From 04fc15471bfd05a3ca224d1ff32c2f7ce82c2791 Mon Sep 17 00:00:00 2001 From: Sarah Chavis <62406755+schavis@users.noreply.github.com> Date: Thu, 24 Aug 2023 15:30:17 -0700 Subject: [PATCH] Update alert partials and files that include them (#22556) --- website/content/api-docs/system/config-control-group.mdx | 2 +- .../api-docs/system/config-group-policy-application.mdx | 2 +- website/content/api-docs/system/control-group.mdx | 2 +- website/content/api-docs/system/lease-count-quotas.mdx | 2 +- website/content/api-docs/system/license.mdx | 2 +- website/content/api-docs/system/replication/index.mdx | 2 +- .../system/replication/replication-performance.mdx | 2 +- website/content/api-docs/system/sealwrap-rewrap.mdx | 2 +- .../api-docs/system/storage/raftautosnapshots.mdx | 2 +- .../automated-integrated-storage-snapshots.mdx | 2 +- website/content/docs/enterprise/consistency.mdx | 2 +- website/content/docs/enterprise/control-groups.mdx | 2 +- website/content/docs/enterprise/hsm/behavior.mdx | 2 +- website/content/docs/enterprise/hsm/index.mdx | 2 +- website/content/docs/enterprise/hsm/security.mdx | 2 +- website/content/docs/enterprise/license/autoloading.mdx | 2 +- website/content/docs/enterprise/license/index.mdx | 2 +- .../docs/enterprise/license/utilization-reporting.mdx | 2 +- website/content/docs/enterprise/managed-keys.mdx | 2 +- website/content/docs/enterprise/mfa/index.mdx | 2 +- website/content/docs/enterprise/mfa/mfa-duo.mdx | 2 +- website/content/docs/enterprise/mfa/mfa-okta.mdx | 2 +- website/content/docs/enterprise/mfa/mfa-pingid.mdx | 2 +- website/content/docs/enterprise/mfa/mfa-totp.mdx | 2 +- website/content/docs/enterprise/performance-standby.mdx | 2 +- .../content/docs/enterprise/pkcs11-provider/aws-xks.mdx | 2 +- .../content/docs/enterprise/pkcs11-provider/index.mdx | 2 +- .../docs/enterprise/pkcs11-provider/oracle-tde.mdx | 2 +- website/content/docs/enterprise/redundancy-zones.mdx | 2 +- website/content/docs/enterprise/replication.mdx | 2 +- website/content/docs/enterprise/sealwrap.mdx | 2 +- website/content/docs/enterprise/sentinel/examples.mdx | 2 +- website/content/docs/enterprise/sentinel/index.mdx | 2 +- website/content/docs/enterprise/sentinel/properties.mdx | 2 +- .../content/partials/alerts/enterprise-and-hcp-plus.mdx | 7 +++++++ website/content/partials/alerts/enterprise-and-hcp.mdx | 9 +++++---- 36 files changed, 46 insertions(+), 38 deletions(-) create mode 100644 website/content/partials/alerts/enterprise-and-hcp-plus.mdx diff --git a/website/content/api-docs/system/config-control-group.mdx b/website/content/api-docs/system/config-control-group.mdx index ae7e270503..c7602e682c 100644 --- a/website/content/api-docs/system/config-control-group.mdx +++ b/website/content/api-docs/system/config-control-group.mdx @@ -6,7 +6,7 @@ description: The '/sys/config/control-group' endpoint configures control groups. # `/sys/config/control-group` -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' The `/sys/config/control-group` endpoint is used to configure Control Group settings. diff --git a/website/content/api-docs/system/config-group-policy-application.mdx b/website/content/api-docs/system/config-group-policy-application.mdx index 80fabd0ff1..6946657b52 100644 --- a/website/content/api-docs/system/config-group-policy-application.mdx +++ b/website/content/api-docs/system/config-group-policy-application.mdx @@ -6,7 +6,7 @@ description: The '/sys/config/group-policy-application' endpoint is used to conf # `/sys/config/group-policy-application` -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' The `sys/config/group-policy-application` endpoint can be used to configure the mode of policy application for identity groups in Vault. This setting dictates diff --git a/website/content/api-docs/system/control-group.mdx b/website/content/api-docs/system/control-group.mdx index 8ffd0f5870..02aa6b6c13 100644 --- a/website/content/api-docs/system/control-group.mdx +++ b/website/content/api-docs/system/control-group.mdx @@ -6,7 +6,7 @@ description: The '/sys/control-group' endpoint handles the Control Group workflo ## Authorize control group request -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' This endpoint authorizes a control group request. diff --git a/website/content/api-docs/system/lease-count-quotas.mdx b/website/content/api-docs/system/lease-count-quotas.mdx index 82b8e74916..e090939561 100644 --- a/website/content/api-docs/system/lease-count-quotas.mdx +++ b/website/content/api-docs/system/lease-count-quotas.mdx @@ -6,7 +6,7 @@ description: The `/sys/quotas/lease-count` endpoint is used to create, edit and # `/sys/quotas/lease-count` -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas. diff --git a/website/content/api-docs/system/license.mdx b/website/content/api-docs/system/license.mdx index abc803e55a..cca96f148f 100644 --- a/website/content/api-docs/system/license.mdx +++ b/website/content/api-docs/system/license.mdx @@ -8,7 +8,7 @@ description: |- # `/sys/license/status` -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' The `/sys/license/status` endpoint is used to view update the license used in Vault. diff --git a/website/content/api-docs/system/replication/index.mdx b/website/content/api-docs/system/replication/index.mdx index b18813fc72..77346d076d 100644 --- a/website/content/api-docs/system/replication/index.mdx +++ b/website/content/api-docs/system/replication/index.mdx @@ -8,7 +8,7 @@ description: >- # `/sys/replication` -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' ## Attempt recovery diff --git a/website/content/api-docs/system/replication/replication-performance.mdx b/website/content/api-docs/system/replication/replication-performance.mdx index e08f18447d..2f09ec9409 100644 --- a/website/content/api-docs/system/replication/replication-performance.mdx +++ b/website/content/api-docs/system/replication/replication-performance.mdx @@ -8,7 +8,7 @@ description: >- # `/sys/replication/performance` -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' ## Check performance status diff --git a/website/content/api-docs/system/sealwrap-rewrap.mdx b/website/content/api-docs/system/sealwrap-rewrap.mdx index 5efe23e98f..cbcd4b2df7 100644 --- a/website/content/api-docs/system/sealwrap-rewrap.mdx +++ b/website/content/api-docs/system/sealwrap-rewrap.mdx @@ -8,7 +8,7 @@ description: >- # `/sys/sealwrap/rewrap` -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' The `/sys/sealwrap/rewrap` endpoint is used to rewrap all seal wrapped entries. This is useful when you want to upgrade seal wrapped entries to use the latest diff --git a/website/content/api-docs/system/storage/raftautosnapshots.mdx b/website/content/api-docs/system/storage/raftautosnapshots.mdx index 5dbf7374bf..f67c324cd5 100644 --- a/website/content/api-docs/system/storage/raftautosnapshots.mdx +++ b/website/content/api-docs/system/storage/raftautosnapshots.mdx @@ -16,7 +16,7 @@ snapshots with Vault's Raft storage backend. ## Create/update an automated snapshots config -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' **This endpoint requires sudo capability.** diff --git a/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx b/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx index 774be135a0..18fef818af 100644 --- a/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx +++ b/website/content/docs/enterprise/automated-integrated-storage-snapshots.mdx @@ -9,7 +9,7 @@ description: |- # Automated integrated storage snapshots -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Any production system should include a provision for taking regular backups. Vault Enterprise can be configured to take and store snapshots at a specific diff --git a/website/content/docs/enterprise/consistency.mdx b/website/content/docs/enterprise/consistency.mdx index 40e92cb505..bd0b87e3d7 100644 --- a/website/content/docs/enterprise/consistency.mdx +++ b/website/content/docs/enterprise/consistency.mdx @@ -6,7 +6,7 @@ description: Vault Enterprise Consistency Model # Vault eventual consistency -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' When running in a cluster, Vault has an eventual consistency model. Only one node (the leader) can write to Vault's storage. diff --git a/website/content/docs/enterprise/control-groups.mdx b/website/content/docs/enterprise/control-groups.mdx index 3f91e1acc7..2a05543978 100644 --- a/website/content/docs/enterprise/control-groups.mdx +++ b/website/content/docs/enterprise/control-groups.mdx @@ -6,7 +6,7 @@ description: Vault Enterprise has support for Control Group Authorization. # Vault Enterprise control groups -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Vault Enterprise has support for Control Group Authorization. Control Groups add additional authorization factors to be required before satisfying a request. diff --git a/website/content/docs/enterprise/hsm/behavior.mdx b/website/content/docs/enterprise/hsm/behavior.mdx index 2e0a0c1e8a..43b91515ac 100644 --- a/website/content/docs/enterprise/hsm/behavior.mdx +++ b/website/content/docs/enterprise/hsm/behavior.mdx @@ -8,7 +8,7 @@ description: >- # Vault enterprise HSM behavioral changes -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' This page contains information about the behavioral differences that take effect when using Vault with an HSM. diff --git a/website/content/docs/enterprise/hsm/index.mdx b/website/content/docs/enterprise/hsm/index.mdx index 608e791f6c..09f123ea74 100644 --- a/website/content/docs/enterprise/hsm/index.mdx +++ b/website/content/docs/enterprise/hsm/index.mdx @@ -8,7 +8,7 @@ description: >- # Vault enterprise HSM support -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' - Root key Wrapping: Vault protects its root key by transiting it through the HSM for encryption rather than splitting into key shares diff --git a/website/content/docs/enterprise/hsm/security.mdx b/website/content/docs/enterprise/hsm/security.mdx index cd12571dbf..72fb2730a0 100644 --- a/website/content/docs/enterprise/hsm/security.mdx +++ b/website/content/docs/enterprise/hsm/security.mdx @@ -6,7 +6,7 @@ description: Recommendations to ensure the security of a Vault Enterprise HSM de # Vault enterprise HSM security details -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' This page provides information to help ensure that a Vault HSM deployment is performed as securely as possible. diff --git a/website/content/docs/enterprise/license/autoloading.mdx b/website/content/docs/enterprise/license/autoloading.mdx index 450e8cedcf..ea1155f1fe 100644 --- a/website/content/docs/enterprise/license/autoloading.mdx +++ b/website/content/docs/enterprise/license/autoloading.mdx @@ -6,7 +6,7 @@ description: An overview of license autoloading. # License autoloading -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries that contained embedded licenses, or via a license written into Vault storage diff --git a/website/content/docs/enterprise/license/index.mdx b/website/content/docs/enterprise/license/index.mdx index c5bb7b81ec..a1b44b848c 100644 --- a/website/content/docs/enterprise/license/index.mdx +++ b/website/content/docs/enterprise/license/index.mdx @@ -6,7 +6,7 @@ description: An overview of license. # Vault license -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes. diff --git a/website/content/docs/enterprise/license/utilization-reporting.mdx b/website/content/docs/enterprise/license/utilization-reporting.mdx index da3994eae4..0a52d2f11a 100644 --- a/website/content/docs/enterprise/license/utilization-reporting.mdx +++ b/website/content/docs/enterprise/license/utilization-reporting.mdx @@ -7,7 +7,7 @@ description: >- # Automated license utilization reporting -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Automated license utilization reporting sends license utilization data to HashiCorp without requiring you to manually collect and report them. It also diff --git a/website/content/docs/enterprise/managed-keys.mdx b/website/content/docs/enterprise/managed-keys.mdx index 688c65285d..714a35950c 100644 --- a/website/content/docs/enterprise/managed-keys.mdx +++ b/website/content/docs/enterprise/managed-keys.mdx @@ -7,7 +7,7 @@ description: >- # Managed keys -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Within certain environments, customers want to leverage key management systems external to Vault, when handling, storing, and interacting with diff --git a/website/content/docs/enterprise/mfa/index.mdx b/website/content/docs/enterprise/mfa/index.mdx index 2b7c9d1321..0ed18dab2b 100644 --- a/website/content/docs/enterprise/mfa/index.mdx +++ b/website/content/docs/enterprise/mfa/index.mdx @@ -8,7 +8,7 @@ description: >- # Vault enterprise MFA support -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Vault Enterprise has support for Multi-factor Authentication (MFA), using different authentication types. MFA is built on top of the Identity system of diff --git a/website/content/docs/enterprise/mfa/mfa-duo.mdx b/website/content/docs/enterprise/mfa/mfa-duo.mdx index 54f178c6a4..9f6c03f5a4 100644 --- a/website/content/docs/enterprise/mfa/mfa-duo.mdx +++ b/website/content/docs/enterprise/mfa/mfa-duo.mdx @@ -6,7 +6,7 @@ description: Vault Enterprise supports Duo MFA type. # Duo MFA -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' This page demonstrates the Duo MFA on ACL'd paths of Vault. diff --git a/website/content/docs/enterprise/mfa/mfa-okta.mdx b/website/content/docs/enterprise/mfa/mfa-okta.mdx index 12d0f68b5b..3370fcb6f3 100644 --- a/website/content/docs/enterprise/mfa/mfa-okta.mdx +++ b/website/content/docs/enterprise/mfa/mfa-okta.mdx @@ -6,7 +6,7 @@ description: Vault Enterprise supports Okta MFA type. # Okta MFA -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' This page demonstrates the Okta MFA on ACL'd paths of Vault. diff --git a/website/content/docs/enterprise/mfa/mfa-pingid.mdx b/website/content/docs/enterprise/mfa/mfa-pingid.mdx index 6020a6de23..bda5fbbd91 100644 --- a/website/content/docs/enterprise/mfa/mfa-pingid.mdx +++ b/website/content/docs/enterprise/mfa/mfa-pingid.mdx @@ -6,7 +6,7 @@ description: Vault Enterprise supports PingID MFA type. # PingID MFA -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' This page demonstrates PingID MFA on ACL'd paths of Vault. diff --git a/website/content/docs/enterprise/mfa/mfa-totp.mdx b/website/content/docs/enterprise/mfa/mfa-totp.mdx index d5383e24f4..6d3a69a769 100644 --- a/website/content/docs/enterprise/mfa/mfa-totp.mdx +++ b/website/content/docs/enterprise/mfa/mfa-totp.mdx @@ -6,7 +6,7 @@ description: Vault Enterprise supports TOTP MFA type. # TOTP MFA -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' This page demonstrates the TOTP MFA on ACL'd paths of Vault. diff --git a/website/content/docs/enterprise/performance-standby.mdx b/website/content/docs/enterprise/performance-standby.mdx index 4b25852b56..c02b7c552b 100644 --- a/website/content/docs/enterprise/performance-standby.mdx +++ b/website/content/docs/enterprise/performance-standby.mdx @@ -6,7 +6,7 @@ description: Performance Standby Nodes - Vault Enterprise # Performance standby nodes -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Vault supports a multi-server mode for high availability. This mode protects against outages by running multiple Vault servers. High availability mode diff --git a/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx b/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx index 6df9aac849..b546cac639 100644 --- a/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx +++ b/website/content/docs/enterprise/pkcs11-provider/aws-xks.mdx @@ -7,7 +7,7 @@ description: |- # Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' ~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation. diff --git a/website/content/docs/enterprise/pkcs11-provider/index.mdx b/website/content/docs/enterprise/pkcs11-provider/index.mdx index fe94f489c1..d239fb5be1 100644 --- a/website/content/docs/enterprise/pkcs11-provider/index.mdx +++ b/website/content/docs/enterprise/pkcs11-provider/index.mdx @@ -9,7 +9,7 @@ description: |- # PKCS#11 provider -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' -> **Note**: This feature is part of the [KMIP Secret Engine](/vault/docs/secrets/kmip), which requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) with the Advanced Data Protection Module. diff --git a/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx b/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx index 0f6caeaa59..12e9fb21fd 100644 --- a/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx +++ b/website/content/docs/enterprise/pkcs11-provider/oracle-tde.mdx @@ -7,7 +7,7 @@ description: |- # Oracle TDE -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' [Oracle Transparent Data Encryption](https://docs.oracle.com/en/database/oracle/oracle-database/19/asoag/introduction-to-transparent-data-encryption.html) (TDE) is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider). diff --git a/website/content/docs/enterprise/redundancy-zones.mdx b/website/content/docs/enterprise/redundancy-zones.mdx index e88ad1f27b..2d0aed0759 100644 --- a/website/content/docs/enterprise/redundancy-zones.mdx +++ b/website/content/docs/enterprise/redundancy-zones.mdx @@ -7,7 +7,7 @@ description: |- # Redundancy zones -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling the deployment of non-voting nodes alongside voting nodes on a per availability zone basis. diff --git a/website/content/docs/enterprise/replication.mdx b/website/content/docs/enterprise/replication.mdx index ad276cfa54..fee82d916e 100644 --- a/website/content/docs/enterprise/replication.mdx +++ b/website/content/docs/enterprise/replication.mdx @@ -83,7 +83,7 @@ secondaries to have a different configuration than their primary. Tokens and le ## Performance replication -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' In Performance Replication, secondaries keep track of their own tokens and leases but share the underlying configuration, policies, and supporting secrets (K/V values, diff --git a/website/content/docs/enterprise/sealwrap.mdx b/website/content/docs/enterprise/sealwrap.mdx index da7664017e..c5cc2367f0 100644 --- a/website/content/docs/enterprise/sealwrap.mdx +++ b/website/content/docs/enterprise/sealwrap.mdx @@ -8,7 +8,7 @@ description: |- # Seal wrap -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Vault Enterprise features a mechanism to wrap values with an extra layer of encryption for supporting [seals](/vault/docs/configuration/seal). This adds an diff --git a/website/content/docs/enterprise/sentinel/examples.mdx b/website/content/docs/enterprise/sentinel/examples.mdx index 8a562b4b23..449f805549 100644 --- a/website/content/docs/enterprise/sentinel/examples.mdx +++ b/website/content/docs/enterprise/sentinel/examples.mdx @@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise. # Examples -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Following are some examples that help to introduce concepts. If you are unfamiliar with writing Sentinel policies in Vault, please read through to diff --git a/website/content/docs/enterprise/sentinel/index.mdx b/website/content/docs/enterprise/sentinel/index.mdx index 7ad80e35ec..db3e102541 100644 --- a/website/content/docs/enterprise/sentinel/index.mdx +++ b/website/content/docs/enterprise/sentinel/index.mdx @@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise. # Vault Enterprise and Sentinel integration -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access control functionality. Because Vault is a security-focused product trusted with diff --git a/website/content/docs/enterprise/sentinel/properties.mdx b/website/content/docs/enterprise/sentinel/properties.mdx index b40582bb79..f821248849 100644 --- a/website/content/docs/enterprise/sentinel/properties.mdx +++ b/website/content/docs/enterprise/sentinel/properties.mdx @@ -6,7 +6,7 @@ description: An overview of how Sentinel interacts with Vault Enterprise. # Properties -@include 'alerts/enterprise-and-hcp.mdx' +@include 'alerts/enterprise-and-hcp-plus.mdx' Vault injects a rich set of data into the running Sentinel environment, allowing for very fine-grained controls. The set of available properties are diff --git a/website/content/partials/alerts/enterprise-and-hcp-plus.mdx b/website/content/partials/alerts/enterprise-and-hcp-plus.mdx new file mode 100644 index 0000000000..df78e733b9 --- /dev/null +++ b/website/content/partials/alerts/enterprise-and-hcp-plus.mdx @@ -0,0 +1,7 @@ + + + Vault Enterprise + license or + HCP Vault Plus + cluster required. + \ No newline at end of file diff --git a/website/content/partials/alerts/enterprise-and-hcp.mdx b/website/content/partials/alerts/enterprise-and-hcp.mdx index 3788d7890e..78374554d9 100644 --- a/website/content/partials/alerts/enterprise-and-hcp.mdx +++ b/website/content/partials/alerts/enterprise-and-hcp.mdx @@ -1,6 +1,7 @@ - Vault Enterprise -  license or  - HCP Vault Plus -  cluster required + + Vault Enterprise + license or + HCP Vault + cluster required. \ No newline at end of file