From a966513eae6a34e1bd927edb3e6ac0cf10aabe5f Mon Sep 17 00:00:00 2001 From: James Rodewig Date: Wed, 1 Jul 2020 13:47:14 -0400 Subject: [PATCH] [DOCS] Remove problematic terms (#58832) (#58851) --- docs/reference/mapping/types/range.asciidoc | 4 ++-- x-pack/docs/en/security/overview.asciidoc | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/reference/mapping/types/range.asciidoc b/docs/reference/mapping/types/range.asciidoc index 3966c578632..cc4900bbb5a 100644 --- a/docs/reference/mapping/types/range.asciidoc +++ b/docs/reference/mapping/types/range.asciidoc @@ -185,7 +185,7 @@ https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing#CIDR_notation[CIDR] PUT range_index/_mapping { "properties": { - "ip_whitelist": { + "ip_allowlist": { "type": "ip_range" } } @@ -193,7 +193,7 @@ PUT range_index/_mapping PUT range_index/_doc/2 { - "ip_whitelist" : "192.168.0.0/16" + "ip_allowlist" : "192.168.0.0/16" } -------------------------------------------------- diff --git a/x-pack/docs/en/security/overview.asciidoc b/x-pack/docs/en/security/overview.asciidoc index 2be3b255506..f7909ae64ae 100644 --- a/x-pack/docs/en/security/overview.asciidoc +++ b/x-pack/docs/en/security/overview.asciidoc @@ -45,7 +45,7 @@ See <> and <>. The {security-features} also enable you to restrict the nodes and clients that can connect to the cluster based on <>. You can -whitelist and blacklist specific IP addresses, subnets, or DNS domains to +block and allow specific IP addresses, subnets, or DNS domains to control network-level access to a cluster. [float]