This is an automated email from the ASF dual-hosted git repository.

wusheng pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/skywalking.git


The following commit(s) were added to refs/heads/master by this push:
     new cf08a2d  refine backend doc (#7451)
cf08a2d is described below

commit cf08a2da3797a17e6dfac9c97deeced59ed6104d
Author: Wing <[email protected]>
AuthorDate: Fri Aug 13 06:06:17 2021 -0700

    refine backend doc (#7451)
---
 docs/en/setup/backend/backend-start-up-mode.md    |  22 +-
 docs/en/setup/backend/backend-storage.md          |  97 ++---
 docs/en/setup/backend/backend-telemetry.md        |  47 +-
 docs/en/setup/backend/backend-token-auth.md       |  23 +-
 docs/en/setup/backend/backend-vm-monitoring.md    |  10 +-
 docs/en/setup/backend/backend-zabbix.md           |  16 +-
 docs/en/setup/backend/configuration-vocabulary.md | 505 +++++++++++-----------
 7 files changed, 357 insertions(+), 363 deletions(-)

diff --git a/docs/en/setup/backend/backend-start-up-mode.md 
b/docs/en/setup/backend/backend-start-up-mode.md
index 6b868c2..50d5b1b 100644
--- a/docs/en/setup/backend/backend-start-up-mode.md
+++ b/docs/en/setup/backend/backend-start-up-mode.md
@@ -1,23 +1,21 @@
 # Start up mode
-In different deployment tool, such as k8s, you may need different startup mode.
-We provide another two optional startup modes.
+In different deployment tools, such as k8s, you may need different startup 
modes.
+We provide two other optional startup modes.
 
 ## Default mode
-Default mode. Do initialization works if necessary, start listen and provide 
service. 
+The default mode carries out tasks to initialize as necessary, starts to 
listen, and provide services. 
 
-Run `/bin/oapService.sh`(.bat) to start in this mode. Also when use 
`startup.sh`(.bat) to start.
+Run `/bin/oapService.sh`(.bat) to start in this mode. This is also applicable 
when you're using `startup.sh`(.bat) to start.
 
 ## Init mode
-In this mode, oap server starts up to do initialization works, then exit.
-You could use this mode to init your storage, such as ElasticSearch indexes, 
MySQL and TiDB tables,
-and init data.
+In this mode, the OAP server starts up to carry out initialization, and then 
exits.
+You could use this mode to initialize your storage (such as ElasticSearch 
indexes, MySQL, and TiDB tables),
+as well as your data.
 
 Run `/bin/oapServiceInit.sh`(.bat) to start in this mode.
 
 ## No-init mode
-In this mode, oap server starts up without initialization works,
-but it waits for ElasticSearch indexes, MySQL and TiDB tables existed,
-start listen and provide service. Meaning,
-this oap server expect another oap server to do the initialization.
+In this mode, the OAP server starts up without carrying out initialization. 
Rather, it watches out for the ElasticSearch indexes, MySQL, and TiDB tables,
+starts to listen, and provide services. In other words, the OAP server would 
anticipate having another OAP server to carry out the initialization.
 
-Run `/bin/oapServiceNoInit.sh`(.bat) to start in this mode.
\ No newline at end of file
+Run `/bin/oapServiceNoInit.sh`(.bat) to start in this mode.
diff --git a/docs/en/setup/backend/backend-storage.md 
b/docs/en/setup/backend/backend-storage.md
index 9f56f9c..e750e0d 100644
--- a/docs/en/setup/backend/backend-storage.md
+++ b/docs/en/setup/backend/backend-storage.md
@@ -1,13 +1,13 @@
 # Backend storage
-SkyWalking storage is pluggable, we have provided the following storage 
solutions, you could easily
-use one of them by specifying it as the `selector` in the `application.yml`:
+The SkyWalking storage is pluggable. We have provided the following storage 
solutions, which allows you to easily
+use one of them by specifying it as the `selector` in `application.yml`:
 
 ```yaml
 storage:
   selector: ${SW_STORAGE:elasticsearch7}
 ```
 
-Native supported storage
+Natively supported storage:
 - H2
 - OpenSearch
 - ElasticSearch 6, 7
@@ -18,9 +18,9 @@ Native supported storage
 
 
 ## H2
-Active H2 as storage, set storage provider to **H2** In-Memory Databases. 
Default in distribution package.
-Please read `Database URL Overview` in [H2 official 
document](http://www.h2database.com/html/features.html),
-you could set the target to H2 in **Embedded**, **Server** and **Mixed** modes.
+Activate H2 as storage, set storage provider to **H2** In-Memory Databases. 
Default in distribution package.
+Please read `Database URL Overview` in [H2 official 
document](http://www.h2database.com/html/features.html).
+You can set the target to H2 in **Embedded**, **Server** and **Mixed** modes.
 
 Setting fragment example
 ```yaml
@@ -40,7 +40,7 @@ Please download the `apache-skywalking-bin-es7.tar.gz` if you 
want to use OpenSe
 
 ## ElasticSearch
 
-**NOTICE:** Elastic announced through their blog that Elasticsearch will be 
moving over to a Server Side Public
+**NOTE:** Elastic announced through their blog that Elasticsearch will be 
moving over to a Server Side Public
 License (SSPL), which is incompatible with Apache License 2.0. This license 
change is effective from Elasticsearch
 version 7.11. So please choose the suitable ElasticSearch version according to 
your usage.
 
@@ -49,10 +49,10 @@ version 7.11. So please choose the suitable ElasticSearch 
version according to y
 
 **Required ElasticSearch 6.3.2 or higher. HTTP RestHighLevelClient is used to 
connect server.**
 
-- For ElasticSearch 6.3.2 ~ 7.0.0 (excluded), please download the 
`apache-skywalking-bin.tar.gz`,
-- For ElasticSearch 7.0.0 ~ 8.0.0 (excluded), please download the 
`apache-skywalking-bin-es7.tar.gz`.
+- For ElasticSearch 6.3.2 ~ 7.0.0 (excluded), please download 
`apache-skywalking-bin.tar.gz`.
+- For ElasticSearch 7.0.0 ~ 8.0.0 (excluded), please download 
`apache-skywalking-bin-es7.tar.gz`.
 
-For now, ElasticSearch 6 and ElasticSearch 7 share the same configurations, as 
follows:
+For now, ElasticSearch 6 and ElasticSearch 7 share the same configurations as 
follows:
 
 ```yaml
 storage:
@@ -88,7 +88,7 @@ storage:
 
 ### ElasticSearch 6 With Https SSL Encrypting communications.
 
-example: 
+Example: 
 
 ```yaml
 storage:
@@ -103,37 +103,37 @@ storage:
     protocol: ${SW_STORAGE_ES_HTTP_PROTOCOL:"https"}
     ...
 ```
-- File at `trustStorePath` is being monitored, once it is changed, the 
ElasticSearch client will do reconnecting.
-- `trustStorePass` could be changed on the runtime through [**Secrets 
Management File Of ElasticSearch 
Authentication**](#secrets-management-file-of-elasticsearch-authentication).
+- File at `trustStorePath` is being monitored. Once it is changed, the 
ElasticSearch client will reconnect.
+- `trustStorePass` could be changed in the runtime through [**Secrets 
Management File Of ElasticSearch 
Authentication**](#secrets-management-file-of-elasticsearch-authentication).
 
 ### Daily Index Step
-Daily index step(`storage/elasticsearch/dayStep`, default 1) represents the 
index creation period. In this period, several days(dayStep value)' metrics are 
saved.
+Daily index step(`storage/elasticsearch/dayStep`, default 1) represents the 
index creation period. In this period, metrics for several days (dayStep value) 
are saved.
 
-Mostly, users don't need to change the value manually. As SkyWalking is 
designed to observe large scale distributed system.
-But in some specific cases, users want to set a long TTL value, such as more 
than 60 days, but their ElasticSearch cluster isn't powerful due to the low 
traffic in the production environment.
-This value could be increased to 5(or more), if users could make sure single 
one index could support these days(5 in this case) metrics and traces.
+In most cases, users don't need to change the value manually, as SkyWalking is 
designed to observe large scale distributed systems.
+But in some cases, users may want to set a long TTL value, such as more than 
60 days. However, their ElasticSearch cluster may not be powerful enough due to 
low traffic in the production environment.
+This value could be increased to 5 (or more), if users could ensure a single 
index could support the metrics and traces for these days (5 in this case).
 
-Such as, if dayStep == 11, 
-1. data in [2000-01-01, 2000-01-11] will be merged into the index-20000101.
-1. data in [2000-01-12, 2000-01-22] will be merged into the index-20000112.
+For example, if dayStep == 11, 
+1. Data in [2000-01-01, 2000-01-11] will be merged into the index-20000101.
+1. Data in [2000-01-12, 2000-01-22] will be merged into the index-20000112.
 
-`storage/elasticsearch/superDatasetDayStep` override the 
`storage/elasticsearch/dayStep` if the value is positive.
-This would affect the record related entities, such as the trace segment. In 
some cases, the size of metrics is much less than the record(trace), this would 
help the shards balance in the ElasticSearch cluster.
+`storage/elasticsearch/superDatasetDayStep` overrides the 
`storage/elasticsearch/dayStep` if the value is positive.
+This would affect the record-related entities, such as trace segments. In some 
cases, the size of metrics is much smaller than the record (trace). This would 
improve the shards balance in the ElasticSearch cluster.
  
-NOTICE, TTL deletion would be affected by these. You should set an extra more 
dayStep in your TTL. Such as you want to TTL == 30 days and dayStep == 10, you 
actually need to set TTL = 40;
+NOTE: TTL deletion would be affected by these steps. You should set an extra 
dayStep in your TTL. For example, if you want to have TTL == 30 days and 
dayStep == 10, you are commended to set TTL = 40.
 
 ### Secrets Management File Of ElasticSearch Authentication
 The value of `secretsManagementFile` should point to the secrets management 
file absolute path. 
-The file includes username, password and JKS password of ElasticSearch server 
in the properties format.
+The file includes username, password, and JKS password of the ElasticSearch 
server in the properties format.
 ```properties
 user=xxx
 password=yyy
 trustStorePass=zzz
 ```
 
-The major difference between using `user, password, trustStorePass` configs in 
the `application.yaml` file is, the **Secrets Management File** is being 
watched by the OAP server. 
-Once it is changed manually or through 3rd party tool, such as 
[Vault](https://github.com/hashicorp/vault), 
-the storage provider will use the new username, password and JKS password to 
establish the connection and close the old one. If the information exist in the 
file,
+The major difference between using `user, password, trustStorePass` configs in 
the `application.yaml` file is that the **Secrets Management File** is being 
watched by the OAP server. 
+Once it is changed manually or through a 3rd party tool, such as 
[Vault](https://github.com/hashicorp/vault), 
+the storage provider will use the new username, password, and JKS password to 
establish the connection and close the old one. If the information exists in 
the file,
 the `user/password` will be overrided.
 
 ### Advanced Configurations For Elasticsearch Index
@@ -149,7 +149,7 @@ storage:
 ```
 
 ### Recommended ElasticSearch server-side configurations
-You could add following config to `elasticsearch.yml`, set the value based on 
your env.
+You could add the following configuration to `elasticsearch.yml`, and set the 
value based on your environment.
 
 ```yml
 # In tracing scenario, consider to set more than this at least.
@@ -160,13 +160,12 @@ thread_pool.write.queue_size: 1000 # Suitable for 
ElasticSearch 6 and 7
 index.max_result_window: 1000000
 ```
 
-We strongly advice you to read more about these configurations from 
ElasticSearch official document. 
-This effects the performance of ElasticSearch very much.
+We strongly recommend that you read more about these configurations from 
ElasticSearch's official document, since they have a direct impact on the 
performance of ElasticSearch.
 
 
 ### ElasticSearch 7 with Zipkin trace extension
-This implementation shares most of `elasticsearch7`, just extends to support 
zipkin span storage.
-It has all same configs.
+This implementation is very similar to `elasticsearch7`, except that it 
extends to support Zipkin span storage.
+The configurations are largely the same.
 ```yaml
 storage:
   selector: ${SW_STORAGE:zipkin-elasticsearch7}
@@ -186,13 +185,13 @@ storage:
 ```
 
 ### About Namespace
-When namespace is set, names of all indexes in ElasticSearch will use it as 
prefix.
+When namespace is set, all index names in ElasticSearch will use it as prefix.
 
 ## MySQL
 Active MySQL as storage, set storage provider to **mysql**. 
 
-**NOTICE:** MySQL driver is NOT allowed in Apache official distribution and 
source codes. 
-Please download MySQL driver by yourself. Copy the connection driver jar to 
`oap-libs`.
+**NOTE:** MySQL driver is NOT allowed in Apache official distribution and 
source codes. 
+Please download MySQL driver on your own. Copy the connection driver jar to 
`oap-libs`.
 
 ```yaml
 storage:
@@ -208,12 +207,12 @@ storage:
       dataSource.useServerPrepStmts: 
${SW_DATA_SOURCE_USE_SERVER_PREP_STMTS:true}
     metadataQueryMaxSize: ${SW_STORAGE_MYSQL_QUERY_MAX_SIZE:5000}
 ```
-All connection related settings including link url, username and password are 
in `application.yml`. 
-Here are some of the settings, please follow 
[HikariCP](https://github.com/brettwooldridge/HikariCP) connection pool 
document for all the settings.
+All connection-related settings, including URL link, username, and password 
are found in `application.yml`. 
+Only part of the settings are listed here. See the 
[HikariCP](https://github.com/brettwooldridge/HikariCP) connection pool 
document for full settings.
 
 ## TiDB
-Tested TiDB Server 4.0.8 version and Mysql Client driver 8.0.13 version 
currently.
-Active TiDB as storage, set storage provider to **tidb**. 
+Tested TiDB Server 4.0.8 version and MySQL Client driver 8.0.13 version are 
currently available.
+Activate TiDB as storage, and set storage provider to **tidb**. 
 
 ```yaml
 storage:
@@ -232,8 +231,8 @@ storage:
     maxSizeOfArrayColumn: ${SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN:20}
     numOfSearchableValuesPerTag: 
${SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG:2}
 ```
-All connection related settings including link url, username and password are 
in `application.yml`. 
-These settings can refer to the configuration of *MySQL* above.
+All connection-related settings, including URL link, username, and password 
are found in `application.yml`. 
+For details on settings, refer to the configuration of *MySQL* above.
 
 ## InfluxDB
 InfluxDB storage provides a time-series database as a new storage option.
@@ -250,11 +249,11 @@ storage:
     duration: ${SW_STORAGE_INFLUXDB_DURATION:1000} # the time to wait at most 
(milliseconds)
     fetchTaskLogMaxSize: ${SW_STORAGE_INFLUXDB_FETCH_TASK_LOG_MAX_SIZE:5000} # 
the max number of fetch task log in a request
 ```
-All connection related settings including link url, username and password are 
in `application.yml`. The Metadata storage provider settings can refer to the 
configuration of **H2/MySQL** above.
+All connection related settings, including URL link, username, and password 
are found in `application.yml`. For metadata storage provider settings, refer 
to the configurations of **H2/MySQL** above.
 
 ## PostgreSQL
-PostgreSQL jdbc driver uses version 42.2.18, it supports PostgreSQL 8.2 or 
newer.
-Active PostgreSQL as storage, set storage provider to **postgresql**. 
+PostgreSQL jdbc driver uses version 42.2.18. It supports PostgreSQL 8.2 or 
newer.
+Activate PostgreSQL as storage, and set storage provider to **postgresql**. 
 
 ```yaml
 storage:
@@ -272,9 +271,9 @@ storage:
     maxSizeOfArrayColumn: ${SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN:20}
     numOfSearchableValuesPerTag: 
${SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG:2}
 ```
-All connection related settings including link url, username and password are 
in `application.yml`. 
-Here are some of the settings, please follow 
[HikariCP](https://github.com/brettwooldridge/HikariCP) connection pool 
document for all the settings.
+All connection-related settings, including URL link, username, and password 
are found in `application.yml`. 
+Only part of the settings are listed here. Please follow 
[HikariCP](https://github.com/brettwooldridge/HikariCP) connection pool 
document for full settings.
 
-## More storage solution extension
-Follow [Storage extension development 
guide](../../guides/storage-extention.md) 
-in [Project Extensions document](../../guides/README.md#project-extensions) in 
development guide.
+## More storage extension solutions
+Follow the [Storage extension development 
guide](../../guides/storage-extention.md) 
+in the [Project Extensions 
document](../../guides/README.md#project-extensions).
diff --git a/docs/en/setup/backend/backend-telemetry.md 
b/docs/en/setup/backend/backend-telemetry.md
index a958c54..871f24e 100644
--- a/docs/en/setup/backend/backend-telemetry.md
+++ b/docs/en/setup/backend/backend-telemetry.md
@@ -2,7 +2,7 @@
 The OAP backend cluster itself is a distributed streaming process system. To 
assist the Ops team,
 we provide the telemetry for the OAP backend itself. 
 
-By default, the telemetry is disabled by setting `selector` to `none`, like 
this
+By default, the telemetry is disabled by setting `selector` to `none`, like 
this:
 
 ```yaml
 telemetry:
@@ -16,16 +16,16 @@ telemetry:
     sslCertChainPath: ${SW_TELEMETRY_PROMETHEUS_SSL_CERT_CHAIN_PATH:""}
 ```
 
-but you can set one of `prometheus` to enable them, for more information, 
refer to the details below.
+You may also set `Prometheus` to enable them. For more information, refer to 
the details below.
 
 ## Self Observability
 ### Static IP or hostname
-SkyWalking supports to collect telemetry data into OAP backend directly. Users 
could check them out through UI or
-GraphQL API then.
+SkyWalking supports collecting telemetry data into OAP backend directly. Users 
could check them out through UI or
+GraphQL API.
 
-Adding following configuration to enable self-observability related modules.
+Add the following configuration to enable self-observability related modules.
 
-1. Setting up prometheus telemetry.
+1. Set up prometheus telemetry.
 ```yaml
 telemetry:
   selector: ${SW_TELEMETRY:prometheus}
@@ -34,7 +34,7 @@ telemetry:
     port: 1543
 ```
 
-2. Setting up prometheus fetcher
+2. Set up prometheus fetcher.
 
 ```yaml
 prometheus-fetcher:
@@ -46,8 +46,8 @@ prometheus-fetcher:
 3. Make sure `config/fetcher-prom-rules/self.yaml` exists. 
 
 Once you deploy an oap-server cluster, the target host should be replaced with 
a dedicated IP or hostname. For instances,
-there are three oap server in your cluster, their host is `service1`, 
`service2` and `service3` respectively. You should
-update each `self.yaml` to twist target host.
+there are three OAP servers in your cluster. Their host is `service1`, 
`service2`, and `service3` respectively. You should
+update each `self.yaml` to switch the target host.
 
 service1: 
 ```yaml
@@ -91,25 +91,25 @@ staticConfig:
 ...
 ```
 ### Service discovery (k8s)
-If you deploy an oap-server cluster on k8s, the oap-server instance(pod) could 
not has the static IP or hostname. We can leverage [OpenTelemetry 
Collector](https://opentelemetry.io/docs/collector/getting-started/#kubernetes) 
to discover the oap-server instance and scrape & transfer the metrics to OAP 
[OpenTelemetry receiver](backend-receivers.md#opentelemetry-receiver). 
+If you deploy an oap-server cluster on k8s, the oap-server instance (pod) 
would not have a static IP or hostname. We can leverage [OpenTelemetry 
Collector](https://opentelemetry.io/docs/collector/getting-started/#kubernetes) 
to discover the oap-server instance, and scrape & transfer the metrics to OAP 
[OpenTelemetry receiver](backend-receivers.md#opentelemetry-receiver). 
 
-How to install SkyWalking on k8s can refer to [Apache SkyWalking 
Kubernetes](https://github.com/apache/skywalking-kubernetes)
+On how to install SkyWalking on k8s, you can refer to [Apache SkyWalking 
Kubernetes](https://github.com/apache/skywalking-kubernetes).
 
-To set this up by the following steps:
+Set this up following these steps:
 
-1. Set up oap-server
-- Set the metrics port 
+1. Set up oap-server.
+- Set the metrics port.
   ```
   prometheus-port: 1234
   ```
-- Set environment variables 
+- Set environment variables.
   ```
   SW_TELEMETRY=prometheus 
   SW_OTEL_RECEIVER=default 
   SW_OTEL_RECEIVER_ENABLED_OC_RULES=oap
   ```
 
-  Here is the example to install by Apache SkyWalking Kubernetes:
+  Here is an example to install by Apache SkyWalking Kubernetes:
   ```
   helm -n istio-system install skywalking skywalking \
                --set elasticsearch.replicas=1 \
@@ -144,20 +144,19 @@ To set this up by the following steps:
     regex: (.+)
     replacement: $$1 
 ```
- The full example for OpenTelemetry Collector configuration and recommend 
version can refer to [otel-collector-oap.yaml](otel-collector-oap.yaml).
+For the full example for OpenTelemetry Collector configuration and recommended 
version, you can refer to [otel-collector-oap.yaml](otel-collector-oap.yaml).
 
 
 
 ___
 
-**WARNING**, since Apr 21, 2021, **Grafana** project has been relicensed to 
**AGPL-v3**, no as Apache 2.0 anymore. Check the LICENSE details.
-The following Prometheus + Grafana solution is optional, not a recommendation.
+**NOTE**: Since Apr 21, 2021, the **Grafana** project has been relicensed to 
**AGPL-v3**, and is no longer licensed for Apache 2.0. Check the LICENSE 
details.
+The following Prometheus + Grafana solution is optional, rather than 
recommended.
 
 ## Prometheus
-Prometheus is supported as telemetry implementor. 
-By using this, prometheus collects metrics from SkyWalking backend.
+Prometheus is supported as a telemetry implementor, which collects metrics 
from SkyWalking's backend.
 
-Set `prometheus` to provider. The endpoint open at `http://0.0.0.0:1234/` and 
`http://0.0.0.0:1234/metrics`.
+Set `prometheus` to provider. The endpoint opens at `http://0.0.0.0:1234/` and 
`http://0.0.0.0:1234/metrics`.
 ```yaml
 telemetry:
   selector: ${SW_TELEMETRY:prometheus}
@@ -173,7 +172,7 @@ telemetry:
     port: 1543
 ```
 
-Set SSL relevant settings to expose a secure endpoint. Notice private key file 
and cert chain file could be uploaded once
+Set relevant SSL settings to expose a secure endpoint. Note that the private 
key file and cert chain file could be uploaded once
 changes are applied to them.
 ```yaml
 telemetry:
@@ -187,7 +186,7 @@ telemetry:
 ```
 
 ### Grafana Visualization
-Provide the grafana dashboard settings. 
+Provide the Grafana dashboard settings. 
 Check [SkyWalking OAP Cluster Monitor Dashboard](grafana-cluster.json) config 
and [SkyWalking OAP Instance Monitor Dashboard](grafana-instance.json) config.
 
 
diff --git a/docs/en/setup/backend/backend-token-auth.md 
b/docs/en/setup/backend/backend-token-auth.md
index 9579a23..78c62b5 100644
--- a/docs/en/setup/backend/backend-token-auth.md
+++ b/docs/en/setup/backend/backend-token-auth.md
@@ -2,12 +2,12 @@
 ## Supported version
 7.0.0+
 
-## Why need token authentication after we have TLS?
-TLS is about transport security, which makes sure the network can be trusted. 
-The token authentication is about monitoring application data **can be 
trusted**.
+## Why do we need token authentication after TLS?
+TLS is about transport security, which makes sure that a network can be 
trusted. 
+On the other hand, token authentication is about monitoring **whether 
application data can be trusted**.
 
 ## Token 
-In current version, Token is considered as a simple string.
+In the current version, token is considered a simple string.
 
 ### Set Token
 1. Set token in agent.config file
@@ -25,19 +25,18 @@ receiver-sharing-server:
 ······
 ```
 
-## Authentication fails
-The Skywalking OAP verifies every request from agent, only allows requests 
whose token matches the one configured in `application.yml`.
+## Authentication failure
+The Skywalking OAP verifies every request from the agent, and only allows 
requests whose token matches the one configured in `application.yml` to pass 
through.
 
-If the token is not right, you will see the following log in agent
+If the token does not match, you will see the following log in the agent:
 ```
 org.apache.skywalking.apm.dependencies.io.grpc.StatusRuntimeException: 
PERMISSION_DENIED
 ```
 
 ## FAQ
 ### Can I use token authentication instead of TLS?
-No, you shouldn't. In tech way, you can of course, but token and TLS are used 
for untrusted network env. In that circumstance,
-TLS has higher priority than this. Token can be trusted only under TLS 
protection.Token can be stolen easily if you 
-send it through a non-TLS network.
+No, you shouldn't. Of course it's technically possible, but token and TLS are 
used for untrusted network environments. In these circumstances,
+TLS has a higher priority. Tokens can be trusted only under TLS protection, 
and they can be easily stolen if sent through a non-TLS network.
 
-### Do you support other authentication mechanisms? Such as ak/sk?
-For now, no. But we appreciate someone contributes this feature. 
+### Do you support other authentication mechanisms, such as ak/sk?
+Not for now. But we welcome contributions on this feature. 
diff --git a/docs/en/setup/backend/backend-vm-monitoring.md 
b/docs/en/setup/backend/backend-vm-monitoring.md
index 4202f13..3093ee5 100644
--- a/docs/en/setup/backend/backend-vm-monitoring.md
+++ b/docs/en/setup/backend/backend-vm-monitoring.md
@@ -1,16 +1,16 @@
 # VMs monitoring 
-SkyWalking leverages Prometheus node-exporter for collecting metrics data from 
the VMs, and leverages OpenTelemetry Collector to transfer the metrics to
+SkyWalking leverages Prometheus node-exporter to collect metrics data from the 
VMs, and leverages OpenTelemetry Collector to transfer the metrics to
 [OpenTelemetry receiver](backend-receivers.md#opentelemetry-receiver) and into 
the [Meter System](./../../concepts-and-designs/meter.md).  
 We define the VM entity as a `Service` in OAP, and use `vm::` as a prefix to 
identify it.  
 
 ## Data flow
 1. The Prometheus node-exporter collects metrics data from the VMs.
-2. The OpenTelemetry Collector fetches metrics from the node-exporter via 
Prometheus Receiver and pushes metrics to SkyWalking OAP Server via the 
OpenCensus gRPC Exporter.
+2. The OpenTelemetry Collector fetches metrics from node-exporter via 
Prometheus Receiver and pushes metrics to the SkyWalking OAP Server via the 
OpenCensus gRPC Exporter.
 3. The SkyWalking OAP Server parses the expression with 
[MAL](../../concepts-and-designs/mal.md) to filter/calculate/aggregate and 
store the results. 
 
 ## Setup 
-1. Setup [Prometheus 
node-exporter](https://prometheus.io/docs/guides/node-exporter/).
-2. Setup [OpenTelemetry Collector ](https://opentelemetry.io/docs/collector/). 
This is an example for OpenTelemetry Collector configuration 
[otel-collector-config.yaml](../../../../test/e2e/e2e-test/docker/promOtelVM/otel-collector-config.yaml).
+1. Set up [Prometheus 
node-exporter](https://prometheus.io/docs/guides/node-exporter/).
+2. Set up [OpenTelemetry Collector 
](https://opentelemetry.io/docs/collector/). This is an example for 
OpenTelemetry Collector configuration 
[otel-collector-config.yaml](../../../../test/e2e/e2e-test/docker/promOtelVM/otel-collector-config.yaml).
 3. Config SkyWalking [OpenTelemetry 
receiver](backend-receivers.md#opentelemetry-receiver).
    
 ## Supported Metrics
@@ -23,7 +23,7 @@ We define the VM entity as a `Service` in OAP, and use `vm::` 
as a prefix to ide
 | CPU Average Used | % | meter_vm_cpu_average_used | The percentage usage of 
the CPU core in each mode | Prometheus node-exporter |
 | CPU Load |  | meter_vm_cpu_load1<br />meter_vm_cpu_load5<br 
/>meter_vm_cpu_load15 | The CPU 1m / 5m / 15m average load | Prometheus 
node-exporter |
 | Memory RAM | MB | meter_vm_memory_total<br />meter_vm_memory_available<br 
/>meter_vm_memory_used | The RAM statistics, including Total / Available / Used 
| Prometheus node-exporter |
-| Memory Swap | MB | meter_vm_memory_swap_free<br />meter_vm_memory_swap_total 
| The swap memory statistics, including Free / Total | Prometheus node-exporter 
|
+| Memory Swap | MB | meter_vm_memory_swap_free<br />meter_vm_memory_swap_total 
| Swap memory statistics, including Free / Total | Prometheus node-exporter |
 | File System Mountpoint Usage | % | meter_vm_filesystem_percentage | The 
percentage usage of the file system at each mount point | Prometheus 
node-exporter |
 | Disk R/W | KB/s | meter_vm_disk_read,meter_vm_disk_written | The disk read 
and written | Prometheus node-exporter |
 | Network Bandwidth Usage | KB/s | meter_vm_network_receive<br 
/>meter_vm_network_transmit | The network receive and transmit | Prometheus 
node-exporter |
diff --git a/docs/en/setup/backend/backend-zabbix.md 
b/docs/en/setup/backend/backend-zabbix.md
index 513062b..97d0b19 100644
--- a/docs/en/setup/backend/backend-zabbix.md
+++ b/docs/en/setup/backend/backend-zabbix.md
@@ -1,8 +1,8 @@
 # Zabbix Receiver
-Zabbix receiver is accepting the metrics of [Zabbix Agent Active Checks 
protocol](https://www.zabbix.com/documentation/current/manual/appendix/items/activepassive#active_checks)
 format into the [Meter System](./../../concepts-and-designs/meter.md).
-Zabbix Agent is base on GPL-2.0 License.
+The Zabbix receiver acceps metrics of [Zabbix Agent Active Checks 
protocol](https://www.zabbix.com/documentation/current/manual/appendix/items/activepassive#active_checks)
 format into the [Meter System](./../../concepts-and-designs/meter.md).
+Zabbix Agent is based on GPL-2.0 License.
 
-## Module define
+## Module definition
 ```yaml
 receiver-zabbix:
   selector: ${SW_RECEIVER_ZABBIX:default}
@@ -16,16 +16,16 @@ receiver-zabbix:
 ```
 
 ## Configuration file
-Zabbix receiver is configured via a configuration file. The configuration file 
defines everything related to receiving 
+The Zabbix receiver is configured via a configuration file that defines 
everything related to receiving 
  from agents, as well as which rule files to load.
  
-OAP can load the configuration at bootstrap. If the new configuration is not 
well-formed, OAP fails to start up. The files
+The OAP can load the configuration at bootstrap. If the new configuration is 
not well-formed, the OAP fails to start up. The files
 are located at `$CLASSPATH/zabbix-rules`.
 
 The file is written in YAML format, defined by the scheme described below. 
Square brackets indicate that a parameter is optional.
 
-An example for zabbix agent configuration could be found 
[here](../../../../test/e2e/e2e-test/docker/zabbix/zabbix_agentd.conf).
-You could find the Zabbix agent detail items from [Zabbix Agent 
documentation](https://www.zabbix.com/documentation/current/manual/config/items/itemtypes/zabbix_agent).
+An example for Zabbix agent configuration could be found 
[here](../../../../test/e2e/e2e-test/docker/zabbix/zabbix_agentd.conf).
+You could find details on Zabbix agent items from [Zabbix Agent 
documentation](https://www.zabbix.com/documentation/current/manual/config/items/itemtypes/zabbix_agent).
 
 ### Configuration file
 
@@ -70,4 +70,4 @@ name: <string>
 exp: <string>
 ```
 
-More about MAL, please refer to [mal.md](../../concepts-and-designs/mal.md).
+For more on MAL, please refer to [mal.md](../../concepts-and-designs/mal.md).
diff --git a/docs/en/setup/backend/configuration-vocabulary.md 
b/docs/en/setup/backend/configuration-vocabulary.md
index e671774..4592250 100644
--- a/docs/en/setup/backend/configuration-vocabulary.md
+++ b/docs/en/setup/backend/configuration-vocabulary.md
@@ -1,297 +1,296 @@
 # Configuration Vocabulary
-Configuration Vocabulary lists all available configurations provided by 
`application.yml`.
+The Configuration Vocabulary lists all available configurations provided by 
`application.yml`.
 
 Module | Provider | Settings | Value(s) and Explanation | System Environment 
Variable¹ | Default |
 ----------- | ---------- | --------- | --------- |--------- |--------- |
-core|default|role|Option values, `Mixed/Receiver/Aggregator`. **Receiver** 
mode OAP open the service to the agents, analysis and aggregate the results and 
forward the results for distributed aggregation. Aggregator mode OAP receives 
data from Mixer and Receiver role OAP nodes, and do 2nd level aggregation. 
**Mixer** means being Receiver and Aggregator both.|SW_CORE_ROLE|Mixed|
-| - | - | restHost| Binding IP of restful service. Services include GraphQL 
query and HTTP data report|SW_CORE_REST_HOST|0.0.0.0|
-| - | - | restPort | Binding port of restful service | SW_CORE_REST_PORT|12800|
-| - | - | restContextPath| Web context path of restful service| 
SW_CORE_REST_CONTEXT_PATH|/|
-| - | - | restMinThreads| Min threads number of restful service| 
SW_CORE_REST_JETTY_MIN_THREADS|1|
-| - | - | restMaxThreads| Max threads number of restful service| 
SW_CORE_REST_JETTY_MAX_THREADS|200|
-| - | - | restIdleTimeOut| Connector idle timeout in milliseconds of restful 
service| SW_CORE_REST_JETTY_IDLE_TIMEOUT|30000|
-| - | - | restAcceptorPriorityDelta| Thread priority delta to give to acceptor 
threads of restful service| SW_CORE_REST_JETTY_DELTA|0|
-| - | - | restAcceptQueueSize| ServerSocketChannel backlog  of restful 
service| SW_CORE_REST_JETTY_QUEUE_SIZE|0|
-| - | - | httpMaxRequestHeaderSize| Maximum request header size accepted| 
SW_CORE_HTTP_MAX_REQUEST_HEADER_SIZE|8192|
-| - | - | gRPCHost|Binding IP of gRPC service. Services include gRPC data 
report and internal communication among OAP nodes|SW_CORE_GRPC_HOST|0.0.0.0|
-| - | - | gRPCPort| Binding port of gRPC service | SW_CORE_GRPC_PORT|11800|
-| - | - | gRPCSslEnabled| Activate SSL for gRPC service | 
SW_CORE_GRPC_SSL_ENABLED|false|
-| - | - | gRPCSslKeyPath| The file path of gRPC SSL key| 
SW_CORE_GRPC_SSL_KEY_PATH| - |
-| - | - | gRPCSslCertChainPath| The file path of gRPC SSL cert chain| 
SW_CORE_GRPC_SSL_CERT_CHAIN_PATH| - |
-| - | - | gRPCSslTrustedCAPath| The file path of gRPC trusted CA| 
SW_CORE_GRPC_SSL_TRUSTED_CA_PATH| - |
-| - | - | downsampling| The activated level of down sampling aggregation | | 
Hour,Day|
-| - | - | persistentPeriod| The execution period of the persistent timer. Unit 
is second. | | 25 |
-| - | - | enableDataKeeperExecutor|Controller of TTL scheduler. Once disabled, 
TTL wouldn't work.|SW_CORE_ENABLE_DATA_KEEPER_EXECUTOR|true|
-| - | - | dataKeeperExecutePeriod|The execution period of TTL scheduler, unit 
is minute. Execution doesn't mean deleting data. The storage provider could 
override this, such as ElasticSearch 
storage.|SW_CORE_DATA_KEEPER_EXECUTE_PERIOD|5|
-| - | - | recordDataTTL|The lifecycle of record data. Record data includes 
traces, top n sampled records, and logs. Unit is day. Minimal value is 
2.|SW_CORE_RECORD_DATA_TTL|3|
-| - | - | metricsDataTTL|The lifecycle of metrics data, including the 
metadata. Unit is day. Recommend metricsDataTTL >= recordDataTTL. Minimal value 
is 2.| SW_CORE_METRICS_DATA_TTL|7|
-| - | - | l1FlushPeriod| The period of L1 aggregation flush to L2 aggregation. 
Unit is ms. | SW_CORE_L1_AGGREGATION_FLUSH_PERIOD | 500 |
-| - | - | storageSessionTimeout| The threshold of session time. Unit is ms. 
Default value is 70s. | SW_CORE_STORAGE_SESSION_TIMEOUT | 70000 |
-| - | - | enableDatabaseSession|Cache metrics data for 1 minute to reduce 
database queries, and if the OAP cluster changes within that 
minute.|SW_CORE_ENABLE_DATABASE_SESSION|true|
-| - | - | topNReportPeriod|The execution period of top N sampler, which saves 
sampled data into the storage. Unit is minute|SW_CORE_TOPN_REPORT_PERIOD|10|
-| - | - | activeExtraModelColumns|Append the names of entity, such as service 
name, into the metrics storage 
entities.|SW_CORE_ACTIVE_EXTRA_MODEL_COLUMNS|false|
-| - | - | serviceNameMaxLength| Max length limitation of service 
name.|SW_SERVICE_NAME_MAX_LENGTH|70|
-| - | - | instanceNameMaxLength| Max length limitation of service instance 
name. The max length of service + instance names should be less than 
200.|SW_INSTANCE_NAME_MAX_LENGTH|70|
-| - | - | endpointNameMaxLength| Max length limitation of endpoint name. The 
max length of service + endpoint names should be less than 
240.|SW_ENDPOINT_NAME_MAX_LENGTH|150|
-| - | - | searchableTracesTags | Define the set of span tag keys, which should 
be searchable through the GraphQL. Multiple values should be separated through 
the comma. | SW_SEARCHABLE_TAG_KEYS | 
http.method,status_code,db.type,db.instance,mq.queue,mq.topic,mq.broker|
-| - | - | searchableLogsTags | Define the set of log tag keys, which should be 
searchable through the GraphQL. Multiple values should be separated through the 
comma. | SW_SEARCHABLE_LOGS_TAG_KEYS | level |
-| - | - | searchableAlarmTags | Define the set of alarm tag keys, which should 
be searchable through the GraphQL. Multiple values should be separated through 
the comma. | SW_SEARCHABLE_ALARM_TAG_KEYS | level |
-| - | - | gRPCThreadPoolSize|Pool size of gRPC server| 
SW_CORE_GRPC_THREAD_POOL_SIZE | CPU core * 4|
-| - | - | gRPCThreadPoolQueueSize| The queue size of gRPC server| 
SW_CORE_GRPC_POOL_QUEUE_SIZE | 10000|
+core|default|role|Option values: `Mixed/Receiver/Aggregator`. **Receiver** 
mode OAP opens the service to the agents, then analyzes and aggregates the 
results, and forwards the results for distributed aggregation. Aggregator mode 
OAP receives data from Mixer and Receiver role OAP nodes, and performs 2nd 
level aggregation. **Mixer** means both Receiver and Aggregator. 
|SW_CORE_ROLE|Mixed|
+| - | - | restHost| Binding IP of RESTful services. Services include GraphQL 
query and HTTP data report. |SW_CORE_REST_HOST|0.0.0.0|
+| - | - | restPort | Binding port of RESTful services. | 
SW_CORE_REST_PORT|12800|
+| - | - | restContextPath| Web context path of RESTful services. | 
SW_CORE_REST_CONTEXT_PATH|/|
+| - | - | restMinThreads| Minimum thread number of RESTful services. | 
SW_CORE_REST_JETTY_MIN_THREADS|1|
+| - | - | restMaxThreads| Maximum thread number of RESTful services. | 
SW_CORE_REST_JETTY_MAX_THREADS|200|
+| - | - | restIdleTimeOut| Connector idle timeout of RESTful services (in 
milliseconds). | SW_CORE_REST_JETTY_IDLE_TIMEOUT|30000|
+| - | - | restAcceptorPriorityDelta| Thread priority delta to give to acceptor 
threads of RESTful services. | SW_CORE_REST_JETTY_DELTA|0|
+| - | - | restAcceptQueueSize| ServerSocketChannel Backlog of RESTful 
services. | SW_CORE_REST_JETTY_QUEUE_SIZE|0|
+| - | - | httpMaxRequestHeaderSize| Maximum request header size accepted. | 
SW_CORE_HTTP_MAX_REQUEST_HEADER_SIZE|8192|
+| - | - | gRPCHost| Binding IP of gRPC services, including gRPC data report 
and internal communication among OAP nodes. |SW_CORE_GRPC_HOST|0.0.0.0|
+| - | - | gRPCPort| Binding port of gRPC services. | SW_CORE_GRPC_PORT|11800|
+| - | - | gRPCSslEnabled| Activates SSL for gRPC services. | 
SW_CORE_GRPC_SSL_ENABLED|false|
+| - | - | gRPCSslKeyPath| File path of gRPC SSL key. | 
SW_CORE_GRPC_SSL_KEY_PATH| - |
+| - | - | gRPCSslCertChainPath| File path of gRPC SSL cert chain. | 
SW_CORE_GRPC_SSL_CERT_CHAIN_PATH| - |
+| - | - | gRPCSslTrustedCAPath| File path of gRPC trusted CA. | 
SW_CORE_GRPC_SSL_TRUSTED_CA_PATH| - |
+| - | - | downsampling| Activated level of down sampling aggregation. | | 
Hour,Day|
+| - | - | persistentPeriod| Execution period of the persistent timer (in 
seconds). | | 25 |
+| - | - | enableDataKeeperExecutor| Controller of TTL scheduler. Once 
disabled, TTL wouldn't work. |SW_CORE_ENABLE_DATA_KEEPER_EXECUTOR|true|
+| - | - | dataKeeperExecutePeriod| Execution period of TTL scheduler (in 
minutes). Execution doesn't mean deleting data. The storage provider (e.g. 
ElasticSearch storage) could override 
this.|SW_CORE_DATA_KEEPER_EXECUTE_PERIOD|5|
+| - | - | recordDataTTL| The lifecycle of record data (in days). Record data 
includes traces, top N sample records, and logs. Minimum value is 2. 
|SW_CORE_RECORD_DATA_TTL|3|
+| - | - | metricsDataTTL| The lifecycle of metrics data (in days), including 
metadata. We recommend setting metricsDataTTL >= recordDataTTL. Minimum value 
is 2. | SW_CORE_METRICS_DATA_TTL|7|
+| - | - | l1FlushPeriod| The period of L1 aggregation flush to L2 aggregation 
(in milliseconds). | SW_CORE_L1_AGGREGATION_FLUSH_PERIOD | 500 |
+| - | - | storageSessionTimeout| The threshold of session time (in 
milliseconds). Default value is 70000. | SW_CORE_STORAGE_SESSION_TIMEOUT | 
70000 |
+| - | - | enableDatabaseSession| Cache metrics data for 1 minute to reduce 
database queries, and if the OAP cluster changes within that minute. 
|SW_CORE_ENABLE_DATABASE_SESSION|true|
+| - | - | topNReportPeriod|The execution period (in minutes) of top N sampler, 
which saves sampled data into the storage. |SW_CORE_TOPN_REPORT_PERIOD|10|
+| - | - | activeExtraModelColumns|Appends entity names (e.g. service names) 
into metrics storage entities. |SW_CORE_ACTIVE_EXTRA_MODEL_COLUMNS|false|
+| - | - | serviceNameMaxLength| Maximum length limit of service names. 
|SW_SERVICE_NAME_MAX_LENGTH|70|
+| - | - | instanceNameMaxLength| Maximum length limit of service instance 
names. The maximum length of service + instance names should be less than 
200.|SW_INSTANCE_NAME_MAX_LENGTH|70|
+| - | - | endpointNameMaxLength| Maximum length limit of endpoint names. The 
maximum length of service + endpoint names should be less than 
240.|SW_ENDPOINT_NAME_MAX_LENGTH|150|
+| - | - | searchableTracesTags | Defines a set of span tag keys which are 
searchable through GraphQL. Multiple values are separated by commas. | 
SW_SEARCHABLE_TAG_KEYS | 
http.method,status_code,db.type,db.instance,mq.queue,mq.topic,mq.broker|
+| - | - | searchableLogsTags | Defines a set of log tag keys which are 
searchable through GraphQL. Multiple values are separated by commas. | 
SW_SEARCHABLE_LOGS_TAG_KEYS | level |
+| - | - | searchableAlarmTags | Defines a set of alarm tag keys which are 
searchable through GraphQL. Multiple values are separated by commas. | 
SW_SEARCHABLE_ALARM_TAG_KEYS | level |
+| - | - | gRPCThreadPoolSize| Pool size of gRPC server. | 
SW_CORE_GRPC_THREAD_POOL_SIZE | CPU core * 4|
+| - | - | gRPCThreadPoolQueueSize| Queue size of gRPC server. | 
SW_CORE_GRPC_POOL_QUEUE_SIZE | 10000|
 | - | - | maxConcurrentCallsPerConnection | The maximum number of concurrent 
calls permitted for each incoming connection. Defaults to no limit. | 
SW_CORE_GRPC_MAX_CONCURRENT_CALL | - |
-| - | - | maxMessageSize | Sets the maximum message size allowed to be 
received on the server. Empty means 4 MiB | SW_CORE_GRPC_MAX_MESSAGE_SIZE | 
4M(based on Netty) |
-| - | - | remoteTimeout |Timeout for cluster internal communication, in 
seconds.| - |20|
-| - | - | maxSizeOfNetworkAddressAlias|Max size of network address detected in 
the be monitored system.| - | 1_000_000|
-| - | - | maxPageSizeOfQueryProfileSnapshot|The max size in every OAP query 
for snapshot analysis| - | 500 |
-| - | - | maxSizeOfAnalyzeProfileSnapshot|The max number of snapshots analyzed 
by OAP| - | 12000 |
-| - | - | prepareThreads|The number of threads used to prepare metrics data to 
the storage.| SW_CORE_PREPARE_THREADS | 2 |
-| - | - | enableEndpointNameGroupingByOpenapi |Turn it on then automatically 
grouping endpoint by the given OpenAPI definitions.| 
SW_CORE_ENABLE_ENDPOINT_NAME_GROUPING_BY_OPAENAPI | true |
-|cluster|standalone| - | standalone is not suitable for one node running, no 
available configuration.| - | - |
-| - | zookeeper|nameSpace|The namespace, represented by root path, isolates 
the configurations in the zookeeper.|SW_NAMESPACE| `/`, root path|
-| - | - | hostPort|hosts and ports of Zookeeper 
Cluster|SW_CLUSTER_ZK_HOST_PORT| localhost:2181|
-| - | - | baseSleepTimeMs|The period of Zookeeper client between two retries. 
Unit is ms.|SW_CLUSTER_ZK_SLEEP_TIME|1000|
-| - | - | maxRetries| The max retry time of 
re-trying.|SW_CLUSTER_ZK_MAX_RETRIES|3|
-| - | - | enableACL| Open ACL by using `schema` and 
`expression`|SW_ZK_ENABLE_ACL| false|
-| - | - | schema | schema for the authorization|SW_ZK_SCHEMA|digest|
-| - | - | expression | expression for the 
authorization|SW_ZK_EXPRESSION|skywalking:skywalking|
-| - | - | internalComHost| The hostname registered in the Zookeeper for the 
internal communication of OAP cluster.| - | -|
-| - | - | internalComPort| The port registered in the Zookeeper for the 
internal communication of OAP cluster.| - | -1|
-| - | kubernetes| namespace| Namespace SkyWalking deployed in the 
k8s|SW_CLUSTER_K8S_NAMESPACE|default|
-| - | - | labelSelector| Labels used for filtering the OAP deployment in the 
k8s|SW_CLUSTER_K8S_LABEL| app=collector,release=skywalking|
+| - | - | maxMessageSize | Sets the maximum message size allowed to be 
received on the server. Empty means 4 MiB. | SW_CORE_GRPC_MAX_MESSAGE_SIZE | 
4M(based on Netty) |
+| - | - | remoteTimeout | Timeout for cluster internal communication (in 
seconds). | - |20|
+| - | - | maxSizeOfNetworkAddressAlias| The maximum size of network address 
detected in the system being monitored. | - | 1_000_000|
+| - | - | maxPageSizeOfQueryProfileSnapshot| The maximum size for snapshot 
analysis in an OAP query. | - | 500 |
+| - | - | maxSizeOfAnalyzeProfileSnapshot| The maximum number of snapshots 
analyzed by the OAP. | - | 12000 |
+| - | - | prepareThreads| The number of threads used to prepare metrics data 
to the storage. | SW_CORE_PREPARE_THREADS | 2 |
+| - | - | enableEndpointNameGroupingByOpenapi | Automatically groups endpoints 
by the given OpenAPI definitions. | 
SW_CORE_ENABLE_ENDPOINT_NAME_GROUPING_BY_OPAENAPI | true |
+|cluster|standalone| - | Standalone is not suitable for running on a single 
node running. No configuration available. | - | - |
+| - | zookeeper|nameSpace| The namespace, represented by root path, isolates 
the configurations in Zookeeper.|SW_NAMESPACE| `/`, root path|
+| - | - | hostPort| Hosts and ports of Zookeeper Cluster. 
|SW_CLUSTER_ZK_HOST_PORT| localhost:2181|
+| - | - | baseSleepTimeMs| The period of Zookeeper client between two retries 
(in milliseconds). |SW_CLUSTER_ZK_SLEEP_TIME|1000|
+| - | - | maxRetries| The maximum retry time. |SW_CLUSTER_ZK_MAX_RETRIES|3|
+| - | - | enableACL| Opens ACL using `schema` and `expression`. 
|SW_ZK_ENABLE_ACL| false|
+| - | - | schema | Schema for the authorization. |SW_ZK_SCHEMA|digest|
+| - | - | expression | Expression for the authorization. 
|SW_ZK_EXPRESSION|skywalking:skywalking|
+| - | - | internalComHost| The hostname registered in Zookeeper for the 
internal communication of OAP cluster. | - | -|
+| - | - | internalComPort| The port registered in Zookeeper for the internal 
communication of OAP cluster. | - | -1|
+| - | kubernetes| namespace| Namespace deployed by SkyWalking in k8s. 
|SW_CLUSTER_K8S_NAMESPACE|default|
+| - | - | labelSelector| Labels used for filtering OAP deployment in k8s. 
|SW_CLUSTER_K8S_LABEL| app=collector,release=skywalking|
 | - | - | uidEnvName| Environment variable name for reading uid. | 
SW_CLUSTER_K8S_UID|SKYWALKING_COLLECTOR_UID|
-| - | consul| serviceName| Service name used for SkyWalking cluster. 
|SW_SERVICE_NAME|SkyWalking_OAP_Cluster|
-| - | - | hostPort| hosts and ports used of Consul cluster.| 
SW_CLUSTER_CONSUL_HOST_PORT|localhost:8500|
-| - | - | aclToken| ALC Token of Consul. Empty string means `without ALC 
token`.| SW_CLUSTER_CONSUL_ACLTOKEN | - |
-| - | - | internalComHost| The hostname registered in the Consul for the 
internal communication of OAP cluster.| - | -|
-| - | - | internalComPort| The port registered in the Consul for the internal 
communication of OAP cluster.| - | -1|
-| - | etcd| serviceName| Service name used for SkyWalking cluster. 
|SW_CLUSTER_ETCD_SERVICE_NAME|SkyWalking_OAP_Cluster|
-| - | - | endpoints| hosts and ports used of etcd cluster.| 
SW_CLUSTER_ETCD_ENDPOINTS|localhost:2379|
-| - | - | namespace | Namespace used for SkyWalking cluster. 
|SW_CLUSTER_ETCD_NAMESPACE | /skywalking |
-| - | - | authentication | Whether has authentication. | 
SW_CLUSTER_ETCD_AUTHENTICATION | false |
-| - | - | user | Etcd auth username | SW_CLUSTER_ETCD_USER | |
-| - | - | password | Etcd auth password | SW_CLUSTER_ETCD_PASSWORD | |
-| - | Nacos| serviceName| Service name used for SkyWalking cluster. 
|SW_SERVICE_NAME|SkyWalking_OAP_Cluster|
-| - | - | hostPort| hosts and ports used of Nacos cluster.| 
SW_CLUSTER_NACOS_HOST_PORT|localhost:8848|
-| - | - | namespace| Namespace used by SkyWalking node coordination.| 
SW_CLUSTER_NACOS_NAMESPACE|public|
-| - | - | internalComHost| The hostname registered in the Nacos for the 
internal communication of OAP cluster.| - | -|
-| - | - | internalComPort| The port registered in the Nacos for the internal 
communication of OAP cluster.| - | -1|
-| - | - | username | Nacos Auth username | SW_CLUSTER_NACOS_USERNAME | - |
-| - | - | password | Nacos Auth password | SW_CLUSTER_NACOS_PASSWORD | - |
-| - | - | accessKey | Nacos Auth accessKey | SW_CLUSTER_NACOS_ACCESSKEY | - |
-| - | - | secretKey | Nacos Auth secretKey  | SW_CLUSTER_NACOS_SECRETKEY | - |
-| storage|elasticsearch| - | ElasticSearch 6 storage implementation | - | - |
+| - | consul| serviceName| Service name for SkyWalking cluster. 
|SW_SERVICE_NAME|SkyWalking_OAP_Cluster|
+| - | - | hostPort| Hosts and ports for Consul cluster.| 
SW_CLUSTER_CONSUL_HOST_PORT|localhost:8500|
+| - | - | aclToken| ACL Token of Consul. Empty string means `without ALC 
token`. | SW_CLUSTER_CONSUL_ACLTOKEN | - |
+| - | - | internalComHost| The hostname registered in Consul for internal 
communications of the OAP cluster. | - | -|
+| - | - | internalComPort| The port registered in Consul for internal 
communications of the OAP cluster. | - | -1|
+| - | etcd| serviceName| Service name for SkyWalking cluster. 
|SW_CLUSTER_ETCD_SERVICE_NAME|SkyWalking_OAP_Cluster|
+| - | - | endpoints| Hosts and ports for etcd cluster. | 
SW_CLUSTER_ETCD_ENDPOINTS|localhost:2379|
+| - | - | namespace | Namespace for SkyWalking cluster. 
|SW_CLUSTER_ETCD_NAMESPACE | /skywalking |
+| - | - | authentication | Indicates whether there is authentication. | 
SW_CLUSTER_ETCD_AUTHENTICATION | false |
+| - | - | user | Etcd auth username. | SW_CLUSTER_ETCD_USER | |
+| - | - | password | Etcd auth password. | SW_CLUSTER_ETCD_PASSWORD | |
+| - | Nacos| serviceName| Service name for SkyWalking cluster. 
|SW_SERVICE_NAME|SkyWalking_OAP_Cluster|
+| - | - | hostPort| Hosts and ports for Nacos cluster.| 
SW_CLUSTER_NACOS_HOST_PORT|localhost:8848|
+| - | - | namespace| Namespace used by SkyWalking node coordination. | 
SW_CLUSTER_NACOS_NAMESPACE|public|
+| - | - | internalComHost| The hostname registered in Nacos for internal 
communications of the OAP cluster. | - | -|
+| - | - | internalComPort| The port registered in Nacos for internal 
communications of the OAP cluster. | - | -1|
+| - | - | username | Nacos Auth username. | SW_CLUSTER_NACOS_USERNAME | - |
+| - | - | password | Nacos Auth password. | SW_CLUSTER_NACOS_PASSWORD | - |
+| - | - | accessKey | Nacos Auth accessKey. | SW_CLUSTER_NACOS_ACCESSKEY | - |
+| - | - | secretKey | Nacos Auth secretKey.  | SW_CLUSTER_NACOS_SECRETKEY | - |
+| storage|elasticsearch| - | ElasticSearch 6 storage implementation. | - | - |
 | - | - | nameSpace | Prefix of indexes created and used by SkyWalking. | 
SW_NAMESPACE | - |
 | - | - | clusterNodes | ElasticSearch cluster nodes for client connection.| 
SW_STORAGE_ES_CLUSTER_NODES |localhost|
 | - | - | protocol | HTTP or HTTPs. | SW_STORAGE_ES_HTTP_PROTOCOL | HTTP|
-| - | - | connectTimeout | Connect timeout of ElasticSearch client. Unit is 
ms. | SW_STORAGE_ES_CONNECT_TIMEOUT | 500|
-| - | - | socketTimeout | Socket timeout of ElasticSearch client. Unit is ms. 
| SW_STORAGE_ES_SOCKET_TIMEOUT | 30000|
-| - | - | user| User name of ElasticSearch cluster| SW_ES_USER | - |
-| - | - | password | Password of ElasticSearch cluster | SW_ES_PASSWORD | - |
-| - | - | trustStorePath | Trust JKS file path. Only work when user name and 
password opened | SW_STORAGE_ES_SSL_JKS_PATH | - |
-| - | - | trustStorePass | Trust JKS file password. Only work when user name 
and password opened | SW_STORAGE_ES_SSL_JKS_PASS | - |
-| - | - | secretsManagementFile| Secrets management file in the properties 
format includes the username, password, which are managed by 3rd party tool. 
Provide the capability to update them in the 
runtime.|SW_ES_SECRETS_MANAGEMENT_FILE | - |
-| - | - | dayStep| Represent the number of days in the one minute/hour/day 
index.| SW_STORAGE_DAY_STEP | 1|
-| - | - | indexShardsNumber | Shard number of new indexes | 
SW_STORAGE_ES_INDEX_SHARDS_NUMBER | 1 |
-| - | - | indexReplicasNumber | Replicas number of new indexes | 
SW_STORAGE_ES_INDEX_REPLICAS_NUMBER | 0 |
-| - | - | superDatasetDayStep | Represent the number of days in the super size 
dataset record index, the default value is the same as dayStep when the value 
is less than 0.|SW_SUPERDATASET_STORAGE_DAY_STEP|-1 |
-| - | - | superDatasetIndexShardsFactor | Super data set has been defined in 
the codes, such as trace segments. This factor provides more shards for the 
super data set, shards number = indexShardsNumber * 
superDatasetIndexShardsFactor. Also, this factor effects Zipkin and Jaeger 
traces.|SW_STORAGE_ES_SUPER_DATASET_INDEX_SHARDS_FACTOR|5 |
-| - | - | superDatasetIndexReplicasNumber | Represent the replicas number in 
the super size dataset record 
index.|SW_STORAGE_ES_SUPER_DATASET_INDEX_REPLICAS_NUMBER|0 |
+| - | - | connectTimeout | Connect timeout of ElasticSearch client (in 
milliseconds). | SW_STORAGE_ES_CONNECT_TIMEOUT | 500|
+| - | - | socketTimeout | Socket timeout of ElasticSearch client (in 
milliseconds). | SW_STORAGE_ES_SOCKET_TIMEOUT | 30000|
+| - | - | user| Username of ElasticSearch cluster. | SW_ES_USER | - |
+| - | - | password | Password of ElasticSearch cluster. | SW_ES_PASSWORD | - |
+| - | - | trustStorePath | Trust JKS file path. Only works when username and 
password are enabled. | SW_STORAGE_ES_SSL_JKS_PATH | - |
+| - | - | trustStorePass | Trust JKS file password. Only works when username 
and password are enabled. | SW_STORAGE_ES_SSL_JKS_PASS | - |
+| - | - | secretsManagementFile| Secrets management file in the properties 
format, including username and password, which are managed by a 3rd party tool. 
Capable of being updated them at runtime. |SW_ES_SECRETS_MANAGEMENT_FILE | - |
+| - | - | dayStep| Represents the number of days in the one-minute/hour/day 
index. | SW_STORAGE_DAY_STEP | 1|
+| - | - | indexShardsNumber | Shard number of new indexes. | 
SW_STORAGE_ES_INDEX_SHARDS_NUMBER | 1 |
+| - | - | indexReplicasNumber | Replicas number of new indexes. | 
SW_STORAGE_ES_INDEX_REPLICAS_NUMBER | 0 |
+| - | - | superDatasetDayStep | Represents the number of days in the super 
size dataset record index. Default value is the same as dayStep when the value 
is less than 0. |SW_SUPERDATASET_STORAGE_DAY_STEP|-1 |
+| - | - | superDatasetIndexShardsFactor | Super dataset is defined in the code 
(e.g. trace segments). This factor provides more shards for the super dataset: 
shards number = indexShardsNumber * superDatasetIndexShardsFactor. This factor 
also affects Zipkin and Jaeger traces. 
|SW_STORAGE_ES_SUPER_DATASET_INDEX_SHARDS_FACTOR|5 |
+| - | - | superDatasetIndexReplicasNumber | Represents the replicas number in 
the super size dataset record index. 
|SW_STORAGE_ES_SUPER_DATASET_INDEX_REPLICAS_NUMBER|0 |
 | - | - | indexTemplateOrder| The order of index template. | 
SW_STORAGE_ES_INDEX_TEMPLATE_ORDER| 0|
 | - | - | bulkActions| Async bulk size of the record data batch execution. | 
SW_STORAGE_ES_BULK_ACTIONS| 5000|
-| - | - | flushInterval| Period of flush, no matter `bulkActions` reached or 
not. Unit is second. INT(flushInterval * 2/3) would be used for index refresh 
period.| SW_STORAGE_ES_FLUSH_INTERVAL | 15 (index refresh period = 10)|
+| - | - | flushInterval| Period of flush (in seconds). Does not matter whether 
`bulkActions` is reached or not. INT(flushInterval * 2/3) is used for index 
refresh period. | SW_STORAGE_ES_FLUSH_INTERVAL | 15 (index refresh period = 10)|
 | - | - | concurrentRequests| The number of concurrent requests allowed to be 
executed. | SW_STORAGE_ES_CONCURRENT_REQUESTS| 2 |
-| - | - | resultWindowMaxSize | The max size of dataset when OAP loading 
cache, such as network alias. | SW_STORAGE_ES_QUERY_MAX_WINDOW_SIZE | 10000|
-| - | - | metadataQueryMaxSize | The max size of metadata per query. | 
SW_STORAGE_ES_QUERY_MAX_SIZE | 5000 |
-| - | - | segmentQueryMaxSize | The max size of trace segments per query. | 
SW_STORAGE_ES_QUERY_SEGMENT_SIZE | 200|
-| - | - | profileTaskQueryMaxSize | The max size of profile task per query. | 
SW_STORAGE_ES_QUERY_PROFILE_TASK_SIZE | 200|
-| - | - | advanced | All settings of ElasticSearch index creation. The value 
should be in JSON format | SW_STORAGE_ES_ADVANCED | - |
-| - |elasticsearch7| - | ElasticSearch 7 storage implementation | - | - |
+| - | - | resultWindowMaxSize | The maximum size of dataset when the OAP loads 
cache, such as network aliases. | SW_STORAGE_ES_QUERY_MAX_WINDOW_SIZE | 10000|
+| - | - | metadataQueryMaxSize | The maximum size of metadata per query. | 
SW_STORAGE_ES_QUERY_MAX_SIZE | 5000 |
+| - | - | segmentQueryMaxSize | The maximum size of trace segments per query. 
| SW_STORAGE_ES_QUERY_SEGMENT_SIZE | 200|
+| - | - | profileTaskQueryMaxSize | The maximum size of profile task per 
query. | SW_STORAGE_ES_QUERY_PROFILE_TASK_SIZE | 200|
+| - | - | advanced | All settings of ElasticSearch index creation. The value 
should be in JSON format. | SW_STORAGE_ES_ADVANCED | - |
+| - |elasticsearch7| - | ElasticSearch 7 storage implementation. | - | - |
 | - | - | nameSpace | Prefix of indexes created and used by SkyWalking. | 
SW_NAMESPACE | - |
 | - | - | clusterNodes | ElasticSearch cluster nodes for client connection.| 
SW_STORAGE_ES_CLUSTER_NODES |localhost|
 | - | - | protocol | HTTP or HTTPs. | SW_STORAGE_ES_HTTP_PROTOCOL | HTTP|
-| - | - | connectTimeout | Connect timeout of ElasticSearch client. Unit is 
ms. | SW_STORAGE_ES_CONNECT_TIMEOUT | 500|
-| - | - | socketTimeout | Socket timeout of ElasticSearch client. Unit is ms. 
| SW_STORAGE_ES_SOCKET_TIMEOUT | 30000|
-| - | - | user| User name of ElasticSearch cluster| SW_ES_USER | - |
-| - | - | password | Password of ElasticSearch cluster | SW_ES_PASSWORD | - |
-| - | - | trustStorePath | Trust JKS file path. Only work when user name and 
password opened | SW_STORAGE_ES_SSL_JKS_PATH | - |
-| - | - | trustStorePass | Trust JKS file password. Only work when user name 
and password opened | SW_STORAGE_ES_SSL_JKS_PASS | - |
-| - | - | secretsManagementFile| Secrets management file in the properties 
format includes the username, password, which are managed by 3rd party tool. 
Provide the capability to update them in the 
runtime.|SW_ES_SECRETS_MANAGEMENT_FILE | - |
-| - | - | dayStep| Represent the number of days in the one minute/hour/day 
index.| SW_STORAGE_DAY_STEP | 1|
-| - | - | indexShardsNumber | Shard number of new indexes | 
SW_STORAGE_ES_INDEX_SHARDS_NUMBER | 1 |
-| - | - | indexReplicasNumber | Replicas number of new indexes | 
SW_STORAGE_ES_INDEX_REPLICAS_NUMBER | 0 |
-| - | - | superDatasetDayStep | Represent the number of days in the super size 
dataset record index, the default value is the same as dayStep when the value 
is less than 0.|SW_SUPERDATASET_STORAGE_DAY_STEP|-1 |
-| - | - | superDatasetIndexShardsFactor | Super data set has been defined in 
the codes, such as trace segments. This factor provides more shards for the 
super data set, shards number = indexShardsNumber * 
superDatasetIndexShardsFactor. Also, this factor effects Zipkin and Jaeger 
traces.|SW_STORAGE_ES_SUPER_DATASET_INDEX_SHARDS_FACTOR|5 |
-| - | - | superDatasetIndexReplicasNumber | Represent the replicas number in 
the super size dataset record 
index.|SW_STORAGE_ES_SUPER_DATASET_INDEX_REPLICAS_NUMBER|0 |
+| - | - | connectTimeout | Connect timeout of ElasticSearch client (in 
milliseconds). | SW_STORAGE_ES_CONNECT_TIMEOUT | 500|
+| - | - | socketTimeout | Socket timeout of ElasticSearch client (in 
milliseconds). | SW_STORAGE_ES_SOCKET_TIMEOUT | 30000|
+| - | - | user| Username of ElasticSearch cluster.| SW_ES_USER | - |
+| - | - | password | Password of ElasticSearch cluster. | SW_ES_PASSWORD | - |
+| - | - | trustStorePath | Trust JKS file path. Only works when username and 
password are enabled. | SW_STORAGE_ES_SSL_JKS_PATH | - |
+| - | - | trustStorePass | Trust JKS file password. Only works when username 
and password are enabled. | SW_STORAGE_ES_SSL_JKS_PASS | - |
+| - | - | secretsManagementFile| Secrets management file in the properties 
format, including username and password, which are managed by a 3rd party tool. 
Capable of being updated at runtime. |SW_ES_SECRETS_MANAGEMENT_FILE | - |
+| - | - | dayStep| Represents the number of days in the one-minute/hour/day 
index. | SW_STORAGE_DAY_STEP | 1|
+| - | - | indexShardsNumber | Shard number of new indexes. | 
SW_STORAGE_ES_INDEX_SHARDS_NUMBER | 1 |
+| - | - | indexReplicasNumber | Replicas number of new indexes. | 
SW_STORAGE_ES_INDEX_REPLICAS_NUMBER | 0 |
+| - | - | superDatasetDayStep | Represents the number of days in the super 
size dataset record index. Default value is the same as dayStep when the value 
is less than 0. |SW_SUPERDATASET_STORAGE_DAY_STEP|-1 |
+| - | - | superDatasetIndexShardsFactor | Super dataset is defined in the code 
(e.g. trace segments). This factor provides more shards for the super dataset: 
shards number = indexShardsNumber * superDatasetIndexShardsFactor. This factor 
also affects Zipkin and Jaeger traces. 
|SW_STORAGE_ES_SUPER_DATASET_INDEX_SHARDS_FACTOR|5 |
+| - | - | superDatasetIndexReplicasNumber | Represents the replicas number in 
the super size dataset record index. 
|SW_STORAGE_ES_SUPER_DATASET_INDEX_REPLICAS_NUMBER|0 |
 | - | - | indexTemplateOrder| The order of index template. | 
SW_STORAGE_ES_INDEX_TEMPLATE_ORDER| 0|
 | - | - | bulkActions| Async bulk size of data batch execution. | 
SW_STORAGE_ES_BULK_ACTIONS| 5000|
-| - | - | flushInterval| Period of flush, no matter `bulkActions` reached or 
not. Unit is second. INT(flushInterval * 2/3) would be used for index refresh 
period.| SW_STORAGE_ES_FLUSH_INTERVAL | 15 (index refresh period = 10)|
+| - | - | flushInterval| Period of flush (in seconds). Does not matter whether 
`bulkActions` is reached or not. INT(flushInterval * 2/3) is used for index 
refresh period. | SW_STORAGE_ES_FLUSH_INTERVAL | 15 (index refresh period = 10)|
 | - | - | concurrentRequests| The number of concurrent requests allowed to be 
executed. | SW_STORAGE_ES_CONCURRENT_REQUESTS| 2 |
-| - | - | resultWindowMaxSize | The max size of dataset when OAP loading 
cache, such as network alias. | SW_STORAGE_ES_QUERY_MAX_WINDOW_SIZE | 10000|
-| - | - | metadataQueryMaxSize | The max size of metadata per query. | 
SW_STORAGE_ES_QUERY_MAX_SIZE | 5000 |
-| - | - | segmentQueryMaxSize | The max size of trace segments per query. | 
SW_STORAGE_ES_QUERY_SEGMENT_SIZE | 200|
-| - | - | profileTaskQueryMaxSize | The max size of profile task per query. | 
SW_STORAGE_ES_QUERY_PROFILE_TASK_SIZE | 200|
-| - | - | advanced | All settings of ElasticSearch index creation. The value 
should be in JSON format | SW_STORAGE_ES_ADVANCED | - |
-| - |h2| - |  H2 storage is designed for demonstration and running in short 
term(1-2 hours) only | - | - |
+| - | - | resultWindowMaxSize | The maximum size of dataset when the OAP loads 
cache, such as network aliases. | SW_STORAGE_ES_QUERY_MAX_WINDOW_SIZE | 10000|
+| - | - | metadataQueryMaxSize | The maximum size of metadata per query. | 
SW_STORAGE_ES_QUERY_MAX_SIZE | 5000 |
+| - | - | segmentQueryMaxSize | The maximum size of trace segments per query. 
| SW_STORAGE_ES_QUERY_SEGMENT_SIZE | 200|
+| - | - | profileTaskQueryMaxSize | The maximum size of profile task per 
query. | SW_STORAGE_ES_QUERY_PROFILE_TASK_SIZE | 200|
+| - | - | advanced | All settings of ElasticSearch index creation. The value 
should be in JSON format. | SW_STORAGE_ES_ADVANCED | - |
+| - |h2| - |  H2 storage is designed for demonstration and running in short 
term (i.e. 1-2 hours) only. | - | - |
 | - | - | driver | H2 JDBC driver. | SW_STORAGE_H2_DRIVER | 
org.h2.jdbcx.JdbcDataSource|
-| - | - | url | H2 connection URL. Default is H2 memory mode | 
SW_STORAGE_H2_URL | jdbc:h2:mem:skywalking-oap-db |
-| - | - | user | User name of H2 database. | SW_STORAGE_H2_USER | sa |
+| - | - | url | H2 connection URL. Defaults to H2 memory mode. | 
SW_STORAGE_H2_URL | jdbc:h2:mem:skywalking-oap-db |
+| - | - | user | Username of H2 database. | SW_STORAGE_H2_USER | sa |
 | - | - | password | Password of H2 database. | - | - | 
-| - | - | metadataQueryMaxSize | The max size of metadata per query. | 
SW_STORAGE_H2_QUERY_MAX_SIZE | 5000 |
-| - | - | maxSizeOfArrayColumn | Some entities, such as trace segment, include 
the logic column with multiple values. In the H2, we use multiple physical 
columns to host the values, such as, Change column_a with values [1,2,3,4,5] to 
`column_a_0 = 1, column_a_1 = 2, column_a_2 = 3 , column_a_3 = 4, column_a_4 = 
5` | SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN | 20 |
-| - | - | numOfSearchableValuesPerTag | In a trace segment, it includes 
multiple spans with multiple tags. Different spans could have same tag keys, 
such as multiple HTTP exit spans all have their own `http.method` tag. This 
configuration set the limitation of max num of values for the same tag key. | 
SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG | 2 |
-| - |mysql| - | MySQL Storage. The MySQL JDBC Driver is not in the dist, 
please copy it into oap-lib folder manually | - | - |
-| - | - | properties | Hikari connection pool configurations | - | Listed in 
the `application.yaml`. |
-| - | - | metadataQueryMaxSize | The max size of metadata per query. | 
SW_STORAGE_MYSQL_QUERY_MAX_SIZE | 5000 |
-| - | - | maxSizeOfArrayColumn | Some entities, such as trace segment, include 
the logic column with multiple values. In the MySQL, we use multiple physical 
columns to host the values, such as, Change column_a with values [1,2,3,4,5] to 
`column_a_0 = 1, column_a_1 = 2, column_a_2 = 3 , column_a_3 = 4, column_a_4 = 
5` | SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN | 20 |
-| - | - | numOfSearchableValuesPerTag | In a trace segment, it includes 
multiple spans with multiple tags. Different spans could have same tag keys, 
such as multiple HTTP exit spans all have their own `http.method` tag. This 
configuration set the limitation of max num of values for the same tag key. | 
SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG | 2 |
+| - | - | metadataQueryMaxSize | The maximum size of metadata per query. | 
SW_STORAGE_H2_QUERY_MAX_SIZE | 5000 |
+| - | - | maxSizeOfArrayColumn | Some entities (e.g. trace segments) include 
the logic column with multiple values. In H2, we use multiple physical columns 
to host the values: e.g. change column_a with values [1,2,3,4,5] to `column_a_0 
= 1, column_a_1 = 2, column_a_2 = 3 , column_a_3 = 4, column_a_4 = 5`. | 
SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN | 20 |
+| - | - | numOfSearchableValuesPerTag | In a trace segment, this includes 
multiple spans with multiple tags. Different spans may have the same tag key, 
e.g. multiple HTTP exit spans all have their own `http.method` tags. This 
configuration sets the limit on the maximum number of values for the same tag 
key. | SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG | 2 |
+| - |mysql| - | MySQL Storage. The MySQL JDBC Driver is not in the dist. 
Please copy it into the oap-lib folder manually. | - | - |
+| - | - | properties | Hikari connection pool configurations. | - | Listed in 
the `application.yaml`. |
+| - | - | metadataQueryMaxSize | The maximum size of metadata per query. | 
SW_STORAGE_MYSQL_QUERY_MAX_SIZE | 5000 |
+| - | - | maxSizeOfArrayColumn | Some entities (e.g. trace segments) include 
the logic column with multiple values. In MySQL, we use multiple physical 
columns to host the values, e.g. change column_a with values [1,2,3,4,5] to 
`column_a_0 = 1, column_a_1 = 2, column_a_2 = 3 , column_a_3 = 4, column_a_4 = 
5`. | SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN | 20 |
+| - | - | numOfSearchableValuesPerTag | In a trace segment, this includes 
multiple spans with multiple tags. Different spans may have same tag key, e.g. 
multiple HTTP exit spans all have their own `http.method` tags. This 
configuration sets the limit on the maximum number of values for the same tag 
key. | SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG | 2 |
 | - |postgresql| - | PostgreSQL storage. | - | - |
-| - | - | properties | Hikari connection pool configurations | - | Listed in 
the `application.yaml`. |
-| - | - | metadataQueryMaxSize | The max size of metadata per query. | 
SW_STORAGE_MYSQL_QUERY_MAX_SIZE | 5000 |
-| - | - | maxSizeOfArrayColumn | Some entities, such as trace segment, include 
the logic column with multiple values. In the PostgreSQL, we use multiple 
physical columns to host the values, such as, Change column_a with values 
[1,2,3,4,5] to `column_a_0 = 1, column_a_1 = 2, column_a_2 = 3 , column_a_3 = 
4, column_a_4 = 5` | SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN | 20 |
-| - | - | numOfSearchableValuesPerTag | In a trace segment, it includes 
multiple spans with multiple tags. Different spans could have same tag keys, 
such as multiple HTTP exit spans all have their own `http.method` tag. This 
configuration set the limitation of max num of values for the same tag key. | 
SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG | 2 |
+| - | - | properties | Hikari connection pool configurations. | - | Listed in 
the `application.yaml`. |
+| - | - | metadataQueryMaxSize | The maximum size of metadata per query. | 
SW_STORAGE_MYSQL_QUERY_MAX_SIZE | 5000 |
+| - | - | maxSizeOfArrayColumn | Some entities (e.g. trace segments) include 
the logic column with multiple values. In PostgreSQL, we use multiple physical 
columns to host the values, e.g. change column_a with values [1,2,3,4,5] to 
`column_a_0 = 1, column_a_1 = 2, column_a_2 = 3 , column_a_3 = 4, column_a_4 = 
5` | SW_STORAGE_MAX_SIZE_OF_ARRAY_COLUMN | 20 |
+| - | - | numOfSearchableValuesPerTag | In a trace segment, this includes 
multiple spans with multiple tags. Different spans may have same tag key, e.g. 
multiple HTTP exit spans all have their own `http.method` tags. This 
configuration sets the limit on the maximum number of values for the same tag 
key. | SW_STORAGE_NUM_OF_SEARCHABLE_VALUES_PER_TAG | 2 |
 | - |influxdb| - | InfluxDB storage. |- | - |
 | - | - | url| InfluxDB connection URL. | SW_STORAGE_INFLUXDB_URL | 
http://localhost:8086|
 | - | - | user | User name of InfluxDB. | SW_STORAGE_INFLUXDB_USER | root|
 | - | - | password | Password of InfluxDB. | SW_STORAGE_INFLUXDB_PASSWORD | -|
 | - | - | database | Database of InfluxDB. | SW_STORAGE_INFLUXDB_DATABASE | 
skywalking |
 | - | - | actions | The number of actions to collect. | 
SW_STORAGE_INFLUXDB_ACTIONS | 1000 |
-| - | - | duration | The time to wait at most (milliseconds). | 
SW_STORAGE_INFLUXDB_DURATION | 1000|
-| - | - | batchEnabled | If true, write points with batch api. | 
SW_STORAGE_INFLUXDB_BATCH_ENABLED | true|
-| - | - | fetchTaskLogMaxSize | The max number of fetch task log in a request. 
| SW_STORAGE_INFLUXDB_FETCH_TASK_LOG_MAX_SIZE | 5000|
-| - | - | connectionResponseFormat | The response format of connection to 
influxDB, cannot be anything but MSGPACK or JSON. | 
SW_STORAGE_INFLUXDB_CONNECTION_RESPONSE_FORMAT | MSGPACK |
+| - | - | duration | The maximum waiting time (in milliseconds). | 
SW_STORAGE_INFLUXDB_DURATION | 1000|
+| - | - | batchEnabled | If true, write points with batch API. | 
SW_STORAGE_INFLUXDB_BATCH_ENABLED | true|
+| - | - | fetchTaskLogMaxSize | The maximum number of fetch task log in a 
request. | SW_STORAGE_INFLUXDB_FETCH_TASK_LOG_MAX_SIZE | 5000|
+| - | - | connectionResponseFormat | The response format of connection to 
influxDB. It can only be MSGPACK or JSON. | 
SW_STORAGE_INFLUXDB_CONNECTION_RESPONSE_FORMAT | MSGPACK |
 | agent-analyzer | default | Agent Analyzer. | SW_AGENT_ANALYZER | default |
-| - | -| sampleRate|Sampling rate for receiving trace. The precision is 
1/10000. 10000 means 100% sample in default.|SW_TRACE_SAMPLE_RATE|10000|
-| - | - |slowDBAccessThreshold|The slow database access thresholds. Unit 
ms.|SW_SLOW_DB_THRESHOLD|default:200,mongodb:100|
-| - | - |forceSampleErrorSegment|When sampling mechanism activated, this 
config would make the error status segment sampled, ignoring the sampling 
rate.|SW_FORCE_SAMPLE_ERROR_SEGMENT|true|
-| - | - |segmentStatusAnalysisStrategy|Determine the final segment status from 
the status of spans. Available values are `FROM_SPAN_STATUS` , 
`FROM_ENTRY_SPAN` and `FROM_FIRST_SPAN`. `FROM_SPAN_STATUS` represents the 
segment status would be error if any span is in error status. `FROM_ENTRY_SPAN` 
means the segment status would be determined by the status of entry spans only. 
`FROM_FIRST_SPAN` means the segment status would be determined by the status of 
the first span only.|SW_SEGMENT_STA [...]
-| - | - |noUpstreamRealAddressAgents|Exit spans with the component in the list 
would not generate the client-side instance relation metrics. As some tracing 
plugins can't collect the real peer ip address, such as Nginx-LUA and Envoy. 
|SW_NO_UPSTREAM_REAL_ADDRESS|6000,9000|
-| - | - |slowTraceSegmentThreshold|Setting this threshold about the latency 
would make the slow trace segments sampled if they cost more time, even the 
sampling mechanism activated. The default value is `-1`, which means would not 
sample slow traces. Unit, millisecond. |SW_SLOW_TRACE_SEGMENT_THRESHOLD|-1|
-| - | - |meterAnalyzerActiveFiles|Which files could be meter analyzed, files 
split by ","|SW_METER_ANALYZER_ACTIVE_FILES||
-| receiver-sharing-server|default| Sharing server provides new gRPC and 
restful servers for data collection. Ana make the servers in the core module 
working for internal communication only.| - | - |
-| - | - | restHost| Binding IP of restful service. Services include GraphQL 
query and HTTP data report| SW_RECEIVER_SHARING_REST_HOST | - |
-| - | - | restPort | Binding port of restful service | 
SW_RECEIVER_SHARING_REST_PORT | - |
-| - | - | restContextPath| Web context path of restful service| 
SW_RECEIVER_SHARING_REST_CONTEXT_PATH | - |
-| - | - | restMinThreads| Min threads number of restful service| 
SW_RECEIVER_SHARING_JETTY_MIN_THREADS|1|
-| - | - | restMaxThreads| Max threads number of restful service| 
SW_RECEIVER_SHARING_JETTY_MAX_THREADS|200|
-| - | - | restIdleTimeOut| Connector idle timeout in milliseconds of restful 
service| SW_RECEIVER_SHARING_JETTY_IDLE_TIMEOUT|30000|
-| - | - | restAcceptorPriorityDelta| Thread priority delta to give to acceptor 
threads of restful service| SW_RECEIVER_SHARING_JETTY_DELTA|0|
-| - | - | restAcceptQueueSize| ServerSocketChannel backlog  of restful 
service| SW_RECEIVER_SHARING_JETTY_QUEUE_SIZE|0|
-| - | - | httpMaxRequestHeaderSize| Maximum request header size accepted| 
SW_RECEIVER_SHARING_HTTP_MAX_REQUEST_HEADER_SIZE|8192|
-| - | - | gRPCHost|Binding IP of gRPC service. Services include gRPC data 
report and internal communication among OAP nodes| SW_RECEIVER_GRPC_HOST | 
0.0.0.0. Not Activated |
-| - | - | gRPCPort| Binding port of gRPC service | SW_RECEIVER_GRPC_PORT | Not 
Activated |
-| - | - | gRPCThreadPoolSize|Pool size of gRPC server| 
SW_RECEIVER_GRPC_THREAD_POOL_SIZE | CPU core * 4|
-| - | - | gRPCThreadPoolQueueSize| The queue size of gRPC server| 
SW_RECEIVER_GRPC_POOL_QUEUE_SIZE | 10000|
-| - | - | gRPCSslEnabled| Activate SSL for gRPC service | 
SW_RECEIVER_GRPC_SSL_ENABLED | false |
-| - | - | gRPCSslKeyPath| The file path of gRPC SSL key| 
SW_RECEIVER_GRPC_SSL_KEY_PATH | - |
-| - | - | gRPCSslCertChainPath| The file path of gRPC SSL cert chain| 
SW_RECEIVER_GRPC_SSL_CERT_CHAIN_PATH | - |
+| - | -| sampleRate| Sampling rate for receiving trace. Precise to 1/10000. 
10000 means a sampling rate of 100% by default.|SW_TRACE_SAMPLE_RATE|10000|
+| - | - |slowDBAccessThreshold| The slow database access threshold (in 
milliseconds). |SW_SLOW_DB_THRESHOLD|default:200,mongodb:100|
+| - | - |forceSampleErrorSegment| When sampling mechanism is activated, this 
config samples the error status segment and ignores the sampling rate. 
|SW_FORCE_SAMPLE_ERROR_SEGMENT|true|
+| - | - |segmentStatusAnalysisStrategy| Determines the final segment status 
from span status. Available values are `FROM_SPAN_STATUS` , `FROM_ENTRY_SPAN`, 
and `FROM_FIRST_SPAN`. `FROM_SPAN_STATUS` indicates that the segment status 
would be error if any span has an error status. `FROM_ENTRY_SPAN` means that 
the segment status would only be determined by the status of entry spans. 
`FROM_FIRST_SPAN` means that the segment status would only be determined by the 
status of the first span. |SW_ [...]
+| - | - |noUpstreamRealAddressAgents| Exit spans with the component in the 
list would not generate client-side instance relation metrics, since some 
tracing plugins (e.g. Nginx-LUA and Envoy) can't collect the real peer IP 
address. |SW_NO_UPSTREAM_REAL_ADDRESS|6000,9000|
+| - | - |slowTraceSegmentThreshold| Setting this threshold on latency (in 
milliseconds) would cause the slow trace segments to be sampled if they use up 
more time, even if the sampling mechanism is activated. The default value is 
`-1`, which means that slow traces would not be sampled. 
|SW_SLOW_TRACE_SEGMENT_THRESHOLD|-1|
+| - | - |meterAnalyzerActiveFiles| Indicates which files could be instrumented 
and analyzed. Multiple files are split by ",". |SW_METER_ANALYZER_ACTIVE_FILES||
+| receiver-sharing-server|default| Sharing server provides new gRPC and 
restful servers for data collection. Ana designates that servers in the core 
module are to be used for internal communication only. | - | - |
+| - | - | restHost| Binding IP of RESTful services. Services include GraphQL 
query and HTTP data report. | SW_RECEIVER_SHARING_REST_HOST | - |
+| - | - | restPort | Binding port of RESTful services. | 
SW_RECEIVER_SHARING_REST_PORT | - |
+| - | - | restContextPath| Web context path of RESTful services. | 
SW_RECEIVER_SHARING_REST_CONTEXT_PATH | - |
+| - | - | restMinThreads| Minimum thread number of RESTful services. | 
SW_RECEIVER_SHARING_JETTY_MIN_THREADS|1|
+| - | - | restMaxThreads| Maximum thread number of RESTful services. | 
SW_RECEIVER_SHARING_JETTY_MAX_THREADS|200|
+| - | - | restIdleTimeOut| Connector idle timeout of RESTful services (in 
milliseconds). | SW_RECEIVER_SHARING_JETTY_IDLE_TIMEOUT|30000|
+| - | - | restAcceptorPriorityDelta| Thread priority delta to give to acceptor 
threads of RESTful services. | SW_RECEIVER_SHARING_JETTY_DELTA|0|
+| - | - | restAcceptQueueSize| ServerSocketChannel backlog of RESTful 
services. | SW_RECEIVER_SHARING_JETTY_QUEUE_SIZE|0|
+| - | - | httpMaxRequestHeaderSize| Maximum request header size accepted. | 
SW_RECEIVER_SHARING_HTTP_MAX_REQUEST_HEADER_SIZE|8192|
+| - | - | gRPCHost| Binding IP of gRPC services. Services include gRPC data 
report and internal communication among OAP nodes. | SW_RECEIVER_GRPC_HOST | 
0.0.0.0. Not Activated |
+| - | - | gRPCPort| Binding port of gRPC services. | SW_RECEIVER_GRPC_PORT | 
Not Activated |
+| - | - | gRPCThreadPoolSize| Pool size of gRPC server. | 
SW_RECEIVER_GRPC_THREAD_POOL_SIZE | CPU core * 4|
+| - | - | gRPCThreadPoolQueueSize| Queue size of gRPC server. | 
SW_RECEIVER_GRPC_POOL_QUEUE_SIZE | 10000|
+| - | - | gRPCSslEnabled| Activates SSL for gRPC services. | 
SW_RECEIVER_GRPC_SSL_ENABLED | false |
+| - | - | gRPCSslKeyPath| File path of gRPC SSL key. | 
SW_RECEIVER_GRPC_SSL_KEY_PATH | - |
+| - | - | gRPCSslCertChainPath| File path of gRPC SSL cert chain. | 
SW_RECEIVER_GRPC_SSL_CERT_CHAIN_PATH | - |
 | - | - | maxConcurrentCallsPerConnection | The maximum number of concurrent 
calls permitted for each incoming connection. Defaults to no limit. | 
SW_RECEIVER_GRPC_MAX_CONCURRENT_CALL | - |
-| - | - | authentication | The token text for the authentication. Work for 
gRPC connection only. Once this is set, the client is required to use the same 
token. | SW_AUTHENTICATION | - |
+| - | - | authentication | The token text for authentication. Works for gRPC 
connection only. Once this is set, the client is required to use the same 
token. | SW_AUTHENTICATION | - |
 | log-analyzer | default | Log Analyzer. | SW_LOG_ANALYZER | default |
 | - | - | lalFiles | The LAL configuration file names (without file extension) 
to be activated. Read [LAL](../../concepts-and-designs/lal.md) for more 
details. | SW_LOG_LAL_FILES | default |
 | - | - | malFiles | The MAL configuration file names (without file extension) 
to be activated. Read [LAL](../../concepts-and-designs/lal.md) for more 
details. | SW_LOG_MAL_FILES | "" |
 | event-analyzer | default | Event Analyzer. | SW_EVENT_ANALYZER | default |
-| receiver-register|default| Read [receiver doc](backend-receivers.md) for 
more details | - | - |
-| receiver-trace|default| Read [receiver doc](backend-receivers.md) for more 
details | - | - |
-| receiver-jvm| default| Read [receiver doc](backend-receivers.md) for more 
details | - | - |
-| receiver-clr| default| Read [receiver doc](backend-receivers.md) for more 
details | - | - |
-| receiver-profile| default| Read [receiver doc](backend-receivers.md) for 
more details | - | - |
-| receiver-zabbix| default| Read [receiver doc](backend-zabbix.md) for more 
details | - | - |
-| - | - | port| Exported tcp port, Zabbix agent could connect and transport 
data| SW_RECEIVER_ZABBIX_PORT | 10051 |
-| - | - | host| Bind to host| SW_RECEIVER_ZABBIX_HOST | 0.0.0.0 |
-| - | - | activeFiles| Enable config when receive agent request| 
SW_RECEIVER_ZABBIX_ACTIVE_FILES | agent |
-| service-mesh| default| Read [receiver doc](backend-receivers.md) for more 
details | - | - |
-| envoy-metric| default| Read [receiver doc](backend-receivers.md) for more 
details | - | - |
-| - | - | acceptMetricsService | Open Envoy Metrics Service analysis | 
SW_ENVOY_METRIC_SERVICE | true|
-| - | - | alsHTTPAnalysis | Open Envoy HTTP Access Log Service analysis. Value 
= `k8s-mesh` means open the analysis | SW_ENVOY_METRIC_ALS_HTTP_ANALYSIS | - |
-| - | - | alsTCPAnalysis | Open Envoy TCP Access Log Service analysis. Value = 
`k8s-mesh` means open the analysis | SW_ENVOY_METRIC_ALS_TCP_ANALYSIS | - |
-| - | - | k8sServiceNameRule | `k8sServiceNameRule` allows you to customize 
the service name in ALS via Kubernetes metadata, the available variables are 
`pod`, `service`, e.g., you can use 
`${service.metadata.name}-${pod.metadata.labels.version}` to append the version 
number to the service name. Be careful, when using environment variables to 
pass this configuration, use single quotes(`''`) to avoid it being evaluated by 
the shell. | - |
-| receiver-otel | default | Read [receiver doc](backend-receivers.md) for more 
details | - | - |
-| - | - | enabledHandlers|Enabled handlers for otel| 
SW_OTEL_RECEIVER_ENABLED_HANDLERS | - |
-| - | - | enabledOcRules|Enabled metric rules for OC handler | 
SW_OTEL_RECEIVER_ENABLED_OC_RULES | - |
-| receiver_zipkin |default| Read [receiver doc](backend-receivers.md) | - | - |
-| - | - | restHost| Binding IP of restful service. 
|SW_RECEIVER_ZIPKIN_HOST|0.0.0.0|
-| - | - | restPort | Binding port of restful service | 
SW_RECEIVER_ZIPKIN_PORT|9411|
-| - | - | restContextPath| Web context path of restful service| 
SW_RECEIVER_ZIPKIN_CONTEXT_PATH|/|
-| receiver_jaeger | default| Read [receiver doc](backend-receivers.md) | - | - 
|
-| - | - | gRPCHost|Binding IP of gRPC service. Services include gRPC data 
report and internal communication among OAP nodes| SW_RECEIVER_JAEGER_HOST | - |
-| - | - | gRPCPort| Binding port of gRPC service | SW_RECEIVER_JAEGER_PORT | - 
|
-| - | - | gRPCThreadPoolSize|Pool size of gRPC server| - | CPU core * 4|
-| - | - | gRPCThreadPoolQueueSize| The queue size of gRPC server| - | 10000|
+| receiver-register|default| Read [receiver doc](backend-receivers.md) for 
more details. | - | - |
+| receiver-trace|default| Read [receiver doc](backend-receivers.md) for more 
details. | - | - |
+| receiver-jvm| default| Read [receiver doc](backend-receivers.md) for more 
details. | - | - |
+| receiver-clr| default| Read [receiver doc](backend-receivers.md) for more 
details. | - | - |
+| receiver-profile| default| Read [receiver doc](backend-receivers.md) for 
more details. | - | - |
+| receiver-zabbix| default| Read [receiver doc](backend-zabbix.md) for more 
details. | - | - |
+| - | - | port| Exported TCP port. Zabbix agent could connect and transport 
data. | SW_RECEIVER_ZABBIX_PORT | 10051 |
+| - | - | host| Binds to host. | SW_RECEIVER_ZABBIX_HOST | 0.0.0.0 |
+| - | - | activeFiles| Enables config when agent request is received. | 
SW_RECEIVER_ZABBIX_ACTIVE_FILES | agent |
+| service-mesh| default| Read [receiver doc](backend-receivers.md) for more 
details. | - | - |
+| envoy-metric| default| Read [receiver doc](backend-receivers.md) for more 
details. | - | - |
+| - | - | acceptMetricsService | Starts Envoy Metrics Service analysis. | 
SW_ENVOY_METRIC_SERVICE | true|
+| - | - | alsHTTPAnalysis | Starts Envoy HTTP Access Log Service analysis. 
Value = `k8s-mesh` means starting the analysis. | 
SW_ENVOY_METRIC_ALS_HTTP_ANALYSIS | - |
+| - | - | alsTCPAnalysis | Starts Envoy TCP Access Log Service analysis. Value 
= `k8s-mesh` means starting the analysis. | SW_ENVOY_METRIC_ALS_TCP_ANALYSIS | 
- |
+| - | - | k8sServiceNameRule | `k8sServiceNameRule` allows you to customize 
the service name in ALS via Kubernetes metadata. The available variables are 
`pod` and `service`. E.g. you can use 
`${service.metadata.name}-${pod.metadata.labels.version}` to append the version 
number to the service name. Note that when using environment variables to pass 
this configuration, use single quotes(`''`) to avoid being evaluated by the 
shell. | - |
+| receiver-otel | default | Read [receiver doc](backend-receivers.md) for more 
details. | - | - |
+| - | - | enabledHandlers| Enabled handlers for otel. | 
SW_OTEL_RECEIVER_ENABLED_HANDLERS | - |
+| - | - | enabledOcRules| Enabled metric rules for OC handler. | 
SW_OTEL_RECEIVER_ENABLED_OC_RULES | - |
+| receiver_zipkin |default| Read [receiver doc](backend-receivers.md). | - | - 
|
+| - | - | restHost| Binding IP of RESTful services. 
|SW_RECEIVER_ZIPKIN_HOST|0.0.0.0|
+| - | - | restPort | Binding port of RESTful services. | 
SW_RECEIVER_ZIPKIN_PORT|9411|
+| - | - | restContextPath| Web context path of RESTful services. | 
SW_RECEIVER_ZIPKIN_CONTEXT_PATH|/|
+| receiver_jaeger | default| Read [receiver doc](backend-receivers.md). | - | 
- |
+| - | - | gRPCHost|Binding IP of gRPC services. Services include gRPC data 
report and internal communication among OAP nodes. | SW_RECEIVER_JAEGER_HOST | 
- |
+| - | - | gRPCPort| Binding port of gRPC services. | SW_RECEIVER_JAEGER_PORT | 
- |
+| - | - | gRPCThreadPoolSize| Pool size of gRPC server. | - | CPU core * 4|
+| - | - | gRPCThreadPoolQueueSize| Queue size of gRPC server. | - | 10000|
 | - | - | maxConcurrentCallsPerConnection | The maximum number of concurrent 
calls permitted for each incoming connection. Defaults to no limit. | - | - |
-| - | - | maxMessageSize | Sets the maximum message size allowed to be 
received on the server. Empty means 4 MiB | - | 4M(based on Netty) |
-| prometheus-fetcher | default | Read [fetcher doc](backend-fetcher.md) for 
more details | - | - |
-| - | - | enabledRules | Enable rules. | SW_PROMETHEUS_FETCHER_ENABLED_RULES | 
self |
+| - | - | maxMessageSize | Sets the maximum message size allowed to be 
received on the server. Empty means 4 MiB. | - | 4M(based on Netty) |
+| prometheus-fetcher | default | Read [fetcher doc](backend-fetcher.md) for 
more details. | - | - |
+| - | - | enabledRules | Enabled rules. | SW_PROMETHEUS_FETCHER_ENABLED_RULES 
| self |
 | - | - | maxConvertWorker | The maximize meter convert worker. | 
SW_PROMETHEUS_FETCHER_NUM_CONVERT_WORKER | -1(by default, half the number of 
CPU core(s)) |   
-| kafka-fetcher | default | Read [fetcher doc](backend-fetcher.md) for more 
details | - | - |
+| kafka-fetcher | default | Read [fetcher doc](backend-fetcher.md) for more 
details. | - | - |
 | - | - | bootstrapServers | A list of host/port pairs to use for establishing 
the initial connection to the Kafka cluster. | SW_KAFKA_FETCHER_SERVERS | 
localhost:9092 |
-| - | - | namespace | namespace aims to isolate multi OAP cluster when using 
the same Kafka cluster.if you set a namespace for Kafka fetcher, OAP will add a 
prefix to topic name. you should also set namespace in `agent.config`, the 
property named| SW_NAMESPACE | - |
-| - | - | groupId | A unique string that identifies the consumer group this 
consumer belongs to.| - | skywalking-consumer |
-| - | - | consumePartitions | Which PartitionId(s) of the topics assign to the 
OAP server. If more than one, is separated by commas. | 
SW_KAFKA_FETCHER_CONSUME_PARTITIONS | - |
-| - | - | isSharding | it was true when OAP Server in cluster. | 
SW_KAFKA_FETCHER_IS_SHARDING | false |
-| - | - | createTopicIfNotExist | If true, create the Kafka topic when it does 
not exist. | - | true |
+| - | - | namespace | Namespace aims to isolate multi OAP cluster when using 
the same Kafka cluster. If you set a namespace for Kafka fetcher, OAP will add 
a prefix to topic name. You should also set namespace in `agent.config`. The 
property is named `plugin.kafka.namespace`. | SW_NAMESPACE | - |
+| - | - | groupId | A unique string that identifies the consumer group to 
which this consumer belongs.| - | skywalking-consumer |
+| - | - | consumePartitions | Indicates which PartitionId(s) of the topics 
is/are assigned to the OAP server. Separated by commas if multiple. | 
SW_KAFKA_FETCHER_CONSUME_PARTITIONS | - |
+| - | - | isSharding | True when OAP Server is in cluster. | 
SW_KAFKA_FETCHER_IS_SHARDING | false |
+| - | - | createTopicIfNotExist | If true, this creates Kafka topic (if it 
does not already exist). | - | true |
 | - | - | partitions | The number of partitions for the topic being created. | 
SW_KAFKA_FETCHER_PARTITIONS | 3 |
-| - | - | enableNativeProtoLog | To enable to fetch and handle native proto 
log data. | SW_KAFKA_FETCHER_ENABLE_NATIVE_PROTO_LOG | false |
-| - | - | enableNativeJsonLog | To enable to fetch and handle native json log 
data. | SW_KAFKA_FETCHER_ENABLE_NATIVE_JSON_LOG | false |
+| - | - | enableNativeProtoLog | Enables fetching and handling native proto 
log data. | SW_KAFKA_FETCHER_ENABLE_NATIVE_PROTO_LOG | false |
+| - | - | enableNativeJsonLog | Enables fetching and handling native json log 
data. | SW_KAFKA_FETCHER_ENABLE_NATIVE_JSON_LOG | false |
 | - | - | replicationFactor | The replication factor for each partition in the 
topic being created. | SW_KAFKA_FETCHER_PARTITIONS_FACTOR | 2 |
-| - | - | kafkaHandlerThreadPoolSize | Pool size of kafka message handler 
executor. | SW_KAFKA_HANDLER_THREAD_POOL_SIZE | CPU core * 2 |
-| - | - | kafkaHandlerThreadPoolQueueSize | The queue size of kafka message 
handler executor. | SW_KAFKA_HANDLER_THREAD_POOL_QUEUE_SIZE | 10000 |
-| - | - | topicNameOfMeters | Specifying Kafka topic name for Meter system 
data. | - | skywalking-meters |
-| - | - | topicNameOfMetrics | Specifying Kafka topic name for JVM Metrics 
data. | - | skywalking-metrics |
-| - | - | topicNameOfProfiling | Specifying Kafka topic name for Profiling 
data. | - | skywalking-profilings |
-| - | - | topicNameOfTracingSegments | Specifying Kafka topic name for Tracing 
data. | - | skywalking-segments |
-| - | - | topicNameOfManagements | Specifying Kafka topic name for service 
instance reporting and registering. | - | skywalking-managements |
-| - | - | topicNameOfLogs | Specifying Kafka topic name for native proto log 
data. | - | skywalking-logs |
-| - | - | topicNameOfJsonLogs | Specifying Kafka topic name for native json 
log data. | - | skywalking-logs-json |
-| receiver-browser | default | Read [receiver doc](backend-receivers.md) for 
more details | - | - | - |
-| - | - | sampleRate | Sampling rate for receiving trace. The precision is 
1/10000. 10000 means 100% sample in default. | SW_RECEIVER_BROWSER_SAMPLE_RATE 
| 10000 |
-| query | graphql | - | GraphQL query implementation | - |
+| - | - | kafkaHandlerThreadPoolSize | Pool size of Kafka message handler 
executor. | SW_KAFKA_HANDLER_THREAD_POOL_SIZE | CPU core * 2 |
+| - | - | kafkaHandlerThreadPoolQueueSize | Queue size of Kafka message 
handler executor. | SW_KAFKA_HANDLER_THREAD_POOL_QUEUE_SIZE | 10000 |
+| - | - | topicNameOfMeters | Kafka topic name for meter system data. | - | 
skywalking-meters |
+| - | - | topicNameOfMetrics | Kafka topic name for JVM metrics data. | - | 
skywalking-metrics |
+| - | - | topicNameOfProfiling | Kafka topic name for profiling data. | - | 
skywalking-profilings |
+| - | - | topicNameOfTracingSegments | Kafka topic name for tracing data. | - 
| skywalking-segments |
+| - | - | topicNameOfManagements | Kafka topic name for service instance 
reporting and registration. | - | skywalking-managements |
+| - | - | topicNameOfLogs | Kafka topic name for native proto log data. | - | 
skywalking-logs |
+| - | - | topicNameOfJsonLogs | Kafka topic name for native json log data. | - 
| skywalking-logs-json |
+| receiver-browser | default | Read [receiver doc](backend-receivers.md) for 
more details. | - | - | - |
+| - | - | sampleRate | Sampling rate for receiving trace. Precise to 1/10000. 
10000 means sampling rate of 100% by default. | SW_RECEIVER_BROWSER_SAMPLE_RATE 
| 10000 |
+| query | graphql | - | GraphQL query implementation. | - |
 | - | - | path | Root path of GraphQL query and mutation. | 
SW_QUERY_GRAPHQL_PATH | /graphql|
 | alarm | default | - | Read [alarm doc](backend-alarm.md) for more details. | 
- |
 | telemetry | - | - | Read [telemetry doc](backend-telemetry.md) for more 
details. | - |
-| - | none| - | No op implementation | - |
-| - | prometheus| host | Binding host for Prometheus server fetching data| 
SW_TELEMETRY_PROMETHEUS_HOST|0.0.0.0|
-| - | - | port|  Binding port for Prometheus server fetching 
data|SW_TELEMETRY_PROMETHEUS_PORT|1234|
+| - | none| - | No op implementation. | - |
+| - | prometheus| host | Binding host for Prometheus server fetching data. | 
SW_TELEMETRY_PROMETHEUS_HOST|0.0.0.0|
+| - | - | port|  Binding port for Prometheus server fetching data. 
|SW_TELEMETRY_PROMETHEUS_PORT|1234|
 | configuration | - | - | Read [dynamic configuration doc](dynamic-config.md) 
for more details. | - |
-| - | grpc| host | DCS server binding hostname | SW_DCS_SERVER_HOST | - |
-| - | - | port | DCS server binding port | SW_DCS_SERVER_PORT | 80 |
-| - | - | clusterName | Cluster name when reading latest configuration from 
DSC server. | SW_DCS_CLUSTER_NAME | SkyWalking|
-| - | - | period | The period of OAP reading data from DSC server. Unit is 
second. | SW_DCS_PERIOD | 20 |
-| - | apollo| apolloMeta| `apollo.meta` in Apollo | SW_CONFIG_APOLLO | 
http://106.12.25.204:8080 | 
-| - | - | apolloCluster | `apollo.cluster` in Apollo | 
SW_CONFIG_APOLLO_CLUSTER | default|
-| - | - | apolloEnv | `env` in Apollo | SW_CONFIG_APOLLO_ENV | - |
-| - | - | appId | `app.id` in Apollo | SW_CONFIG_APOLLO_APP_ID | skywalking |
-| - | - | period | The period of data sync. Unit is second. | 
SW_CONFIG_APOLLO_PERIOD | 60 |
-| - | zookeeper|nameSpace|The namespace, represented by root path, isolates 
the configurations in the zookeeper.|SW_CONFIG_ZK_NAMESPACE| `/`, root path|
-| - | - | hostPort|hosts and ports of Zookeeper 
Cluster|SW_CONFIG_ZK_HOST_PORT| localhost:2181|
-| - | - | baseSleepTimeMs|The period of Zookeeper client between two retries. 
Unit is ms.|SW_CONFIG_ZK_BASE_SLEEP_TIME_MS|1000|
-| - | - | maxRetries| The max retry time of 
re-trying.|SW_CONFIG_ZK_MAX_RETRIES|3|
-| - | - | period | The period of data sync. Unit is second. | 
SW_CONFIG_ZK_PERIOD | 60 |
-| - | etcd| endpoints | hosts and ports used of etcd cluster(If there are 
multiple, separate them with commas). | SW_CONFIG_ETCD_ENDPOINTS | 
localhost:2379 | 
-| - | - | namespace | Namespace used for SkyWalking cluster. 
|SW_CONFIG_ETCD_NAMESPACE | /skywalking |
-| - | - | authentication | Whether has authentication. | 
SW_CONFIG_ETCD_AUTHENTICATION | false |
-| - | - | user | Etcd auth username | SW_CONFIG_ETCD_USER | |
-| - | - | password | Etcd auth password | SW_CONFIG_ETCD_PASSWORD | |
-| - | - | period | The period of data sync. Unit is second. | 
SW_CONFIG_ZK_PERIOD | 60
-| - | consul | hostPort| hosts and ports used of Consul cluster.| 
SW_CONFIG_CONSUL_HOST_AND_PORTS|localhost:8500|
-| - | - | aclToken| ALC Token of Consul. Empty string means `without ALC 
token`.| SW_CONFIG_CONSUL_ACL_TOKEN | - |
-| - | - | period | The period of data sync. Unit is second. | 
SW_CONFIG_CONSUL_PERIOD | 60 |
+| - | grpc| host | DCS server binding hostname. | SW_DCS_SERVER_HOST | - |
+| - | - | port | DCS server binding port. | SW_DCS_SERVER_PORT | 80 |
+| - | - | clusterName | Cluster name when reading the latest configuration 
from DSC server. | SW_DCS_CLUSTER_NAME | SkyWalking|
+| - | - | period | The period of reading data from DSC server by the OAP (in 
seconds). | SW_DCS_PERIOD | 20 |
+| - | apollo| apolloMeta| `apollo.meta` in Apollo. | SW_CONFIG_APOLLO | 
http://106.12.25.204:8080 | 
+| - | - | apolloCluster | `apollo.cluster` in Apollo. | 
SW_CONFIG_APOLLO_CLUSTER | default|
+| - | - | apolloEnv | `env` in Apollo. | SW_CONFIG_APOLLO_ENV | - |
+| - | - | appId | `app.id` in Apollo. | SW_CONFIG_APOLLO_APP_ID | skywalking |
+| - | - | period | The period of data sync (in seconds). | 
SW_CONFIG_APOLLO_PERIOD | 60 |
+| - | zookeeper|nameSpace| The namespace (represented by root path) that 
isolates the configurations in the Zookeeper. |SW_CONFIG_ZK_NAMESPACE| `/`, 
root path|
+| - | - | hostPort| Hosts and ports of Zookeeper Cluster. 
|SW_CONFIG_ZK_HOST_PORT| localhost:2181|
+| - | - | baseSleepTimeMs|The period of Zookeeper client between two retries 
(in milliseconds). |SW_CONFIG_ZK_BASE_SLEEP_TIME_MS|1000|
+| - | - | maxRetries| The maximum retry time. |SW_CONFIG_ZK_MAX_RETRIES|3|
+| - | - | period | The period of data sync (in seconds). | SW_CONFIG_ZK_PERIOD 
| 60 |
+| - | etcd| endpoints | Hosts and ports for etcd cluster (separated by commas 
if multiple). | SW_CONFIG_ETCD_ENDPOINTS | localhost:2379 | 
+| - | - | namespace | Namespace for SkyWalking cluster. 
|SW_CONFIG_ETCD_NAMESPACE | /skywalking |
+| - | - | authentication | Indicates whether there is authentication. | 
SW_CONFIG_ETCD_AUTHENTICATION | false |
+| - | - | user | Etcd auth username. | SW_CONFIG_ETCD_USER | |
+| - | - | password | Etcd auth password. | SW_CONFIG_ETCD_PASSWORD | |
+| - | - | period | The period of data sync (in seconds). | SW_CONFIG_ZK_PERIOD 
| 60
+| - | consul | hostPort| Hosts and ports for Consul cluster.| 
SW_CONFIG_CONSUL_HOST_AND_PORTS|localhost:8500|
+| - | - | aclToken| ACL Token of Consul. Empty string means `without ACL 
token`.| SW_CONFIG_CONSUL_ACL_TOKEN | - |
+| - | - | period | The period of data sync (in seconds). | 
SW_CONFIG_CONSUL_PERIOD | 60 |
 | - | k8s-configmap | namespace | Deployment namespace of the config map. 
|SW_CLUSTER_K8S_NAMESPACE|default|
-| - | - | labelSelector| Labels used for locating configmap. 
|SW_CLUSTER_K8S_LABEL|app=collector,release=skywalking|
-| - | - | period | The period of data sync. Unit is second. | 
SW_CONFIG_ZK_PERIOD | 60 |
-| - | nacos | serverAddr | Nacos Server Host | SW_CONFIG_NACOS_SERVER_ADDR | 
127.0.0.1|
-| - | - | port | Nacos Server Port | SW_CONFIG_NACOS_SERVER_PORT | 8848 |
-| - | - | group | Nacos Configuration namespace | 
SW_CONFIG_NACOS_SERVER_NAMESPACE | - |
-| - | - | period | The period of data sync. Unit is second. | 
SW_CONFIG_CONFIG_NACOS_PERIOD | 60 |
-| - | - | username | Nacos Auth username | SW_CONFIG_NACOS_USERNAME | - |
-| - | - | password | Nacos Auth password | SW_CONFIG_NACOS_PASSWORD | - |
-| - | - | accessKey | Nacos Auth accessKey | SW_CONFIG_NACOS_ACCESSKEY | - |
-| - | - | secretKey | Nacos Auth secretKey  | SW_CONFIG_NACOS_SECRETKEY | - |
-| exporter | grpc | targetHost | The host of target grpc server for receiving 
export data. | SW_EXPORTER_GRPC_HOST | 127.0.0.1 |
-| - | - | targetPort | The port of target grpc server for receiving export 
data. | SW_EXPORTER_GRPC_PORT | 9870 |
-| health-checker | default | checkIntervalSeconds | The period of check OAP 
internal health status. Unit is second. | SW_HEALTH_CHECKER_INTERVAL_SECONDS | 
5 |
-| configuration-discovery | default | disableMessageDigest | If true, agent 
receives the latest configuration every time even without change. In default, 
OAP uses SHA512 message digest mechanism to detect changes of configuration. | 
SW_DISABLE_MESSAGE_DIGEST | false
-| receiver-event|default| Read [receiver doc](backend-receivers.md) for more 
details | - | - |
+| - | - | labelSelector| Labels for locating configmap. 
|SW_CLUSTER_K8S_LABEL|app=collector,release=skywalking|
+| - | - | period | The period of data sync (in seconds). | SW_CONFIG_ZK_PERIOD 
| 60 |
+| - | nacos | serverAddr | Nacos Server Host. | SW_CONFIG_NACOS_SERVER_ADDR | 
127.0.0.1|
+| - | - | port | Nacos Server Port. | SW_CONFIG_NACOS_SERVER_PORT | 8848 |
+| - | - | group | Nacos Configuration namespace. | 
SW_CONFIG_NACOS_SERVER_NAMESPACE | - |
+| - | - | period | The period of data sync (in seconds). | 
SW_CONFIG_CONFIG_NACOS_PERIOD | 60 |
+| - | - | username | Nacos Auth username. | SW_CONFIG_NACOS_USERNAME | - |
+| - | - | password | Nacos Auth password. | SW_CONFIG_NACOS_PASSWORD | - |
+| - | - | accessKey | Nacos Auth accessKey. | SW_CONFIG_NACOS_ACCESSKEY | - |
+| - | - | secretKey | Nacos Auth secretKey.  | SW_CONFIG_NACOS_SECRETKEY | - |
+| exporter | grpc | targetHost | The host of target gRPC server for receiving 
export data. | SW_EXPORTER_GRPC_HOST | 127.0.0.1 |
+| - | - | targetPort | The port of target gRPC server for receiving export 
data. | SW_EXPORTER_GRPC_PORT | 9870 |
+| health-checker | default | checkIntervalSeconds | The period of checking OAP 
internal health status (in seconds). | SW_HEALTH_CHECKER_INTERVAL_SECONDS | 5 |
+| configuration-discovery | default | disableMessageDigest | If true, agent 
receives the latest configuration every time, even without making any changes. 
By default, OAP uses the SHA512 message digest mechanism to detect changes in 
configuration. | SW_DISABLE_MESSAGE_DIGEST | false
+| receiver-event|default| Read [receiver doc](backend-receivers.md) for more 
details. | - | - |
 
-## Notice
-¹ System Environment Variable name could be declared and changed in the 
application.yml. The names listed here,
-are just provided in the default `application.yml` file.
+## Note
+¹ System Environment Variable name could be declared and changed in 
`application.yml`. The names listed here are simply provided in the default 
`application.yml` file.

Reply via email to