Docs Updates for Client Counting non-entity tokens (#13134)

* some client count docs updates

* Update website/content/docs/concepts/client-count.mdx

Co-authored-by: swayne275 <swayne275@gmail.com>

* remove full link path

* more path shortening for urls

Co-authored-by: swayne275 <swayne275@gmail.com>
This commit is contained in:
Hridoy Roy
2021-11-12 13:12:23 -08:00
committed by GitHub
parent 82d6662787
commit ad385aff3b
2 changed files with 5 additions and 5 deletions

View File

@@ -95,7 +95,7 @@ An "active entity" is a distinct entity that has created one or more tokens in t
A "non-entity token" is a token with no attached entity ID.
Both non-entity tokens and active entities have distinct client IDs. For more information on how clients
map to these client IDs, and how clients are counted, please visit the
[client count](https://www.vaultproject.io/docs/concepts/client-count) concepts page.
[client count](/docs/concepts/client-count) concepts page.
A time period may be specified; otherwise it reports on a default reporting period, such as the
previous twelve calendar months. Reports are only available with month granularity, after each month

View File

@@ -54,7 +54,7 @@ Using the identity system allows for Vault to make sure that entities arent c
### Non-entity Tokens
If you chose to use the [Token Auth Method](https://www.vaultproject.io/docs/auth/token) without an identity, a non-entity token, to avoid driving up client count, always assign each token to a role and entity alias. HashiCorp recommends creating a [Token Role](https://www.vaultproject.io/api-docs/auth/token#create-update-token-role) first, with allowable entity aliases and issuing your token with the appropriate [role and entity alias name](https://www.vaultproject.io/api-docs/auth/token#create-token). This is the name that will uniquely identify the client, no matter how many tokens are issued. See more on entity alias below.
If you chose to use the [Token Auth Method](/docs/auth/token) without an identity to avoid driving up client count, always assign each token to a role and entity alias. HashiCorp recommends creating a [Token Role](/api-docs/auth/token#create-update-token-role) first, with allowable entity aliases and issuing your token with the appropriate [role and entity alias name](/api-docs/auth/token#create-token). This is the name that will uniquely identify the client, no matter how many tokens are issued. See more on entity alias below.
## Authentication Methods and how theyre counted in Vault
@@ -115,7 +115,7 @@ Prior to Vault 1.6, this metric could only be measured from the audit log, using
a contiguous sequence of months, can be measured by Vault itself.
As of Vault 1.9, the total client count should always be measured using Vault itself. The
metrics shown by the Vault UI should be regarded as the source of truth for this data.
metrics shown by the Vault UI are the source of truth for this data.
Please refer to [Vault Usage Metrics](https://learn.hashicorp.com/tutorials/vault/usage-metrics) for a
step-by-step tutorial and description of how to use the UI.
@@ -206,8 +206,8 @@ to say, two non-entity tokens would always be counted as two separate clients.
## Auditing clients
As of Vault 1.9, the Vault Audit Log will contain a `client_id` field in the request. The `client_id` field
will contain an Entity ID for requests that are made with tokens with entities, or a unique client ID for
As of Vault 1.9, the Vault Audit Log contains a `client_id` field in the request. The `client_id` field
contains an Entity ID for requests that are made with tokens with entities, or a unique client ID for
non-entity tokens.
Consumers of the audit log will be able to distinguish between these two types of client IDs by comparing