Files
vault/website/content/api-docs/system/config-control-group.mdx
Bianca Moreira cf43d3eeed Add administrative namespace docs (#22581)
* Add administrative namespace section to namespaces docs
* Tag sys endpoints with restricted admin alert
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-08-30 09:31:53 -07:00

90 lines
1.8 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
layout: api
page_title: /sys/config/control-group - HTTP API
description: The '/sys/config/control-group' endpoint configures control groups.
---
# `/sys/config/control-group`
@include 'alerts/enterprise-and-hcp-plus.mdx'
The `/sys/config/control-group` endpoint is used to configure Control Group
settings.
## Read control group settings
@include 'alerts/restricted-admin.mdx'
This endpoint returns the current Control Group configuration.
| Method | Path |
| :----- | :-------------------------- |
| `GET` | `/sys/config/control-group` |
### Sample request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/sys/config/control-group
```
### Sample response
```json
{
"max_ttl": "4h"
}
```
## Configure control group settings
@include 'alerts/restricted-admin.mdx'
This endpoint allows configuring control groups.
| Method | Path |
| :----- | :-------------------------- |
| `POST` | `/sys/config/control-group` |
### Parameters
- `max_ttl` `int`  The maximum ttl for a control group wrapping token. This can be provided in seconds or duration (2h).
### Sample payload
```json
{
"max_ttl": "4h"
}
```
### Sample request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
http://127.0.0.1:8200/v1/sys/config/control-group
```
## Delete control group settings
@include 'alerts/restricted-admin.mdx'
This endpoint removes any control group configuration.
| Method | Path |
| :------- | :-------------------------- |
| `DELETE` | `/sys/config/control-group` |
### Sample request
```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
http://127.0.0.1:8200/v1/sys/config/control-group
```