X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/0a3d7a02236cbec448203a1b2218b5e0630d1c00..d9bf6da50d29e0778da52bd431f96f544261740d:/doc/admin/management-token.html.textile.liquid diff --git a/doc/admin/management-token.html.textile.liquid b/doc/admin/management-token.html.textile.liquid index 33027ad887..cf3e273ceb 100644 --- a/doc/admin/management-token.html.textile.liquid +++ b/doc/admin/management-token.html.textile.liquid @@ -16,32 +16,44 @@ Services must have ManagementToken configured. This is used to authorize access To access a monitoring endpoint, the requester must provide the HTTP header @Authorization: Bearer (ManagementToken)@. -h2. API server +h2. Node Manager -Set @MangementToken@ in @application.yml@ +Set @port@ (the listen port) and @ManagementToken@ in the @Manage@ section of @node-manager.ini@.
-  # Token to be included in all healthcheck requests. Disabled by default.
-  # Server expects request header of the format "Authorization: Bearer xxx"
-  ManagementToken: ...
-
+[Manage] +# The management server responds to http://addr:port/status.json with +# a snapshot of internal state. -h2. Node Manager +# Management server listening address (default 127.0.0.1) +#address = 0.0.0.0 -Set @port@ (the listen port) and @MangementToken@ in the @Manage@ section of @node-manager.ini@ . +# Management server port number (default -1, server is disabled) +#port = 8989 -
-[Manage]
-port=8888
-ManagementToken=...
+ManagementToken = xxx
 
-h2. Other services +h2. API server and other services -The following services also support health check. Set @MangementToken@ in the respective yaml config file for each service. +The following services also support monitoring. +* API server +* arv-git-httpd +* controller +* keep-balance +* keepproxy * keepstore * keep-web -* keepproxy -* arv-git-httpd * websockets + +Set @ManagementToken@ in the appropriate section of @/etc/arvados/config.yml@. + + +
Clusters:
+  uuid_prefix:
+    # Token to be included in all healthcheck requests. Disabled by default.
+    # Server expects request header of the format "Authorization: Bearer xxx"
+    ManagementToken: xxx
+
+