From f8a4a873cf4a9d73b6a7046225a15398a56c1c7a Mon Sep 17 00:00:00 2001 From: James Phillips Date: Mon, 27 Mar 2017 20:59:15 -0700 Subject: [PATCH 1/4] Breaks the operator HTTP doc into sections. --- .../docs/agent/http/operator.html.markdown | 484 ++++++++++-------- 1 file changed, 257 insertions(+), 227 deletions(-) diff --git a/website/source/docs/agent/http/operator.html.markdown b/website/source/docs/agent/http/operator.html.markdown index a7ca71b740..7caabf8d60 100644 --- a/website/source/docs/agent/http/operator.html.markdown +++ b/website/source/docs/agent/http/operator.html.markdown @@ -23,13 +23,11 @@ these capabilities are used. For a CLI to perform these operations manually, ple see the documentation for the [`consul operator`](/docs/commands/operator.html) command. -The following endpoints are supported: +The following types of endpoints are supported: -* [`/v1/operator/raft/configuration`](#raft-configuration): Inspects the Raft configuration -* [`/v1/operator/raft/peer`](#raft-peer): Operates on Raft peers -* [`/v1/operator/keyring`](#keyring): Operates on gossip keyring -* [`/v1/operator/autopilot/configuration`](#autopilot-configuration): Operates on the Autopilot configuration -* [`/v1/operator/autopilot/health`](#autopilot-health): Returns the health of the servers +* [Autopilot](#autopilot): Automatically manage Consul servers +* [Keyring](#keyring): Manage gossip encryption keyring +* [Raft](#raft): Manage Raft consensus subsystem Not all endpoints support blocking queries and all consistency modes, see details in the sections below. @@ -37,229 +35,16 @@ see details in the sections below. The operator endpoints support the use of ACL Tokens. See the [ACL](/docs/internals/acl.html#operator) internals guide for more information. -### /v1/operator/raft/configuration +## Autopilot -The Raft configuration endpoint supports the `GET` method. +Autopilot is a set of new features added in Consul 0.8 to allow for automatic +operator-friendly management of Consul servers. Please see the +[Autopilot Guide](/docs/guides/autopilot.html) for more details. -#### GET Method +The following endpoints are supported: -When using the `GET` method, the request will be forwarded to the cluster -leader to retrieve its latest Raft peer configuration. - -If the cluster doesn't currently have a leader an error will be returned. You -can use the `?stale` query parameter to read the Raft configuration from any -of the Consul servers. - -By default, the datacenter of the agent is queried; however, the `dc` can be -provided using the `?dc=` query parameter. - -If ACLs are enabled, the client will need to supply an ACL Token with -[`operator`](/docs/internals/acl.html#operator) read privileges. - -A JSON body is returned that looks like this: - -```javascript -{ - "Servers": [ - { - "ID": "127.0.0.1:8300", - "Node": "alice", - "Address": "127.0.0.1:8300", - "Leader": true, - "Voter": true - }, - { - "ID": "127.0.0.2:8300", - "Node": "bob", - "Address": "127.0.0.2:8300", - "Leader": false, - "Voter": true - }, - { - "ID": "127.0.0.3:8300", - "Node": "carol", - "Address": "127.0.0.3:8300", - "Leader": false, - "Voter": true - } - ], - "Index": 22 -} -``` - -The `Servers` array has information about the servers in the Raft peer -configuration: - -`ID` is the ID of the server. This is the same as the `Address` in Consul 0.7 -but may be upgraded to a GUID in a future version of Consul. - -`Node` is the node name of the server, as known to Consul, or "(unknown)" if -the node is stale and not known. - -`Address` is the IP:port for the server. - -`Leader` is either "true" or "false" depending on the server's role in the -Raft configuration. - -`Voter` is "true" or "false", indicating if the server has a vote in the Raft -configuration. Future versions of Consul may add support for non-voting servers. - -The `Index` value is the Raft corresponding to this configuration. The latest configuration may not yet be committed if changes are in flight. - -### /v1/operator/raft/peer - -The Raft peer endpoint supports the `DELETE` method. - -#### DELETE Method - -Using the `DELETE` method, this endpoint will remove the Consul server with -given address from the Raft configuration. - -There are rare cases where a peer may be left behind in the Raft configuration -even though the server is no longer present and known to the cluster. This -endpoint can be used to remove the failed server so that it is no longer -affects the Raft quorum. - -An `?address=` query parameter is required and should be set to the -`IP:port` for the server to remove. The port number is usually 8300, unless -configured otherwise. Nothing is required in the body of the request. - -By default, the datacenter of the agent is targeted; however, the `dc` can be -provided using the `?dc=` query parameter. - -If ACLs are enabled, the client will need to supply an ACL Token with -[`operator`](/docs/internals/acl.html#operator) write privileges. - -The return code will indicate success or failure. - -### /v1/operator/keyring - -Available in Consul 0.7.2 and later, the keyring endpoint supports the -`GET`, `POST`, `PUT` and `DELETE` methods. - -This endpoint supports the use of ACL tokens using either the `X-CONSUL-TOKEN` -header or the `?token=` query parameter. - -Added in Consul 0.7.4, this endpoint supports the `?relay-factor=` query parameter. -See the [Keyring Command](/docs/commands/keyring.html#_relay_factor) for more details. - -#### GET Method - -Using the `GET` method, this endpoint will list the gossip encryption keys -installed on both the WAN and LAN rings of every known datacenter. There is more -information on gossip encryption available -[here](/docs/agent/encryption.html#gossip-encryption). - -If ACLs are enabled, the client will need to supply an ACL Token with -[`keyring`](/docs/internals/acl.html#keyring) read privileges. - -A JSON body is returned that looks like this: - -```javascript -[ - { - "WAN": true, - "Datacenter": "dc1", - "Keys": { - "0eK8RjnsGC/+I1fJErQsBA==": 1, - "G/3/L4yOw3e5T7NTvuRi9g==": 1, - "z90lFx3sZZLtTOkutXcwYg==": 1 - }, - "NumNodes": 1 - }, - { - "WAN": false, - "Datacenter": "dc1", - "Keys": { - "0eK8RjnsGC/+I1fJErQsBA==": 1, - "G/3/L4yOw3e5T7NTvuRi9g==": 1, - "z90lFx3sZZLtTOkutXcwYg==": 1 - }, - "NumNodes": 1 - } -] -``` - -`WAN` is true if the block refers to the WAN ring of that datacenter (rather than - LAN). - -`Datacenter` is the datacenter the block refers to. - -`Keys` is a map of each gossip key to the number of nodes it's currently installed - on. - -`NumNodes` is the total number of nodes in the datacenter. - -#### POST Method - -Using the `POST` method, this endpoint will install a new gossip encryption key -into the cluster. There is more information on gossip encryption available -[here](/docs/agent/encryption.html#gossip-encryption). - -The `POST` method expects a JSON request body to be submitted. The request -body must look like: - -```javascript -{ - "Key": "3lg9DxVfKNzI8O+IQ5Ek+Q==" -} -``` - -The `Key` field is mandatory and provides the encryption key to install into the -cluster. - -If ACLs are enabled, the client will need to supply an ACL Token with -[`keyring`](/docs/internals/acl.html#keyring) write privileges. - -The return code will indicate success or failure. - -#### PUT Method - -Using the `PUT` method, this endpoint will change the primary gossip encryption -key. The key must already be installed before this operation can succeed. There -is more information on gossip encryption available -[here](/docs/agent/encryption.html#gossip-encryption). - -The `PUT` method expects a JSON request body to be submitted. The request -body must look like: - -```javascript -{ - "Key": "3lg9DxVfKNzI8O+IQ5Ek+Q==" -} -``` - -The `Key` field is mandatory and provides the primary encryption key to begin -using. - -If ACLs are enabled, the client will need to supply an ACL Token with -[`keyring`](/docs/internals/acl.html#keyring) write privileges. - -The return code will indicate success or failure. - -#### DELETE Method - -Using the `DELETE` method, this endpoint will remove a gossip encryption key from -the cluster. This operation may only be performed on keys which are not currently -the primary key. There is more information on gossip encryption available -[here](/docs/agent/encryption.html#gossip-encryption). - -The `DELETE` method expects a JSON request body to be submitted. The request -body must look like: - -```javascript -{ - "Key": "3lg9DxVfKNzI8O+IQ5Ek+Q==" -} -``` - -The `Key` field is mandatory and provides the encryption key to remove from the -cluster. - -If ACLs are enabled, the client will need to supply an ACL Token with -[`keyring`](/docs/internals/acl.html#keyring) write privileges. - -The return code will indicate success or failure. +* [`/v1/operator/autopilot/configuration`](#autopilot-configuration): Read or update Autopilot configuration +* [`/v1/operator/autopilot/health`](#autopilot-health): Read server health as determined by Autopilot ### /v1/operator/autopilot/configuration @@ -422,4 +207,249 @@ The `Servers` list holds detailed health information on each server: - `Voter` is whether the server is a voting member of the Raft cluster. -- `StableSince` is the time this server has been in its current `Healthy` state. \ No newline at end of file +- `StableSince` is the time this server has been in its current `Healthy` state. + +## Keyring + +The keyring endpoint allows management of the gossip encryption keyring. See +the [Gossip Protocol Guide](/docs/internals/gossip.html) for more details on the +gossip protocol and its use. + +The following endpoint is supported: + +* [`/v1/operator/keyring`](#keyring-endpoint): Operate on the gossip keyring + +### /v1/operator/keyring + +Available in Consul 0.7.2 and later, the keyring endpoint supports the +`GET`, `POST`, `PUT` and `DELETE` methods. + +This endpoint supports the use of ACL tokens using either the `X-CONSUL-TOKEN` +header or the `?token=` query parameter. + +Added in Consul 0.7.4, this endpoint supports the `?relay-factor=` query parameter. +See the [Keyring Command](/docs/commands/keyring.html#_relay_factor) for more details. + +#### GET Method + +Using the `GET` method, this endpoint will list the gossip encryption keys +installed on both the WAN and LAN rings of every known datacenter. There is more +information on gossip encryption available +[here](/docs/agent/encryption.html#gossip-encryption). + +If ACLs are enabled, the client will need to supply an ACL Token with +[`keyring`](/docs/internals/acl.html#keyring) read privileges. + +A JSON body is returned that looks like this: + +```javascript +[ + { + "WAN": true, + "Datacenter": "dc1", + "Keys": { + "0eK8RjnsGC/+I1fJErQsBA==": 1, + "G/3/L4yOw3e5T7NTvuRi9g==": 1, + "z90lFx3sZZLtTOkutXcwYg==": 1 + }, + "NumNodes": 1 + }, + { + "WAN": false, + "Datacenter": "dc1", + "Keys": { + "0eK8RjnsGC/+I1fJErQsBA==": 1, + "G/3/L4yOw3e5T7NTvuRi9g==": 1, + "z90lFx3sZZLtTOkutXcwYg==": 1 + }, + "NumNodes": 1 + } +] +``` + +`WAN` is true if the block refers to the WAN ring of that datacenter (rather than + LAN). + +`Datacenter` is the datacenter the block refers to. + +`Keys` is a map of each gossip key to the number of nodes it's currently installed + on. + +`NumNodes` is the total number of nodes in the datacenter. + +#### POST Method + +Using the `POST` method, this endpoint will install a new gossip encryption key +into the cluster. There is more information on gossip encryption available +[here](/docs/agent/encryption.html#gossip-encryption). + +The `POST` method expects a JSON request body to be submitted. The request +body must look like: + +```javascript +{ + "Key": "3lg9DxVfKNzI8O+IQ5Ek+Q==" +} +``` + +The `Key` field is mandatory and provides the encryption key to install into the +cluster. + +If ACLs are enabled, the client will need to supply an ACL Token with +[`keyring`](/docs/internals/acl.html#keyring) write privileges. + +The return code will indicate success or failure. + +#### PUT Method + +Using the `PUT` method, this endpoint will change the primary gossip encryption +key. The key must already be installed before this operation can succeed. There +is more information on gossip encryption available +[here](/docs/agent/encryption.html#gossip-encryption). + +The `PUT` method expects a JSON request body to be submitted. The request +body must look like: + +```javascript +{ + "Key": "3lg9DxVfKNzI8O+IQ5Ek+Q==" +} +``` + +The `Key` field is mandatory and provides the primary encryption key to begin +using. + +If ACLs are enabled, the client will need to supply an ACL Token with +[`keyring`](/docs/internals/acl.html#keyring) write privileges. + +The return code will indicate success or failure. + +#### DELETE Method + +Using the `DELETE` method, this endpoint will remove a gossip encryption key from +the cluster. This operation may only be performed on keys which are not currently +the primary key. There is more information on gossip encryption available +[here](/docs/agent/encryption.html#gossip-encryption). + +The `DELETE` method expects a JSON request body to be submitted. The request +body must look like: + +```javascript +{ + "Key": "3lg9DxVfKNzI8O+IQ5Ek+Q==" +} +``` + +The `Key` field is mandatory and provides the encryption key to remove from the +cluster. + +If ACLs are enabled, the client will need to supply an ACL Token with +[`keyring`](/docs/internals/acl.html#keyring) write privileges. + +The return code will indicate success or failure. + +## Raft + +The Raft endpoint provides tools for Management of Raft the consensus subsystem +and cluster quorum. See the [Consensus Protocol Guide](/docs/internals/consensus.html) +for more information about Raft consensus protocol and its use. + +The following endpoints are supported: + +* [`/v1/operator/raft/configuration`](#raft-configuration): Inspect the Raft configuration +* [`/v1/operator/raft/peer`](#raft-peer): Remove a server from the Raft configuration + +### /v1/operator/raft/configuration + +The Raft configuration endpoint supports the `GET` method. + +#### GET Method + +When using the `GET` method, the request will be forwarded to the cluster +leader to retrieve its latest Raft peer configuration. + +If the cluster doesn't currently have a leader an error will be returned. You +can use the `?stale` query parameter to read the Raft configuration from any +of the Consul servers. + +By default, the datacenter of the agent is queried; however, the `dc` can be +provided using the `?dc=` query parameter. + +If ACLs are enabled, the client will need to supply an ACL Token with +[`operator`](/docs/internals/acl.html#operator) read privileges. + +A JSON body is returned that looks like this: + +```javascript +{ + "Servers": [ + { + "ID": "127.0.0.1:8300", + "Node": "alice", + "Address": "127.0.0.1:8300", + "Leader": true, + "Voter": true + }, + { + "ID": "127.0.0.2:8300", + "Node": "bob", + "Address": "127.0.0.2:8300", + "Leader": false, + "Voter": true + }, + { + "ID": "127.0.0.3:8300", + "Node": "carol", + "Address": "127.0.0.3:8300", + "Leader": false, + "Voter": true + } + ], + "Index": 22 +} +``` + +The `Servers` array has information about the servers in the Raft peer +configuration: + +`ID` is the ID of the server. This is the same as the `Address` in Consul 0.7 +but may be upgraded to a GUID in a future version of Consul. + +`Node` is the node name of the server, as known to Consul, or "(unknown)" if +the node is stale and not known. + +`Address` is the IP:port for the server. + +`Leader` is either "true" or "false" depending on the server's role in the +Raft configuration. + +`Voter` is "true" or "false", indicating if the server has a vote in the Raft +configuration. Future versions of Consul may add support for non-voting servers. + +The `Index` value is the Raft corresponding to this configuration. The latest configuration may not yet be committed if changes are in flight. + +### /v1/operator/raft/peer + +The Raft peer endpoint supports the `DELETE` method. + +#### DELETE Method + +Using the `DELETE` method, this endpoint will remove the Consul server with +given address from the Raft configuration. + +There are rare cases where a peer may be left behind in the Raft configuration +even though the server is no longer present and known to the cluster. This +endpoint can be used to remove the failed server so that it is no longer +affects the Raft quorum. + +An `?address=` query parameter is required and should be set to the +`IP:port` for the server to remove. The port number is usually 8300, unless +configured otherwise. Nothing is required in the body of the request. + +By default, the datacenter of the agent is targeted; however, the `dc` can be +provided using the `?dc=` query parameter. + +If ACLs are enabled, the client will need to supply an ACL Token with +[`operator`](/docs/internals/acl.html#operator) write privileges. + +The return code will indicate success or failure. From 1296e40ad58470b818c2398c7a7b2666d470ee03 Mon Sep 17 00:00:00 2001 From: James Phillips Date: Tue, 28 Mar 2017 01:01:22 -0700 Subject: [PATCH 2/4] Adds basic operator area HTTP documentation. --- .../docs/agent/http/operator.html.markdown | 247 +++++++++++++++++- 1 file changed, 246 insertions(+), 1 deletion(-) diff --git a/website/source/docs/agent/http/operator.html.markdown b/website/source/docs/agent/http/operator.html.markdown index 7caabf8d60..3c3133b2de 100644 --- a/website/source/docs/agent/http/operator.html.markdown +++ b/website/source/docs/agent/http/operator.html.markdown @@ -27,6 +27,7 @@ The following types of endpoints are supported: * [Autopilot](#autopilot): Automatically manage Consul servers * [Keyring](#keyring): Manage gossip encryption keyring +* [Network Areas](#network-areas): Manage network areas (Enterprise-only) * [Raft](#raft): Manage Raft consensus subsystem Not all endpoints support blocking queries and all consistency modes, @@ -348,6 +349,250 @@ If ACLs are enabled, the client will need to supply an ACL Token with The return code will indicate success or failure. +## Network Areas + +~> The network area functionality described here is available only in + [Consul Enterprise](https://www.hashicorp.com/consul.html) version 0.8.0 and later. + +Consul Enterprise version supports network areas, which are operator-defined relationships +between servers in two different Consul datacenters. + +Unlike Consul's WAN feature, network areas use just the server RPC port for communication, +and relationships can be made between independent pairs of datacenters, so not all servers +need to be fully connected. This allows for complex topologies among Consul datacenters like +hub/spoke and more general trees. See the [Network Areas Guide](/docs/guides/areas.html) for +more details. + +The following endpoints are supported: + +* [`/v1/operator/area`](#area-general): Create a new area or list areas +* [`/v1/operator/area/`](#area-specific): Delete an area +* [`/v1/operator/area//join`](#area-join): Join Consul servers into an area +* [`/v1/operator/area//members`](#area-members): List Consul servers in an area + +### /v1/operator/area + +The general network area endpoint supports the `POST` and `GET` methods. + +#### POST Method + +When using the `POST` method, Consul will create a new network area and return +its ID if it is created successfully. + +By default, the datacenter of the agent is queried; however, the `dc` can be +provided using the `?dc=` query parameter. + +If ACLs are enabled, the client will need to supply an ACL Token with `operator` +write privileges. + +The create operation expects a JSON request body that defines the network area, +like this example: + +```javascript +{ + "PeerDatacenter": "dc2", + "RetryJoin": [ "10.1.2.3", "10.1.2.4", "10.1.2.5" ] +} +``` + +`PeerDatacenter` is required and is the name of the Consul datacenter that will +be joined the Consul servers in the current datacenter to form the area. Only +one area is allowed for each possible `PeerDatacenter`, and a datacenter cannot +form an area with itself. + +`RetryJoin` is a list of Consul servers to attempt to join. Servers can be given +as `IP`, `IP:port`, `hostname`, or `hostname:port`. Consul will spawn a background +task that tries to periodically join the servers in this list and will run until a +join succeeds. If this list isn't supplied, joining can be done with a call to the +[join endpoint](#area-join) once the network area is created. + +The return code is 200 on success and the ID of the created network area is returned +in a JSON body: + +```javascript +{ + "ID": "8f246b77-f3e1-ff88-5b48-8ec93abf3e05" +} +``` + +#### GET Method + +When using the `GET` method, Consul will provide a listing of all network areas. + +By default, the datacenter of the agent is queried; however, the `dc` can be +provided using the `?dc=` query parameter. This endpoint supports blocking +queries and all consistency modes. + +If ACLs are enabled, the client will need to supply an ACL Token with `operator` +read privileges. + +This returns a JSON list of network areas, which looks like: + +```javascript +[ + { + "ID": "8f246b77-f3e1-ff88-5b48-8ec93abf3e05", + "PeerDatacenter": "dc2", + "RetryJoin": [ "10.1.2.3", "10.1.2.4", "10.1.2.5" ] + }, + ... +] +``` + +### /v1/operator/area/\ + +The specific network area endpoint supports the `GET` and `DELETE` methods. + +#### GET Method + +When using the `GET` method, Consul will provide a listing of a specific +network area. + +By default, the datacenter of the agent is queried; however, the `dc` can be +provided using the `?dc=` query parameter. This endpoint supports blocking +queries and all consistency modes. + +If ACLs are enabled, the client will need to supply an ACL Token with `operator` +read privileges. + +This returns a JSON list with a single network area, which looks like: + +```javascript +[ + { + "ID": "8f246b77-f3e1-ff88-5b48-8ec93abf3e05", + "PeerDatacenter": "dc2", + "RetryJoin": [ "10.1.2.3", "10.1.2.4", "10.1.2.5" ] + } +] +``` + +#### Delete Method + +When using the `DELETE` method, Consul will delete a specific network area. + +By default, the datacenter of the agent is queried; however, the `dc` can be +provided using the `?dc=` query parameter. + +If ACLs are enabled, the client will need to supply an ACL Token with `operator` +write privileges. + +### /v1/operator/area/\/join + +The network area join endpoint supports the `PUT` method. + +#### PUT Method + +When using the `PUT` method, Consul will attempt to join the given Consul servers +into a specific network area. + +By default, the datacenter of the agent is queried; however, the `dc` can be +provided using the `?dc=` query parameter. + +If ACLs are enabled, the client will need to supply an ACL Token with `operator` +write privileges. + +The create operation expects a JSON request body with a list of Consul servers to +join, like this example: + +```javascript +[ "10.1.2.3", "10.1.2.4", "10.1.2.5" ] +``` + +Servers can be given as `IP`, `IP:port`, `hostname`, or `hostname:port`. + +The return code is 200 on success a JSON response will be returned with a summary +of the join results: + +```javascript +[ + { + "Address": "10.1.2.3", + "Joined": true, + "Error", "" + }, + { + "Address": "10.1.2.4", + "Joined": true, + "Error", "" + }, + { + "Address": "10.1.2.5", + "Joined": true, + "Error", "" + } +] +``` + +`Address` has the address requested to join. + +`Joined` will be `true` if the Consul server at the given address was successfully +joined into the network area. Otherwise, this will be `false` and `Error` will have +a human-readable message about why the join didn't succeed. + +### /v1/operator/area/\/members + +The network area members endpoint supports the `GET` method. + +#### GET Method + +When using the `GET` method, Consul will provide a listing of the Consul servers +present in a specific network area. + +By default, the datacenter of the agent is queried; however, the `dc` can be +provided using the `?dc=` query parameter. + +If ACLs are enabled, the client will need to supply an ACL Token with `operator` +read privileges. + +This returns a JSON list with details about the Consul servers present in the network +area, like this: + +```javascript +[ + { + "ID": "afc5d95c-1eee-4b46-b85b-0efe4c76dd48", + "Name": "node-2.dc1", + "Addr": "127.0.0.2", + "Port": 8300, + "Datacenter": "dc1", + "Role": "server", + "Build": "0.8.0", + "Protocol": 2, + "Status": "alive", + "RTT": 256478 + }, + ... +] +``` + +`ID` is the node ID of the server. + +`Name` is the node name of the server, with its datacenter appended. + +`Addr` is the IP address of the node. + +`Port` is the server RPC port of the node. + +`Datacenter` is the node's Consul datacenter. + +`Role` is always "server" since only Consul servers can participate in network +areas. + +`Build` has the Consul version running on the node. + +`Protocol` is the [protocol version](/docs/upgrading.html#protocol-versions) being +spoken by the node. + +`Status` is the current health status of the node, as determined by the network +area distributed failure detector. This will be "alive", "leaving", "left", or +"failed". A "failed" status means that other servers are not able to probe this +server over its server RPC interface. + +`RTT` is an estimated network round trip time from the server answering the query +to the given server, in nanoseconds. This is computed using +[network coordinates](/docs/internals/coordinates.html). + ## Raft The Raft endpoint provides tools for Management of Raft the consensus subsystem @@ -413,7 +658,7 @@ The `Servers` array has information about the servers in the Raft peer configuration: `ID` is the ID of the server. This is the same as the `Address` in Consul 0.7 -but may be upgraded to a GUID in a future version of Consul. +but may be upgraded to a GUID in a future version of Consul. `Node` is the node name of the server, as known to Consul, or "(unknown)" if the node is stale and not known. From 0b0eba8e97a0ed3c3ba56d1d99a715d8c74e8ad7 Mon Sep 17 00:00:00 2001 From: James Phillips Date: Tue, 28 Mar 2017 10:31:56 -0700 Subject: [PATCH 3/4] Adds network area CLI documentation. --- .../docs/agent/http/operator.html.markdown | 5 +- .../docs/commands/operator.html.markdown.erb | 2 + .../commands/operator/area.html.markdown.erb | 216 ++++++++++++++++++ website/source/layouts/docs.erb | 3 + 4 files changed, 224 insertions(+), 2 deletions(-) create mode 100644 website/source/docs/commands/operator/area.html.markdown.erb diff --git a/website/source/docs/agent/http/operator.html.markdown b/website/source/docs/agent/http/operator.html.markdown index 3c3133b2de..1b8a6299d1 100644 --- a/website/source/docs/agent/http/operator.html.markdown +++ b/website/source/docs/agent/http/operator.html.markdown @@ -360,8 +360,9 @@ between servers in two different Consul datacenters. Unlike Consul's WAN feature, network areas use just the server RPC port for communication, and relationships can be made between independent pairs of datacenters, so not all servers need to be fully connected. This allows for complex topologies among Consul datacenters like -hub/spoke and more general trees. See the [Network Areas Guide](/docs/guides/areas.html) for -more details. +hub/spoke and more general trees. + +See the [Network Areas Guide](/docs/guides/areas.html) for more details. The following endpoints are supported: diff --git a/website/source/docs/commands/operator.html.markdown.erb b/website/source/docs/commands/operator.html.markdown.erb index 69bd2a826f..049d2b9f4d 100644 --- a/website/source/docs/commands/operator.html.markdown.erb +++ b/website/source/docs/commands/operator.html.markdown.erb @@ -35,6 +35,7 @@ Usage: consul operator [options] Subcommands: + area Provides tools for working with network areas (Enterprise-only) autopilot Provides tools for modifying Autopilot configuration raft Provides cluster-level tools for Consul operators ``` @@ -42,5 +43,6 @@ Subcommands: For more information, examples, and usage about a subcommand, click on the name of the subcommand in the sidebar or one of the links below: +- [area] (/docs/commands/operator/area.html) - [autopilot] (/docs/commands/operator/autopilot.html) - [raft] (/docs/commands/operator/raft.html) diff --git a/website/source/docs/commands/operator/area.html.markdown.erb b/website/source/docs/commands/operator/area.html.markdown.erb new file mode 100644 index 0000000000..b368694465 --- /dev/null +++ b/website/source/docs/commands/operator/area.html.markdown.erb @@ -0,0 +1,216 @@ +--- +layout: "docs" +page_title: "Commands: Operator Area" +sidebar_current: "docs-commands-operator-area" +description: > + The operator area command is used to interact with Consul's network area subsystem. +--- + +# Consul Operator Area + +Command: `consul operator area` + +~> The network area functionality described here is available only in + [Consul Enterprise](https://www.hashicorp.com/consul.html) version 0.8.0 and later. + +Consul Enterprise version supports network areas, which are operator-defined relationships +between servers in two different Consul datacenters. The operator area command is used to +interact with Consul's network area subsystem. + +Unlike Consul's WAN feature, network areas use just the server RPC port for communication, +and relationships can be made between independent pairs of datacenters, so not all servers +need to be fully connected. This allows for complex topologies among Consul datacenters like +hub/spoke and more general trees. + +See the [Network Areas Guide](/docs/guides/areas.html) for more details. + +```text +Usage: consul operator area [options] + +The operator area command is used to interact with Consul's network area +subsystem. Network areas are used to link together Consul servers in different +Consul datacenters. With network areas, Consul datacenters can be linked +together in ways other than a fully-connected mesh, as is required for Consul's +WAN. + +Subcommands: + + create Create a new network area + delete Remove a network area + join Join Consul servers into an existing network area + list List network areas + members Display Consul server members present in network areas +``` + +If ACLs are enabled, the client will need to supply an ACL Token with `operator` +read or write privileges to use these commands. + +## create + +This command creates a new network area. + +Usage: `consul operator area create [options]` + +#### API Options + +<%= partial "docs/commands/http_api_options_client" %> +<%= partial "docs/commands/http_api_options_server" %> + +#### Command Options + +* `-peer-datacenter=` - Declares the peer Consul datacenter that will make up the other +side of this network area. Network areas always involve a pair of datacenters: the datacenter +where the area was created, and the peer datacenter. This is required. + +* `-retry-join=` Specifies the address of a Consul server to join to, such as an IP +or hostname with an optional port number. This is optional and can be specified multiple times. + +The output looks like this, displaying the ID of the newly-created network area: + +``` +Created area "d2872ec5-68ea-b862-b75d-0bee99aca100" with peer datacenter "other"! +``` + +The return code will indicate success or failure. + +## delete + +This command deletes an existing network area. + +Usage: `consul operator area delete [options]` + +#### API Options + +<%= partial "docs/commands/http_api_options_client" %> +<%= partial "docs/commands/http_api_options_server" %> + +#### Command Options + +* `-id=` - Looks up the area to operate on by its ID. This can be given +instead of a peer datacenter. + +* `-peer-datacenter=` - Looks up the area to operate on by its peer +datacenter. This can be given instead of an ID. + +The output looks like this: + +``` +Deleted area "154941b0-80e2-9d69-c560-ab2c02807332"! +``` + +The return code will indicate success or failure. + +## join + +This command joins Consul servers into an existing network area by address, such as +an IP or hostname with an optional port. Multiple addresses may be given. + +Usage: `consul operator area join [options] ADDRESSES` + +#### API Options + +<%= partial "docs/commands/http_api_options_client" %> +<%= partial "docs/commands/http_api_options_server" %> + +#### Command Options + +* `-id=` - Looks up the area to operate on by its ID. This can be given +instead of a peer datacenter. + +* `-peer-datacenter=` - Looks up the area to operate on by its peer +datacenter. This can be given instead of an ID. + +The output looks like this: + +``` +Address Joined Error +10.1.2.3 false failed to connect to "10.1.2.3:8300": dial tcp 10.1.2.3:8300: i/o timeout +10.1.2.4 true (none) +10.1.2.5 true (none) +``` + +The `Error` field will have a human-readable error message if Consul was unable +to join the given address. + +The return code will indicate success or failure. + +## list + +This command lists all network areas. + +Usage: `consul operator area list [options]` + +#### API Options + +<%= partial "docs/commands/http_api_options_client" %> +<%= partial "docs/commands/http_api_options_server" %> + +The output looks like this: + +``` +Area PeerDC RetryJoin +6a52a0af-62e2-dad4-da60-e66acc37096c dc2 10.1.2.3,10.1.2.4,10.1.2.5 +96e33424-f5ce-9fcd-ecab-27974e36678f other (none) +``` + +`Area` is the ID of the network area. + +`PeerDC` is the peer datacenter for the area. + +`RetryJoin` is the list of servers to join, defined when the area was created. + +The return code will indicate success or failure. + +## members + +This command displays Consul server nodes present in a network area, or all +areas if no area is specified. + +Usage: `consul operator area members [options]` + +#### API Options + +<%= partial "docs/commands/http_api_options_client" %> +<%= partial "docs/commands/http_api_options_server" %> + +#### Command Options + +* `-id=` - Looks up the area to operate on by its ID. This can be given +instead of a peer datacenter. + +* `-peer-datacenter=` - Looks up the area to operate on by its peer +datacenter. This can be given instead of an ID. + +The output looks like this: + +``` +Area Node Address Status Build Protocol DC RTT +6a52a0af-62e2-dad4-da60-e66acc37096c node-1.dc1 127.0.0.1:8300 alive 0.8.0 2 dc1 0s +6a52a0af-62e2-dad4-da60-e66acc37096c node-2.dc1 127.0.0.2:8300 alive 0.8.0 2 dc1 594.191µs +96e33424-f5ce-9fcd-ecab-27974e36678f node-1.dc1 127.0.0.1:8300 alive 0.8.0 2 dc1 0s +96e33424-f5ce-9fcd-ecab-27974e36678f node-2.dc1 127.0.0.2:8300 alive 0.8.0 2 dc1 634.109µs +``` + +`Area` is the ID of the network area. + +`Node` is the name of the node. + +`Address` is the IP and server RPC port for the node. + +`Status` is the current health status of the node, as determined by the network +area distributed failure detector. This will be "alive", "leaving", "left", or +"failed". A "failed" status means that other servers are not able to probe this +server over its server RPC interface. + +`Build` has the Consul version running on the node. + +`Protocol` is the [protocol version](/docs/upgrading.html#protocol-versions) being +spoken by the node. + +`DC` is the node's Consul datacenter. + +`RTT` is an estimated network round trip time from the server answering the query +to the given server, in a human-readable format. This is computed using +[network coordinates](/docs/internals/coordinates.html). + +The return code will indicate success or failure. diff --git a/website/source/layouts/docs.erb b/website/source/layouts/docs.erb index 18ca0c2100..607a90b9eb 100644 --- a/website/source/layouts/docs.erb +++ b/website/source/layouts/docs.erb @@ -142,6 +142,9 @@ > operator