there seems to be a lot of markdown in the prometheus module that should've been docbook instead. temporarily convert it to docbook to keep the diff for the docbook->md conversion of prometheus inspectable.
···123123 '';
124124125125 credentials = mkOpt types.str ''
126126- Sets the credentials. It is mutually exclusive with `credentials_file`.
126126+ Sets the credentials. It is mutually exclusive with <literal>credentials_file</literal>.
127127 '';
128128129129 credentials_file = mkOpt types.str ''
130130 Sets the credentials to the credentials read from the configured file.
131131- It is mutually exclusive with `credentials`.
131131+ It is mutually exclusive with <literal>credentials</literal>.
132132 '';
133133 };
134134 }) ''
135135- Optional `Authorization` header configuration.
135135+ Optional <literal>Authorization</literal> header configuration.
136136 '';
137137138138 oauth2 = mkOpt promtypes.oauth2 ''
···229229 '';
230230231231 client_secret_file = mkOpt types.str ''
232232- Read the client secret from a file. It is mutually exclusive with `client_secret`.
232232+ Read the client secret from a file. It is mutually exclusive with <literal>client_secret</literal>.
233233 '';
234234235235 scopes = mkOpt (types.listOf types.str) ''
···315315 '';
316316317317 basic_auth = mkOpt promTypes.basic_auth ''
318318- Sets the `Authorization` header on every scrape request with the
318318+ Sets the <literal>Authorization</literal> header on every scrape request with the
319319 configured username and password.
320320 password and password_file are mutually exclusive.
321321 '';
322322323323 bearer_token = mkOpt types.str ''
324324- Sets the `Authorization` header on every scrape request with
324324+ Sets the <literal>Authorization</literal> header on every scrape request with
325325 the configured bearer token. It is mutually exclusive with
326326 <option>bearer_token_file</option>.
327327 '';
328328329329 bearer_token_file = mkOpt types.str ''
330330- Sets the `Authorization` header on every scrape request with
330330+ Sets the <literal>Authorization</literal> header on every scrape request with
331331 the bearer token read from the configured file. It is mutually
332332 exclusive with <option>bearer_token</option>.
333333 '';
···623623 };
624624625625 port = mkDefOpt types.int "80" ''
626626- The port to scrape metrics from, when `role` is nodes, and for discovered
626626+ The port to scrape metrics from, when <literal>role</literal> is nodes, and for discovered
627627 tasks and services that don't have published ports.
628628 '';
629629···1205120512061206 secret_key = mkOpt types.str ''
12071207 Secret key to use when listing targets. https://console.scaleway.com/project/credentials
12081208- It is mutually exclusive with `secret_key_file`.
12081208+ It is mutually exclusive with <literal>secret_key_file</literal>.
12091209 '';
1210121012111211 secret_key_file = mkOpt types.str ''
12121212 Sets the secret key with the credentials read from the configured file.
12131213- It is mutually exclusive with `secret_key`.
12131213+ It is mutually exclusive with <literal>secret_key</literal>.
12141214 '';
1215121512161216 project_id = mkOption {
···14401440 remote write configs.
14411441 '';
14421442 basic_auth = mkOpt promTypes.basic_auth ''
14431443- Sets the `Authorization` header on every remote write request with the
14431443+ Sets the <literal>Authorization</literal> header on every remote write request with the
14441444 configured username and password.
14451445 password and password_file are mutually exclusive.
14461446 '';
14471447 bearer_token = mkOpt types.str ''
14481448- Sets the `Authorization` header on every remote write request with
14491449- the configured bearer token. It is mutually exclusive with `bearer_token_file`.
14481448+ Sets the <literal>Authorization</literal> header on every remote write request with
14491449+ the configured bearer token. It is mutually exclusive with <literal>bearer_token_file</literal>.
14501450 '';
14511451 bearer_token_file = mkOpt types.str ''
14521452- Sets the `Authorization` header on every remote write request with the bearer token
14531453- read from the configured file. It is mutually exclusive with `bearer_token`.
14521452+ Sets the <literal>Authorization</literal> header on every remote write request with the bearer token
14531453+ read from the configured file. It is mutually exclusive with <literal>bearer_token</literal>.
14541454 '';
14551455 tls_config = mkOpt promTypes.tls_config ''
14561456 Configures the remote write request's TLS settings.
···15311531 the local storage should have complete data for.
15321532 '';
15331533 basic_auth = mkOpt promTypes.basic_auth ''
15341534- Sets the `Authorization` header on every remote read request with the
15341534+ Sets the <literal>Authorization</literal> header on every remote read request with the
15351535 configured username and password.
15361536 password and password_file are mutually exclusive.
15371537 '';
15381538 bearer_token = mkOpt types.str ''
15391539- Sets the `Authorization` header on every remote read request with
15401540- the configured bearer token. It is mutually exclusive with `bearer_token_file`.
15391539+ Sets the <literal>Authorization</literal> header on every remote read request with
15401540+ the configured bearer token. It is mutually exclusive with <literal>bearer_token_file</literal>.
15411541 '';
15421542 bearer_token_file = mkOpt types.str ''
15431543- Sets the `Authorization` header on every remote read request with the bearer token
15441544- read from the configured file. It is mutually exclusive with `bearer_token`.
15431543+ Sets the <literal>Authorization</literal> header on every remote read request with the bearer token
15441544+ read from the configured file. It is mutually exclusive with <literal>bearer_token</literal>.
15451545 '';
15461546 tls_config = mkOpt promTypes.tls_config ''
15471547 Configures the remote read request's TLS settings.