Skip to content

Commit 3753c36

Browse files
committed
RS: Adjusted cluster REST API object table formatting to prevent overlap with on this page menu
1 parent 1788981 commit 3753c36

File tree

1 file changed

+33
-33
lines changed
  • content/operate/rs/references/rest-api/objects/cluster

1 file changed

+33
-33
lines changed

content/operate/rs/references/rest-api/objects/cluster/_index.md

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -17,44 +17,44 @@ An API object that represents the cluster.
1717
|------|------------|-------------|
1818
| alert_settings | [alert_settings]({{< relref "/operate/rs/references/rest-api/objects/cluster/alert_settings" >}}) object | Cluster and node alert settings |
1919
| bigstore_driver | 'speedb'<br />'rocksdb' | Storage engine for [Auto Tiering]({{<relref "/operate/rs/databases/auto-tiering">}}) |
20-
| cluster_ssh_public_key | string | Cluster's autogenerated SSH public key |
21-
| cm_port | integer, (range:&nbsp;1024-65535) | UI HTTPS listening port |
22-
| <span class="break-all">cm_session_timeout_minutes</span> | integer (default:&nbsp;15) | The timeout (in minutes) for the session to the CM |
20+
| <span class="break-all">cluster_ssh_public_key</span> | string | Cluster's autogenerated SSH public key |
21+
| cm_port | integer, (range: 1024-65535) | UI HTTPS listening port |
22+
| <span class="break-all">cm_session_timeout_minutes</span> | integer (default: 15) | The timeout (in minutes) for the session to the CM |
2323
| <span class="break-all">cnm_http_max_threads_per_worker</span> | integer (default: 10) | Maximum number of threads per worker in the `cnm_http` service (deprecated) |
24-
| cnm_http_port | integer, (range:&nbsp;1024-65535) | API HTTP listening port |
24+
| cnm_http_port | integer, (range: 1024-65535) | API HTTP listening port |
2525
| cnm_http_workers | integer (default: 1) | Number of workers in the `cnm_http` service |
26-
| cnm_https_port | integer, (range:&nbsp;1024-65535) | API HTTPS listening port |
26+
| cnm_https_port | integer, (range: 1024-65535) | API HTTPS listening port |
2727
| control_cipher_suites | string | Specifies the enabled ciphers for the control plane. The ciphers are specified in the format understood by the BoringSSL library. |
2828
| <span class="break-all">control_cipher_suites_tls_1_3</span> | string | Specifies the enabled TLS 1.3 ciphers for the control plane. The ciphers are specified in the format understood by the BoringSSL library. (read-only) |
29-
| crdb_coordinator_port | integer, (range:&nbsp;1024-65535) (default:&nbsp;9081) | CRDB coordinator port |
30-
| crdt_rest_client_retries | integer | Maximum number of retries for the REST client used by the Active-Active management API |
31-
| crdt_rest_client_timeout | integer | Timeout for REST client used by the Active-Active management API |
29+
| crdb_coordinator_port | integer, (range: 1024-65535) (default: 9081) | CRDB coordinator port |
30+
| <span class="break-all">crdt_rest_client_retries</span> | integer | Maximum number of retries for the REST client used by the Active-Active management API |
31+
| <span class="break-all">crdt_rest_client_timeout</span> | integer | Timeout for REST client used by the Active-Active management API |
3232
| created_time | string | Cluster creation date (read-only) |
3333
| data_cipher_list | string | Specifies the enabled ciphers for the data plane. The ciphers are specified in the format understood by the OpenSSL library. |
3434
| <span class="break-all">data_cipher_suites_tls_1_3</span> | string | Specifies the enabled TLS 1.3 ciphers for the data plane. |
3535
| debuginfo_path | string | Path to a local directory used when generating support packages |
36-
| <span class="break-all">default_non_sharded_proxy_policy</span> | string (default:&nbsp;single) | Default proxy_policy for newly created non-sharded databases' endpoints (read-only) |
37-
| <span class="break-all">default_sharded_proxy_policy</span> | string (default:&nbsp;all-master-shards) | Default proxy_policy for newly created sharded databases' endpoints (read-only) |
38-
| email_alerts | boolean (default:&nbsp;false) | Send node/cluster email alerts (requires valid SMTP and email_from settings) |
36+
| <span class="break-all">default_non_sharded_proxy_policy</span> | string (default: single) | Default proxy_policy for newly created non-sharded databases' endpoints (read-only) |
37+
| <span class="break-all">default_sharded_proxy_policy</span> | string (default: all-master-shards) | Default proxy_policy for newly created sharded databases' endpoints (read-only) |
38+
| email_alerts | boolean (default: false) | Send node/cluster email alerts (requires valid SMTP and email_from settings) |
3939
| email_from | string | Sender email for automated emails |
40-
| encrypt_pkeys | boolean (default:&nbsp;false) | Enable or turn off encryption of private keys |
41-
| envoy_admin_port | integer, (range:&nbsp;1024-65535) | Envoy admin port. Changing this port during runtime might result in an empty response because envoy serves as the cluster gateway.|
42-
| <span class="break-all">envoy_max_downstream_connections</span> | integer, (range:&nbsp;100-2048) | The max downstream connections envoy is allowed to open |
43-
| envoy_mgmt_server_port | integer, (range:&nbsp;1024-65535) | Envoy management server port|
44-
| gossip_envoy_admin_port | integer, (range:&nbsp;1024-65535) | Gossip envoy admin port|
45-
| handle_redirects | boolean (default:&nbsp;false) | Handle API HTTPS requests and redirect to the master node internally |
46-
| http_support | boolean (default:&nbsp;false) | Enable or turn off HTTP support |
40+
| encrypt_pkeys | boolean (default: false) | Enable or turn off encryption of private keys |
41+
| envoy_admin_port | integer, (range: 1024-65535) | Envoy admin port. Changing this port during runtime might result in an empty response because envoy serves as the cluster gateway.|
42+
| <span class="break-all">envoy_max_downstream_connections</span> | integer, (range: 100-2048) | The max downstream connections envoy is allowed to open |
43+
| <span class="break-all">envoy_mgmt_server_port</span> | integer, (range: 1024-65535) | Envoy management server port|
44+
| <span class="break-all">gossip_envoy_admin_port</span> | integer, (range: 1024-65535) | Gossip envoy admin port|
45+
| handle_redirects | boolean (default: false) | Handle API HTTPS requests and redirect to the master node internally |
46+
| http_support | boolean (default: false) | Enable or turn off HTTP support |
4747
| logrotate_settings | [logrotate_settings]({{<relref "/operate/rs/references/rest-api/objects/cluster/logrotate_settings">}}) object | Settings for logrotate configuration |
48-
| min_control_TLS_version | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the control path |
48+
| <span class="break-all">min_control_TLS_version</span> | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the control path |
4949
| min_data_TLS_version | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the data path |
50-
| min_sentinel_TLS_version | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the data path |
51-
| mtls_authorized_subjects | array | {{<code>}}[{<br /> "CN": string,<br /> "O": string,<br /> "OU": [array of strings],<br /> "L": string,<br /> "ST": string,<br /> "C": string<br />}, ...]{{</code>}} A list of valid subjects used for additional certificate validations during TLS client authentication. All subject attributes are case-sensitive.<br />**Required subject fields**:<br />"CN" for Common Name<br />**Optional subject fields:**<br />"O" for Organization<br />"OU" for Organizational Unit (array of strings)<br />"L" for Locality (city)<br />"ST" for State/Province<br />"C" for 2-letter country code |
50+
| <span class="break-all">min_sentinel_TLS_version</span> | '1.2'<br />'1.3' | The minimum version of TLS protocol which is supported at the data path |
51+
| <span class="break-all">mtls_authorized_subjects</span> | array | {{<code>}}[{<br /> "CN": string,<br /> "O": string,<br /> "OU": [array of strings],<br /> "L": string,<br /> "ST": string,<br /> "C": string<br />}, ...]{{</code>}} A list of valid subjects used for additional certificate validations during TLS client authentication. All subject attributes are case-sensitive.<br />**Required subject fields**:<br />"CN" for Common Name<br />**Optional subject fields:**<br />"O" for Organization<br />"OU" for Organizational Unit (array of strings)<br />"L" for Locality (city)<br />"ST" for State/Province<br />"C" for 2-letter country code |
5252
| <span class="break-all">mtls_certificate_authentication</span> | boolean | Require authentication of client certificates for mTLS connections to the cluster. The API_CA certificate should be configured as a prerequisite. |
5353
| <span class="break-all">mtls_client_cert_subject_validation_type</span> | `disabled`<br />`san_cn`<br />`full_subject` | Enables additional certificate validations that further limit connections to clients with valid certificates during TLS client authentication.<br />Values:<br />**disabled**: Authenticates clients with valid certificates. No additional validations are enforced.<br />**san_cn**: A client certificate is valid only if its Common Name (CN) matches an entry in the list of valid subjects. Ignores other Subject attributes.<br />**full_subject**: A client certificate is valid only if its Subject attributes match an entry in the list of valid subjects. |
5454
| multi_commands_opt | **`disabled`**<br />`batch`<br />`force_disabled` | Determines the default `multi_commands_opt` setting for databases in the cluster. If set to `batch`, it reduces the overhead of transaction management by batching multiple commands into a single transaction.<br />Values:<br />**disabled**: Turns off the optimization for all databases except those that override it on the [bdb level]({{<relref "/operate/rs/references/rest-api/objects/bdb">}}). Default value.<br />**batch**: Enables the optimization on all databases except those that override it on the [bdb level]({{<relref "/operate/rs/references/rest-api/objects/bdb">}}).<br />**force_disabled**: Disables the optimization for all databases, even those that override it on the [bdb level]({{<relref "/operate/rs/references/rest-api/objects/bdb">}}). |
5555
| name | string | Cluster's fully qualified domain name (read-only) |
56-
| password_complexity | boolean (default:&nbsp;false) | Enforce password complexity policy |
57-
| <span class="break-all">password_expiration_duration</span> | integer (default:&nbsp;0) | The number of days a password is valid until the user is required to replace it |
56+
| password_complexity | boolean (default: false) | Enforce password complexity policy |
57+
| <span class="break-all">password_expiration_duration</span> | integer (default: 0) | The number of days a password is valid until the user is required to replace it |
5858
| password_min_length | integer, (range: 8-256) (default: 8) | The minimum length required for a password. |
5959
| proxy_certificate | string | Cluster's proxy certificate |
6060
| <span class="break-all">proxy_max_ccs_disconnection_time</span> | integer | Cluster-wide proxy timeout policy between proxy and CCS |
@@ -64,22 +64,22 @@ An API object that represents the cluster.
6464
| s3_ca_cert | string | Filepath to the PEM-encoded CA certificate to use for validating TLS connections to the S3 server |
6565
| s3_url | string | Specifies the URL for S3 export and import |
6666
| saslauthd_ldap_conf | string | saslauthd LDAP configuration |
67-
| sentinel_cipher_suites | array | Specifies the list of enabled ciphers for the sentinel service. The supported ciphers are those implemented by the [cipher_suites.go](<https://golang.org/src/crypto/tls/cipher_suites.go>) package. |
67+
| <span class="break-all">sentinel_cipher_suites</span> | array | Specifies the list of enabled ciphers for the sentinel service. The supported ciphers are those implemented by the [cipher_suites.go](<https://golang.org/src/crypto/tls/cipher_suites.go>) package. |
6868
| <span class="break-all">sentinel_cipher_suites_tls_1_3<span> | string | Specifies the list of enabled TLS 1.3 ciphers for the discovery (sentinel) service. The supported ciphers are those implemented by the [cipher_suites.go](<https://golang.org/src/crypto/tls/cipher_suites.go>) package.(read-only) |
6969
| sentinel_tls_mode | 'allowed'<br />'disabled' <br />'required' | Determines whether the discovery service allows, blocks, or requires TLS connections (previously named `sentinel_ssl_policy`)<br />**allowed**: Allows both TLS and non-TLS connections<br />**disabled**: Allows only non-TLS connections<br />**required**: Allows only TLS connections |
70-
| slave_ha | boolean (default:&nbsp;false) | Enable the replica high-availability mechanism (read-only) |
71-
| <span class="break-all">slave_ha_bdb_cooldown_period</span> | integer (default:&nbsp;86400) | Time in seconds between runs of the replica high-availability mechanism on different nodes on the same database (read-only) |
72-
| <span class="break-all">slave_ha_cooldown_period</span> | integer (default:&nbsp;3600) | Time in seconds between runs of the replica high-availability mechanism on different nodes (read-only) |
73-
| <span class="break-all">slave_ha_grace_period</span> | integer (default:&nbsp;900) | Time in seconds between a node failure and when the replica high-availability mechanism starts relocating shards (read-only) |
70+
| slave_ha | boolean (default: false) | Enable the replica high-availability mechanism (read-only) |
71+
| <span class="break-all">slave_ha_bdb_cooldown_period</span> | integer (default: 86400) | Time in seconds between runs of the replica high-availability mechanism on different nodes on the same database (read-only) |
72+
| <span class="break-all">slave_ha_cooldown_period</span> | integer (default: 3600) | Time in seconds between runs of the replica high-availability mechanism on different nodes (read-only) |
73+
| <span class="break-all">slave_ha_grace_period</span> | integer (default: 900) | Time in seconds between a node failure and when the replica high-availability mechanism starts relocating shards (read-only) |
7474
| <span class="break-all">slowlog_in_sanitized_support</span> | boolean | Whether to include slowlogs in the sanitized support package |
7575
| smtp_host | string | SMTP server for automated emails |
7676
| smtp_password | string | SMTP server password |
7777
| smtp_port | integer | SMTP server port for automated emails |
7878
| smtp_tls_mode | 'none'<br />'starttls'<br />'tls' | Specifies which TLS mode to use for SMTP access |
79-
| smtp_use_tls | boolean (default:&nbsp;false) | Use TLS for SMTP access (deprecated as of Redis Enterprise v4.3.3, use smtp_tls_mode field instead) |
79+
| smtp_use_tls | boolean (default: false) | Use TLS for SMTP access (deprecated as of Redis Enterprise v4.3.3, use smtp_tls_mode field instead) |
8080
| smtp_username | string | SMTP server username (pattern does not allow special characters &,\<,>,") |
8181
| syncer_certificate | string | Cluster's syncer certificate |
82-
| upgrade_mode | boolean (default:&nbsp;false) | Is cluster currently in upgrade mode |
83-
| use_external_ipv6 | boolean (default:&nbsp;true) | Should redislabs services listen on ipv6 |
84-
| use_ipv6 | boolean (default:&nbsp;true) | Should redislabs services listen on ipv6 (deprecated as of Redis Enterprise v6.4.2, replaced with use_external_ipv6) |
85-
| wait_command | boolean (default:&nbsp;true) | Supports Redis wait command (read-only) |
82+
| upgrade_mode | boolean (default: false) | Is cluster currently in upgrade mode |
83+
| use_external_ipv6 | boolean (default: true) | Should redislabs services listen on ipv6 |
84+
| use_ipv6 | boolean (default: true) | Should redislabs services listen on ipv6 (deprecated as of Redis Enterprise v6.4.2, replaced with use_external_ipv6) |
85+
| wait_command | boolean (default: true) | Supports Redis wait command (read-only) |

0 commit comments

Comments
 (0)