GoString() string {
return fmt.Sprintf("*%#v", *b)
}
@@ -215,14 +215,14 @@ func (c *Config) Merge(c2 *Config) *Config {
result.Listeners = append(result.Listeners, l)
}
- result.Backend = c.Backend
- if c2.Backend != nil {
- result.Backend = c2.Backend
+ result.Storage = c.Storage
+ if c2.Storage != nil {
+ result.Storage = c2.Storage
}
- result.HABackend = c.HABackend
- if c2.HABackend != nil {
- result.HABackend = c2.HABackend
+ result.HAStorage = c.HAStorage
+ if c2.HAStorage != nil {
+ result.HAStorage = c2.HAStorage
}
result.HSM = c.HSM
@@ -349,6 +349,8 @@ func ParseConfig(d string, logger log.Logger) (*Config, error) {
valid := []string{
"atlas",
+ "storage",
+ "ha_storage",
"backend",
"ha_backend",
"hsm",
@@ -366,15 +368,28 @@ func ParseConfig(d string, logger log.Logger) (*Config, error) {
return nil, err
}
- if o := list.Filter("backend"); len(o.Items) > 0 {
- if err := parseBackends(&result, o); err != nil {
- return nil, fmt.Errorf("error parsing 'backend': %s", err)
+ // Look for storage but still support old backend
+ if o := list.Filter("storage"); len(o.Items) > 0 {
+ if err := parseStorage(&result, o, "storage"); err != nil {
+ return nil, fmt.Errorf("error parsing 'storage': %s", err)
+ }
+ } else {
+ if o := list.Filter("backend"); len(o.Items) > 0 {
+ if err := parseStorage(&result, o, "backend"); err != nil {
+ return nil, fmt.Errorf("error parsing 'backend': %s", err)
+ }
}
}
- if o := list.Filter("ha_backend"); len(o.Items) > 0 {
- if err := parseHABackends(&result, o); err != nil {
- return nil, fmt.Errorf("error parsing 'ha_backend': %s", err)
+ if o := list.Filter("ha_storage"); len(o.Items) > 0 {
+ if err := parseHAStorage(&result, o, "ha_storage"); err != nil {
+ return nil, fmt.Errorf("error parsing 'ha_storage': %s", err)
+ }
+ } else {
+ if o := list.Filter("ha_backend"); len(o.Items) > 0 {
+ if err := parseHAStorage(&result, o, "ha_backend"); err != nil {
+ return nil, fmt.Errorf("error parsing 'ha_backend': %s", err)
+ }
}
}
@@ -476,22 +491,22 @@ func isTemporaryFile(name string) bool {
(strings.HasPrefix(name, "#") && strings.HasSuffix(name, "#")) // emacs
}
-func parseBackends(result *Config, list *ast.ObjectList) error {
+func parseStorage(result *Config, list *ast.ObjectList, name string) error {
if len(list.Items) > 1 {
- return fmt.Errorf("only one 'backend' block is permitted")
+ return fmt.Errorf("only one %q block is permitted", name)
}
// Get our item
item := list.Items[0]
- key := "backend"
+ key := name
if len(item.Keys) > 0 {
key = item.Keys[0].Token.Value().(string)
}
var m map[string]string
if err := hcl.DecodeObject(&m, item.Val); err != nil {
- return multierror.Prefix(err, fmt.Sprintf("backend.%s:", key))
+ return multierror.Prefix(err, fmt.Sprintf("%s.%s:", name, key))
}
// Pull out the redirect address since it's common to all backends
@@ -516,12 +531,12 @@ func parseBackends(result *Config, list *ast.ObjectList) error {
if v, ok := m["disable_clustering"]; ok {
disableClustering, err = strconv.ParseBool(v)
if err != nil {
- return multierror.Prefix(err, fmt.Sprintf("backend.%s:", key))
+ return multierror.Prefix(err, fmt.Sprintf("%s.%s:", name, key))
}
delete(m, "disable_clustering")
}
- result.Backend = &Backend{
+ result.Storage = &Storage{
RedirectAddr: redirectAddr,
ClusterAddr: clusterAddr,
DisableClustering: disableClustering,
@@ -531,22 +546,22 @@ func parseBackends(result *Config, list *ast.ObjectList) error {
return nil
}
-func parseHABackends(result *Config, list *ast.ObjectList) error {
+func parseHAStorage(result *Config, list *ast.ObjectList, name string) error {
if len(list.Items) > 1 {
- return fmt.Errorf("only one 'ha_backend' block is permitted")
+ return fmt.Errorf("only one %q block is permitted", name)
}
// Get our item
item := list.Items[0]
- key := "backend"
+ key := name
if len(item.Keys) > 0 {
key = item.Keys[0].Token.Value().(string)
}
var m map[string]string
if err := hcl.DecodeObject(&m, item.Val); err != nil {
- return multierror.Prefix(err, fmt.Sprintf("ha_backend.%s:", key))
+ return multierror.Prefix(err, fmt.Sprintf("%s.%s:", name, key))
}
// Pull out the redirect address since it's common to all backends
@@ -571,12 +586,12 @@ func parseHABackends(result *Config, list *ast.ObjectList) error {
if v, ok := m["disable_clustering"]; ok {
disableClustering, err = strconv.ParseBool(v)
if err != nil {
- return multierror.Prefix(err, fmt.Sprintf("backend.%s:", key))
+ return multierror.Prefix(err, fmt.Sprintf("%s.%s:", name, key))
}
delete(m, "disable_clustering")
}
- result.HABackend = &Backend{
+ result.HAStorage = &Storage{
RedirectAddr: redirectAddr,
ClusterAddr: clusterAddr,
DisableClustering: disableClustering,
diff --git a/command/server/config_test.go b/command/server/config_test.go
index 1a40f6d94..789be400f 100644
--- a/command/server/config_test.go
+++ b/command/server/config_test.go
@@ -37,7 +37,7 @@ func TestLoadConfigFile(t *testing.T) {
},
},
- Backend: &Backend{
+ Storage: &Storage{
Type: "consul",
RedirectAddr: "foo",
Config: map[string]string{
@@ -45,7 +45,7 @@ func TestLoadConfigFile(t *testing.T) {
},
},
- HABackend: &Backend{
+ HAStorage: &Storage{
Type: "consul",
RedirectAddr: "snafu",
Config: map[string]string{
@@ -105,7 +105,7 @@ func TestLoadConfigFile_json(t *testing.T) {
},
},
- Backend: &Backend{
+ Storage: &Storage{
Type: "consul",
Config: map[string]string{
"foo": "bar",
@@ -171,7 +171,7 @@ func TestLoadConfigFile_json2(t *testing.T) {
},
},
- Backend: &Backend{
+ Storage: &Storage{
Type: "consul",
Config: map[string]string{
"foo": "bar",
@@ -179,7 +179,7 @@ func TestLoadConfigFile_json2(t *testing.T) {
DisableClustering: true,
},
- HABackend: &Backend{
+ HAStorage: &Storage{
Type: "consul",
Config: map[string]string{
"bar": "baz",
@@ -234,7 +234,7 @@ func TestLoadConfigDir(t *testing.T) {
},
},
- Backend: &Backend{
+ Storage: &Storage{
Type: "consul",
Config: map[string]string{
"foo": "bar",
diff --git a/command/server/test-fixtures/config.hcl.json b/command/server/test-fixtures/config.hcl.json
index 6e37c9a3a..70e7e149c 100644
--- a/command/server/test-fixtures/config.hcl.json
+++ b/command/server/test-fixtures/config.hcl.json
@@ -11,7 +11,7 @@
"node_id": "foo_node"
}
}],
- "backend": {
+ "storage": {
"consul": {
"foo": "bar",
"disable_clustering": "true"
diff --git a/command/server/test-fixtures/config2.hcl.json b/command/server/test-fixtures/config2.hcl.json
index fd3ab6e62..5279d6379 100644
--- a/command/server/test-fixtures/config2.hcl.json
+++ b/command/server/test-fixtures/config2.hcl.json
@@ -12,12 +12,12 @@
}
}
],
- "backend":{
+ "storage":{
"consul":{
"foo":"bar"
}
},
- "ha_backend":{
+ "ha_storage":{
"consul":{
"bar":"baz",
"disable_clustering": "true"
diff --git a/command/server_ha_test.go b/command/server_ha_test.go
index 26dc00878..5562191eb 100644
--- a/command/server_ha_test.go
+++ b/command/server_ha_test.go
@@ -64,8 +64,8 @@ func TestServer_GoodSeparateHA(t *testing.T) {
t.Fatalf("bad: %d\n\n%s\n\n%s", code, ui.ErrorWriter.String(), ui.OutputWriter.String())
}
- if !strings.Contains(ui.OutputWriter.String(), "HA Backend:") {
- t.Fatalf("did not find HA Backend: %s", ui.OutputWriter.String())
+ if !strings.Contains(ui.OutputWriter.String(), "HA Storage:") {
+ t.Fatalf("did not find HA Storage: %s", ui.OutputWriter.String())
}
}
diff --git a/website/source/docs/configuration/index.html.md b/website/source/docs/configuration/index.html.md
index d71c3eea8..3a59e118a 100644
--- a/website/source/docs/configuration/index.html.md
+++ b/website/source/docs/configuration/index.html.md
@@ -13,7 +13,7 @@ The format of this file is [HCL](https://github.com/hashicorp/hcl) or JSON.
An example configuration is shown below:
```javascript
-backend "consul" {
+storage "consul" {
address = "127.0.0.1:8500"
path = "vault"
}
@@ -37,15 +37,15 @@ sending a SIGHUP to the server process. These are denoted below.
## Parameters
-- `backend` ([StorageBackend][storage-backend]: \) -
+- `storage` ([StorageBackend][storage-backend]: \) -
Configures the storage backend where Vault data is stored. Please see the
[storage backends documentation][storage-backend] for the full list of
available storage backends.
-- `ha_backend` ([StorageBackend][storage-backend]: nil) - Configures
+- `ha_storage` ([StorageBackend][storage-backend]: nil) - Configures
the storage backend where Vault HA coordination will take place. This must be
an HA-supporting backend. If not set, HA will be attempted on the backend
- given in the `backend` parameter.
+ given in the `storage` parameter.
- `cluster_name` `(string: )` – Specifies the identifier for the
Vault cluster. If omitted, Vault will generate a value. When connecting to
diff --git a/website/source/docs/configuration/storage/azure.html.md b/website/source/docs/configuration/storage/azure.html.md
index c21cf6991..4bb946806 100644
--- a/website/source/docs/configuration/storage/azure.html.md
+++ b/website/source/docs/configuration/storage/azure.html.md
@@ -24,7 +24,7 @@ to the storage container.
you may be referred to the original author.
```hcl
-backend "azure" {
+storage "azure" {
accountName = "my-storage-account"
accountKey = "abcd1234"
container = "container-efgh5678"
@@ -52,7 +52,7 @@ This example shows configuring the Azure storage backend with a custom number of
maximum parallel connections.
```hcl
-backend "azure" {
+storage "azure" {
accountName = "my-storage-account"
accountKey = "abcd1234"
container = "container-efgh5678"
diff --git a/website/source/docs/configuration/storage/consul.html.md b/website/source/docs/configuration/storage/consul.html.md
index b5a6f5bf1..edd4f5f8d 100644
--- a/website/source/docs/configuration/storage/consul.html.md
+++ b/website/source/docs/configuration/storage/consul.html.md
@@ -22,7 +22,7 @@ check.
by HashiCorp.
```hcl
-backend "consul" {
+storage "consul" {
address = "127.0.0.1:8500"
path = "vault"
}
@@ -139,7 +139,7 @@ This example shows a sample physical backend configuration which communicates
with a local Consul agent running on `127.0.0.1:8500`.
```hcl
-backend "consul" {}
+storage "consul" {}
```
### Detailed Customization
@@ -148,7 +148,7 @@ This example shows communicating with Consul on a custom address with an ACL
token.
```hcl
-backend "consul" {
+storage "consul" {
address = "10.5.7.92:8194"
token = "abcd1234"
}
@@ -161,7 +161,7 @@ This path must be readable and writable by the Consul ACL token, if Consul
configured to use ACLs.
```hcl
-backend "consul" {
+storage "consul" {
path = "vault/"
}
```
@@ -171,7 +171,7 @@ backend "consul" {
This example shows communicating with Consul over a local unix socket.
```hcl
-backend "consul" {
+storage "consul" {
address = "unix:///tmp/.consul.http.sock"
}
```
@@ -182,7 +182,7 @@ This example shows using a custom CA, certificate, and key file to securely
communicate with Consul over TLS.
```hcl
-backend "consul" {
+storage "consul" {
scheme = "https"
tls_ca_file = "/etc/pem/vault.ca"
tls_cert_file = "/etc/pem/vault.cert"
diff --git a/website/source/docs/configuration/storage/dynamodb.html.md b/website/source/docs/configuration/storage/dynamodb.html.md
index 48ae6522e..3dc21fb57 100644
--- a/website/source/docs/configuration/storage/dynamodb.html.md
+++ b/website/source/docs/configuration/storage/dynamodb.html.md
@@ -23,7 +23,7 @@ The DynamoDB storage backend is used to persist Vault's data in
you may be referred to the original author.
```hcl
-backend "dynamodb" {
+storage "dynamodb" {
ha_enabled = true
region = "us-west-2"
table = "vault-data"
@@ -99,7 +99,7 @@ discussed in more detail in the [HA concepts page](/docs/concepts/ha.html).
This example shows using a custom table name and read/write capacity.
```hcl
-backend "dynamodb" {
+storage "dynamodb" {
table = "my-vault-data"
read_capacity = 10
@@ -112,7 +112,7 @@ backend "dynamodb" {
This example show enabling high availability for the DynamoDB storage backend.
```hcl
-backend "dynamodb" {
+storage "dynamodb" {
ha_enabled = true
redirect_addr = "vault-leader.my-company.internal"
}
diff --git a/website/source/docs/configuration/storage/etcd.html.md b/website/source/docs/configuration/storage/etcd.html.md
index 098547447..68282b0e7 100644
--- a/website/source/docs/configuration/storage/etcd.html.md
+++ b/website/source/docs/configuration/storage/etcd.html.md
@@ -18,13 +18,13 @@ based on the version of the Etcd cluster.
The v2 API has known issues with HA support and should not be used in HA
scenarios.
-- **Community Supported** – the Etcd storage backend is supported by the
- community. While it has undergone review by HashiCorp employees, they may not
- be as knowledgeable about the technology. If you encounter problems with them,
- you may be referred to the original author.
+- **Community Supported** – the Etcd storage backend is supported by CoreOS.
+ While it has undergone review by HashiCorp employees, they may not be as
+ knowledgeable about the technology. If you encounter problems with them, you
+ may be referred to the original author.
```hcl
-backend "etcd" {
+storage "etcd" {
address = "http://localhost:2379"
etcd_api = "v3"
}
@@ -92,7 +92,7 @@ discussed in more detail in the [HA concepts page](/docs/concepts/ha.html).
This example shows connecting to the Etcd cluster using a username and password.
```hcl
-backend "etcd" {
+storage "etcd" {
username = "user1234"
password = "pass5678"
}
@@ -103,7 +103,7 @@ backend "etcd" {
This example shows storing data in a custom path.
```hcl
-backend "etcd" {
+storage "etcd" {
path = "my-vault-data/"
}
```
@@ -113,7 +113,7 @@ backend "etcd" {
This example show enabling high availability for the Etcd storage backend.
```hcl
-backend "etcd" {
+storage "etcd" {
ha_enabled = true
redirect_addr = "vault-leader.my-company.internal"
}
diff --git a/website/source/docs/configuration/storage/filesystem.html.md b/website/source/docs/configuration/storage/filesystem.html.md
index a33e3be3e..d08c9211e 100644
--- a/website/source/docs/configuration/storage/filesystem.html.md
+++ b/website/source/docs/configuration/storage/filesystem.html.md
@@ -21,7 +21,7 @@ situations, or to develop locally where durability is not critical.
HashiCorp.
```hcl
-backend "file" {
+storage "file" {
path = "/mnt/vault/data"
}
```
@@ -41,7 +41,7 @@ This example shows the Filesytem storage backend being mounted at
`/mnt/vault/data`.
```hcl
-backend "file" {
+storage "file" {
path = "/mnt/vault/data"
}
```
diff --git a/website/source/docs/configuration/storage/google-cloud.html.md b/website/source/docs/configuration/storage/google-cloud.html.md
index baea60e6e..e19f1c2f1 100644
--- a/website/source/docs/configuration/storage/google-cloud.html.md
+++ b/website/source/docs/configuration/storage/google-cloud.html.md
@@ -21,7 +21,7 @@ The Google Cloud storage backend is used to persist Vault's data in
you may be referred to the original author.
```hcl
-backend "gcs" {
+storage "gcs" {
bucket = "my-storage-bucket"
credentials_file = "/tmp/credentials.json"
}
@@ -49,7 +49,7 @@ backend "gcs" {
This example shows a default configuration for the Google Cloud Storage backend.
```hcl
-backend "gcs" {
+storage "gcs" {
bucket = "my-storage-bucket"
credentials_file = "/tmp/credentials.json"
}
diff --git a/website/source/docs/configuration/storage/in-memory.html.md b/website/source/docs/configuration/storage/in-memory.html.md
index f526220bf..5a9efea38 100644
--- a/website/source/docs/configuration/storage/in-memory.html.md
+++ b/website/source/docs/configuration/storage/in-memory.html.md
@@ -6,7 +6,7 @@ description: |-
The In-Memory storage backend is used to persist Vault's data entirely
in-memory on the same machine in which Vault is running. This is useful for
development and experimentation, but use of this backend is highly discouraged
- in production.
+ in production except in very specific use-cases.
---
# In-Memory Storage Backend
@@ -27,7 +27,7 @@ is restarted.
HashiCorp.
```hcl
-backend "inmem" {}
+storage "inmem" {}
```
## `inmem` Parameters
@@ -39,5 +39,5 @@ The In-Memory storage backend has no configuration parameters.
This example shows activating the In-Memory storage backend.
```hcl
-backend "inmem" {}
+storage "inmem" {}
```
diff --git a/website/source/docs/configuration/storage/index.html.md b/website/source/docs/configuration/storage/index.html.md
index 3f6f13fbc..1163fb196 100644
--- a/website/source/docs/configuration/storage/index.html.md
+++ b/website/source/docs/configuration/storage/index.html.md
@@ -20,10 +20,10 @@ choose one from the navigation on the left.
## Configuration
Storage backend configuration is done through the Vault configuration file using
-the `backend` stanza:
+the `storage` stanza:
```hcl
-backend [NAME] {
+storage [NAME] {
[PARAMETERS...]
}
```
@@ -31,7 +31,7 @@ backend [NAME] {
For example:
```hcl
-backend "file" {
+storage "file" {
path = "/mnt/vault/data"
}
```
diff --git a/website/source/docs/configuration/storage/mysql.html.md b/website/source/docs/configuration/storage/mysql.html.md
index 2df1b904e..a71f82737 100644
--- a/website/source/docs/configuration/storage/mysql.html.md
+++ b/website/source/docs/configuration/storage/mysql.html.md
@@ -21,7 +21,7 @@ server or cluster.
you may be referred to the original author.
```hcl
-backend "mysql" {
+storage "mysql" {
username = "user1234"
password = "secret123!"
database = "vault"
@@ -58,7 +58,7 @@ This example shows configuring the MySQL backend to use a custom database and
table name.
```hcl
-backend "mysql" {
+storage "mysql" {
database = "my-vault"
table = "vault-data"
username = "user1234"
diff --git a/website/source/docs/configuration/storage/postgresql.html.md b/website/source/docs/configuration/storage/postgresql.html.md
index bc56ac36b..a127d9e59 100644
--- a/website/source/docs/configuration/storage/postgresql.html.md
+++ b/website/source/docs/configuration/storage/postgresql.html.md
@@ -21,7 +21,7 @@ The PostgreSQL storage backend is used to persist Vault's data in a
you may be referred to the original author.
```hcl
-backend "postgresql" {
+storage "postgresql" {
connection_url = "postgres://user123:secret123!@localhost:5432/vault"
}
```
@@ -60,7 +60,7 @@ This example shows connecting to a PostgresSQL cluster using full SSL
verification (recommended).
```hcl
-backend "postgresql" {
+storage "postgresql" {
connection_url = "postgres://user:pass@localhost:5432/database?sslmode=verify-full"
}
```
@@ -69,7 +69,7 @@ To disable SSL verification (not recommended), replace `verify-full` with
`disable`:
```hcl
-backend "postgresql" {
+storage "postgresql" {
connection_url = "postgres://user:pass@localhost:5432/database?sslmode=disable"
}
```
diff --git a/website/source/docs/configuration/storage/s3.html.md b/website/source/docs/configuration/storage/s3.html.md
index 906c97c46..cbd0acff6 100644
--- a/website/source/docs/configuration/storage/s3.html.md
+++ b/website/source/docs/configuration/storage/s3.html.md
@@ -21,7 +21,7 @@ bucket.
you may be referred to the original author.
```hcl
-backend "s3" {
+storage "s3" {
access_key = "abcd1234"
secret_key = "defg5678"
bucket = "my-bucket"
@@ -62,7 +62,7 @@ cause Vault to attempt to retrieve credentials from the AWS metadata service.
This example shows using Amazon S3 as a storage backed.
```hcl
-backend "s3" {
+storage "s3" {
access_key = "abcd1234"
secret_key = "defg5678"
bucket = "my-bucket"
diff --git a/website/source/docs/configuration/storage/swift.html.md b/website/source/docs/configuration/storage/swift.html.md
index 8d974c0ed..a78678ab8 100644
--- a/website/source/docs/configuration/storage/swift.html.md
+++ b/website/source/docs/configuration/storage/swift.html.md
@@ -22,7 +22,7 @@ The Swift storage backend is used to persist Vault's data in an
you may be referred to the original author.
```hcl
-backend "swift" {
+storage "swift" {
auth_url = "https://..."
username = "admin"
password = "secret123!"
@@ -59,7 +59,7 @@ backend "swift" {
This example shows a default configuration for Swift.
```hcl
-backend "swift" {
+storage "swift" {
auth_url = "https://os.initernal/v1/auth"
container = "container-239"
diff --git a/website/source/docs/configuration/storage/zookeeper.html.md b/website/source/docs/configuration/storage/zookeeper.html.md
index 11b9d8865..6889927ae 100644
--- a/website/source/docs/configuration/storage/zookeeper.html.md
+++ b/website/source/docs/configuration/storage/zookeeper.html.md
@@ -20,7 +20,7 @@ The Zookeeper storage backend is used to persist Vault's data in
you may be referred to the original author.
```hcl
-backend "zookeeper" {
+storage "zookeeper" {
address = "localhost:2181"
path = "vault/"
}
@@ -89,7 +89,7 @@ This example shows configuring Vault to communicate with a Zookeeper
installation running on a custom port and to store data at a custom path.
```hcl
-backend "zookeeper" {
+storage "zookeeper" {
address = "localhost:3253"
path = "my-vault-data/"
}
@@ -102,7 +102,7 @@ access only to the user "vaultUser". As per Zookeeper's ACL model, the digest
value in `znode_owner` must match the user in `znode_owner`.
```hcl
-backend "zookeeper" {
+storage "zookeeper" {
znode_owner = "digest:vaultUser:raxgVAfnDRljZDAcJFxznkZsExs="
auth_info = "digest:vaultUser:abc"
}
@@ -115,7 +115,7 @@ This example instructs Vault to only allow access from localhost. As this is the
for the ACL check.
```hcl
-backend "zookeeper" {
+storage "zookeeper" {
znode_owner = "ip:127.0.0.1"
}
```