Skip to content

Commit

Permalink
Fix docs for defaults
Browse files Browse the repository at this point in the history
  • Loading branch information
dadgar committed May 30, 2018
1 parent ef6f6cf commit e056eec
Showing 1 changed file with 8 additions and 7 deletions.
15 changes: 8 additions & 7 deletions website/source/docs/agent/configuration/tls.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,17 +58,18 @@ the [Agent's Gossip and RPC Encryption](/docs/agent/encryption.html).
cluster is being upgraded to TLS, and removed after the migration is
complete. This allows the agent to accept both TLS and plaintext traffic.

- `tls_cipher_suites` - Specifies the TLS cipher suites that will be used by
the agent. Known insecure ciphers are disabled (3DES and RC4). By default,
an agent is configured to use TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
- `tls_cipher_suites` `(array<string>: [])` - Specifies the TLS cipher suites
that will be used by the agent. Known insecure ciphers are disabled (3DES and
RC4). By default, an agent is configured to use
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, and
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384.

- `tls_min_version` - Specifies the minimum supported version of TLS. Accepted
values are "tls10", "tls11", "tls12". Defaults to TLS 1.2.
- `tls_min_version` `(string: "tls12")`- Specifies the minimum supported version
of TLS. Accepted values are "tls10", "tls11", "tls12".

- `tls_prefer_server_cipher_suites` - Specifies whether TLS connections should
prefer the server's ciphersuites over the client's. Defaults to false.
- `tls_prefer_server_cipher_suites` `(bool: false)` - Specifies whether
TLS connections should prefer the server's ciphersuites over the client's.

- `verify_https_client` `(bool: false)` - Specifies agents should require
client certificates for all incoming HTTPS requests. The client certificates
Expand Down

0 comments on commit e056eec

Please sign in to comment.