mirror of https://github.com/status-im/consul.git
docs: update envoy docs for changes related to xDS v2->v3 and SoTW->Incremental (#10166)
Fixes #10098
This commit is contained in:
parent
e8fdefc772
commit
1872f0a665
|
@ -10,7 +10,7 @@ Consul Connect has first class support for using
|
||||||
[Envoy](https://www.envoyproxy.io) as a proxy. Consul configures Envoy by
|
[Envoy](https://www.envoyproxy.io) as a proxy. Consul configures Envoy by
|
||||||
optionally exposing a gRPC service on the local agent that serves [Envoy's xDS
|
optionally exposing a gRPC service on the local agent that serves [Envoy's xDS
|
||||||
configuration
|
configuration
|
||||||
API](https://www.envoyproxy.io/docs/envoy/latest/api-docs/xds_protocol).
|
API](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-docs/xds_protocol).
|
||||||
|
|
||||||
Consul can configure Envoy sidecars to proxy http/1.1, http2, or gRPC traffic at
|
Consul can configure Envoy sidecars to proxy http/1.1, http2, or gRPC traffic at
|
||||||
L7 or any other tcp-based protocol at L4. Prior to Consul 1.5.0 Envoy proxies
|
L7 or any other tcp-based protocol at L4. Prior to Consul 1.5.0 Envoy proxies
|
||||||
|
@ -43,7 +43,7 @@ compatible Envoy versions.
|
||||||
| 1.4.x, 1.3.x | 1.9.1, 1.8.0†, 1.7.0† |
|
| 1.4.x, 1.3.x | 1.9.1, 1.8.0†, 1.7.0† |
|
||||||
|
|
||||||
~> ‡ To ensure that intention enforcement is updated as quickly as possible
|
~> ‡ To ensure that intention enforcement is updated as quickly as possible
|
||||||
after any changes, it is advised to run Consul 1.9.0 with Envoy 1.15.0+ due to a
|
after any changes, it is advised to run Consul 1.9.0+ with Envoy 1.15.0+ due to a
|
||||||
[listener update improvement](https://github.com/envoyproxy/envoy/pull/10662).<br/><br/>
|
[listener update improvement](https://github.com/envoyproxy/envoy/pull/10662).<br/><br/>
|
||||||
† Envoy versions lower than 1.9.1 are vulnerable to
|
† Envoy versions lower than 1.9.1 are vulnerable to
|
||||||
[CVE-2019-9900](https://github.com/envoyproxy/envoy/issues/6434) and
|
[CVE-2019-9900](https://github.com/envoyproxy/envoy/issues/6434) and
|
||||||
|
@ -166,7 +166,7 @@ definition](/docs/connect/registration/service-registration) or
|
||||||
all metrics produced by the proxy.
|
all metrics produced by the proxy.
|
||||||
|
|
||||||
- `envoy_stats_flush_interval` - Configures Envoy's
|
- `envoy_stats_flush_interval` - Configures Envoy's
|
||||||
[`stats_flush_interval`](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/config/bootstrap/v2/bootstrap.proto#envoy-api-field-config-bootstrap-v2-bootstrap-stats-flush-interval).
|
[`stats_flush_interval`](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/bootstrap/v3/bootstrap.proto#envoy-v3-api-field-config-bootstrap-v3-bootstrap-stats-flush-interval).
|
||||||
|
|
||||||
There are more possibilities available in the [Advanced
|
There are more possibilities available in the [Advanced
|
||||||
Configuration](#advanced-configuration) section that allow incremental or
|
Configuration](#advanced-configuration) section that allow incremental or
|
||||||
|
@ -224,7 +224,7 @@ defaults that are inherited by all services.
|
||||||
- `grpc` - gRPC is a common RPC protocol based on http2. In addition to the
|
- `grpc` - gRPC is a common RPC protocol based on http2. In addition to the
|
||||||
http2 support above, Envoy listeners will be configured with a
|
http2 support above, Envoy listeners will be configured with a
|
||||||
[gRPC bridge
|
[gRPC bridge
|
||||||
filter](https://www.envoyproxy.io/docs/envoy/v1.10.0/configuration/http_filters/grpc_http1_bridge_filter#config-http-filters-grpc-bridge)
|
filter](https://www.envoyproxy.io/docs/envoy/v1.17.2/configuration/http/http_filters/grpc_http1_bridge_filter)
|
||||||
that translates HTTP/1.1 calls into gRPC, and instruments
|
that translates HTTP/1.1 calls into gRPC, and instruments
|
||||||
metrics with `gRPC-status` trailer codes.
|
metrics with `gRPC-status` trailer codes.
|
||||||
|
|
||||||
|
@ -343,7 +343,7 @@ will continue to be supported.
|
||||||
|
|
||||||
- `envoy_dns_discovery_type` - Determines how Envoy will resolve hostnames. Defaults to `LOGICAL_DNS`.
|
- `envoy_dns_discovery_type` - Determines how Envoy will resolve hostnames. Defaults to `LOGICAL_DNS`.
|
||||||
Must be one of `STRICT_DNS` or `LOGICAL_DNS`. Details for each type are available in
|
Must be one of `STRICT_DNS` or `LOGICAL_DNS`. Details for each type are available in
|
||||||
the [Envoy documentation](https://www.envoyproxy.io/docs/envoy/v1.14.1/intro/arch_overview/upstream/service_discovery).
|
the [Envoy documentation](https://www.envoyproxy.io/docs/envoy/v1.17.2/intro/arch_overview/upstream/service_discovery).
|
||||||
This option applies to terminating gateways that route to services
|
This option applies to terminating gateways that route to services
|
||||||
addressed by a hostname, such as a managed databased. It also applies to mesh gateways,
|
addressed by a hostname, such as a managed databased. It also applies to mesh gateways,
|
||||||
such as when gateways in other Consul datacenters are behind a load balancer that is addressed by a hostname.
|
such as when gateways in other Consul datacenters are behind a load balancer that is addressed by a hostname.
|
||||||
|
@ -381,17 +381,18 @@ noted.
|
||||||
|
|
||||||
The JSON supplied may describe a protobuf `types.Any` message with an `@type`
|
The JSON supplied may describe a protobuf `types.Any` message with an `@type`
|
||||||
field set to the appropriate type (for example
|
field set to the appropriate type (for example
|
||||||
`type.googleapis.com/envoy.api.v2.Listener`), or it may be the direct encoding
|
`type.googleapis.com/envoy.config.listener.v3.Listener`).
|
||||||
with no `@type` field.
|
|
||||||
|
|
||||||
For example, given a tracing config:
|
For example, given a tracing config:
|
||||||
|
|
||||||
```json
|
```json
|
||||||
"tracing": {
|
{
|
||||||
"http": {
|
"http": {
|
||||||
"name": "envoy.zipkin",
|
"name": "envoy.tracers.zipkin",
|
||||||
"config": {
|
"typedConfig": {
|
||||||
|
"@type": "type.googleapis.com/envoy.config.trace.v3.ZipkinConfig",
|
||||||
"collector_cluster": "zipkin",
|
"collector_cluster": "zipkin",
|
||||||
|
"collector_endpoint_version": "HTTP_JSON",
|
||||||
"collector_endpoint": "/api/v1/spans",
|
"collector_endpoint": "/api/v1/spans",
|
||||||
"shared_span_context": false
|
"shared_span_context": false
|
||||||
}
|
}
|
||||||
|
@ -407,7 +408,7 @@ and then use that as the value for `envoy_tracing_json`:
|
||||||
"kind": "proxy-defaults",
|
"kind": "proxy-defaults",
|
||||||
"name": "global",
|
"name": "global",
|
||||||
"config": {
|
"config": {
|
||||||
"envoy_tracing_json": "{\"http\":{\"name\":\"envoy.zipkin\",\"config\":{\"collector_cluster\":\"zipkin\",\"collector_endpoint\":\"/api/v1/spans\",\"shared_span_context\":false}}}"
|
"envoy_tracing_json": "{\"http\":{\"name\":\"envoy.tracers.zipkin\",\"typedConfig\":{\"@type\":\"type.googleapis.com/envoy.config.trace.v3.ZipkinConfig\",\"collector_cluster\":\"zipkin\",\"collector_endpoint_version\":\"HTTP_JSON\",\"collector_endpoint\":\"/api/v1/spans\",\"shared_span_context\":false}}}\n"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
@ -421,9 +422,11 @@ Config {
|
||||||
envoy_tracing_json = <<EOF
|
envoy_tracing_json = <<EOF
|
||||||
{
|
{
|
||||||
"http": {
|
"http": {
|
||||||
"name": "envoy.zipkin",
|
"name": "envoy.tracers.zipkin",
|
||||||
"config": {
|
"typedConfig": {
|
||||||
|
"@type": "type.googleapis.com/envoy.config.trace.v3.ZipkinConfig",
|
||||||
"collector_cluster": "zipkin",
|
"collector_cluster": "zipkin",
|
||||||
|
"collector_endpoint_version": "HTTP_JSON",
|
||||||
"collector_endpoint": "/api/v1/spans",
|
"collector_endpoint": "/api/v1/spans",
|
||||||
"shared_span_context": false
|
"shared_span_context": false
|
||||||
}
|
}
|
||||||
|
@ -442,30 +445,34 @@ override them directly in the `proxy.config` field of a [proxy service
|
||||||
definition](/docs/connect/registration/service-registration) or
|
definition](/docs/connect/registration/service-registration) or
|
||||||
[`sidecar_service`](/docs/connect/registration/sidecar-service) block.
|
[`sidecar_service`](/docs/connect/registration/sidecar-service) block.
|
||||||
|
|
||||||
- `envoy_extra_static_clusters_json` - Specifies one or more [Envoy
|
- `envoy_extra_static_clusters_json` - Specifies one or more [Envoy clusters][pb-cluster]
|
||||||
clusters](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/api/v2/cds.proto#cluster)
|
|
||||||
that will be appended to the array of [static
|
that will be appended to the array of [static
|
||||||
clusters](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/config/bootstrap/v2/bootstrap.proto#envoy-api-field-config-bootstrap-v2-bootstrap-staticresources-clusters)
|
clusters](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/bootstrap/v3/bootstrap.proto#envoy-v3-api-field-config-bootstrap-v3-bootstrap-staticresources-clusters)
|
||||||
in the bootstrap config. This allows adding custom clusters for tracing sinks
|
in the bootstrap config. This allows adding custom clusters for tracing sinks
|
||||||
for example. For a single cluster just encode a single object, for multiple,
|
for example. For a single cluster just encode a single object, for multiple,
|
||||||
they should be comma separated with no trailing comma suitable for
|
they should be comma separated with no trailing comma suitable for
|
||||||
interpolating directly into a JSON array inside the braces.
|
interpolating directly into a JSON array inside the braces.
|
||||||
|
|
||||||
- `envoy_extra_static_listeners_json` - Similar to
|
- `envoy_extra_static_listeners_json` - Similar to
|
||||||
`envoy_extra_static_clusters_json` but appends [static
|
`envoy_extra_static_clusters_json` but appends one or more [Envoy listeners][pb-listener] to the array of [static
|
||||||
listener](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/config/bootstrap/v2/bootstrap.proto#envoy-api-field-config-bootstrap-v2-bootstrap-staticresources-listeners) definitions.
|
listener](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/bootstrap/v3/bootstrap.proto#envoy-v3-api-field-config-bootstrap-v3-bootstrap-staticresources-listeners) definitions.
|
||||||
Can be used to setup limited access that bypasses Connect mTLS or
|
Can be used to setup limited access that bypasses Connect mTLS or
|
||||||
authorization for health checks or metrics.
|
authorization for health checks or metrics.
|
||||||
|
|
||||||
- `envoy_extra_stats_sinks_json` - Similar to `envoy_extra_static_clusters_json`
|
- `envoy_extra_stats_sinks_json` - Similar to `envoy_extra_static_clusters_json`
|
||||||
but for [stats sinks](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/config/bootstrap/v2/bootstrap.proto#envoy-api-field-config-bootstrap-v2-bootstrap-stats-sinks). These are appended to any sinks defined by use of the
|
but for [stats sinks](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/bootstrap/v3/bootstrap.proto#envoy-v3-api-field-config-bootstrap-v3-bootstrap-stats-sinks).
|
||||||
|
These are appended to any sinks defined by use of the
|
||||||
higher-level [`envoy_statsd_url`](#envoy_statsd_url) or
|
higher-level [`envoy_statsd_url`](#envoy_statsd_url) or
|
||||||
[`envoy_dogstatsd_url`](#envoy_dogstatsd_url) config options.
|
[`envoy_dogstatsd_url`](#envoy_dogstatsd_url) config options.
|
||||||
|
|
||||||
- `envoy_stats_config_json` - The entire [stats
|
- `envoy_stats_config_json` - The entire [stats
|
||||||
config](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/config/bootstrap/v2/bootstrap.proto#envoy-api-field-config-bootstrap-v2-bootstrap-stats-config).
|
config](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/bootstrap/v3/bootstrap.proto#envoy-v3-api-field-config-bootstrap-v3-bootstrap-stats-config).
|
||||||
If provided this will override the higher-level
|
If provided this will override the higher-level
|
||||||
[`envoy_stats_tags`](#envoy_stats_tags). It allows full control over dynamic
|
[`envoy_stats_tags`](#envoy_stats_tags). It allows full control over dynamic
|
||||||
tag replacements etc.
|
tag replacements etc.
|
||||||
|
|
||||||
- `envoy_tracing_json` - The entire [tracing
|
- `envoy_tracing_json` - The entire [tracing
|
||||||
config](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/config/bootstrap/v2/bootstrap.proto#envoy-api-field-config-bootstrap-v2-bootstrap-tracing).
|
config](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/bootstrap/v3/bootstrap.proto#envoy-v3-api-field-config-bootstrap-v3-bootstrap-tracing).
|
||||||
Most tracing providers will also require adding static clusters to define the
|
Most tracing providers will also require adding static clusters to define the
|
||||||
endpoints to send tracing data to.
|
endpoints to send tracing data to.
|
||||||
|
|
||||||
|
@ -480,19 +487,20 @@ definition](/docs/connect/registration/service-registration) or
|
||||||
|
|
||||||
- `envoy_bootstrap_json_tpl` - Specifies a template in Go template syntax that
|
- `envoy_bootstrap_json_tpl` - Specifies a template in Go template syntax that
|
||||||
is used in place of [the default
|
is used in place of [the default
|
||||||
template](https://github.com/hashicorp/consul/blob/b64bda880843afaaf44591c3200f921626716849/command/connect/envoy/bootstrap_tpl.go#L87)
|
template](https://github.com/hashicorp/consul/blob/71d45a34601423abdfc0a64d44c6a55cf88fa2fc/command/connect/envoy/bootstrap_tpl.go#L129)
|
||||||
when generating bootstrap via [`consul connect envoy`
|
when generating bootstrap via [`consul connect envoy`
|
||||||
command](/commands/connect/envoy). The variables that are available
|
command](/commands/connect/envoy). The variables that are available
|
||||||
to be interpolated are [documented
|
to be interpolated are [documented
|
||||||
here](https://github.com/hashicorp/consul/blob/b64bda880843afaaf44591c3200f921626716849/command/connect/envoy/bootstrap_tpl.go#L5).
|
here](https://github.com/hashicorp/consul/blob/71d45a34601423abdfc0a64d44c6a55cf88fa2fc/command/connect/envoy/bootstrap_tpl.go#L5).
|
||||||
This offers complete control of the proxy's bootstrap although major
|
This offers complete control of the proxy's bootstrap although major
|
||||||
deviations from the default template may break Consul's ability to correctly
|
deviations from the default template may break Consul's ability to correctly
|
||||||
manage the proxy or enforce its security model.
|
manage the proxy or enforce its security model.
|
||||||
- `envoy_public_listener_json` - Specifies a complete
|
|
||||||
[Listener](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/api/v2/lds.proto)
|
- `envoy_public_listener_json` - Specifies a complete [Envoy listener][pb-listener]
|
||||||
to be delivered in place of the main public listener that the proxy used to
|
to be delivered in place of the main public listener that the proxy used to
|
||||||
accept inbound connections. This will be used verbatim with the following
|
accept inbound connections. This will be used verbatim with the following
|
||||||
exceptions:
|
exceptions:
|
||||||
|
|
||||||
- Every `FilterChain` added to the listener will have its `TlsContext`
|
- Every `FilterChain` added to the listener will have its `TlsContext`
|
||||||
overridden by the Connect TLS certificates and validation context. This
|
overridden by the Connect TLS certificates and validation context. This
|
||||||
means there is no way to override Connect's mutual TLS for the public
|
means there is no way to override Connect's mutual TLS for the public
|
||||||
|
@ -500,8 +508,8 @@ definition](/docs/connect/registration/service-registration) or
|
||||||
- Every `FilterChain` will have the `envoy.filters.{network|http}.rbac` filter
|
- Every `FilterChain` will have the `envoy.filters.{network|http}.rbac` filter
|
||||||
prepended to the filters array to ensure that all inbound connections are
|
prepended to the filters array to ensure that all inbound connections are
|
||||||
authorized by Connect. Before Consul 1.9.0 `envoy.ext_authz` was inserted instead.
|
authorized by Connect. Before Consul 1.9.0 `envoy.ext_authz` was inserted instead.
|
||||||
- `envoy_local_cluster_json` - Specifies a complete [Envoy
|
|
||||||
cluster](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/api/v2/cds.proto#cluster)
|
- `envoy_local_cluster_json` - Specifies a complete [Envoy cluster][pb-cluster]
|
||||||
to be delivered in place of the local application cluster. This allows
|
to be delivered in place of the local application cluster. This allows
|
||||||
customization of timeouts, rate limits, load balancing strategy etc.
|
customization of timeouts, rate limits, load balancing strategy etc.
|
||||||
|
|
||||||
|
@ -517,17 +525,17 @@ definition](/docs/connect/registration/service-registration) or
|
||||||
entry exists for a service the below escape hatches are ignored and will log a
|
entry exists for a service the below escape hatches are ignored and will log a
|
||||||
warning.
|
warning.
|
||||||
|
|
||||||
- `envoy_listener_json` - Specifies a complete
|
- `envoy_listener_json` - Specifies a complete [Listener][pb-listener]
|
||||||
[Listener](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/api/v2/lds.proto)
|
|
||||||
to be delivered in place of the upstream listener that the proxy exposes to
|
to be delivered in place of the upstream listener that the proxy exposes to
|
||||||
the application for outbound connections. This will be used verbatim with the
|
the application for outbound connections. This will be used verbatim with the
|
||||||
following exceptions:
|
following exceptions:
|
||||||
|
|
||||||
- Every `FilterChain` added to the listener will have its `TlsContext`
|
- Every `FilterChain` added to the listener will have its `TlsContext`
|
||||||
overridden by the Connect TLS certificates and validation context. This
|
overridden by the Connect TLS certificates and validation context. This
|
||||||
means there is no way to override Connect's mutual TLS for the public
|
means there is no way to override Connect's mutual TLS for the public
|
||||||
listener.
|
listener.
|
||||||
- `envoy_cluster_json` - Specifies a complete [Envoy
|
|
||||||
cluster](https://www.envoyproxy.io/docs/envoy/v1.10.0/api-v2/api/v2/cds.proto#cluster)
|
- `envoy_cluster_json` - Specifies a complete [Envoy cluster][pb-cluster]
|
||||||
to be delivered in place of the discovered upstream cluster. This allows
|
to be delivered in place of the discovered upstream cluster. This allows
|
||||||
customization of timeouts, circuit breaking, rate limits, load balancing
|
customization of timeouts, circuit breaking, rate limits, load balancing
|
||||||
strategy etc.
|
strategy etc.
|
||||||
|
@ -535,3 +543,5 @@ warning.
|
||||||
[protocol]: /docs/connect/config-entries/service-defaults#protocol
|
[protocol]: /docs/connect/config-entries/service-defaults#protocol
|
||||||
[intentions]: /docs/connect/intentions
|
[intentions]: /docs/connect/intentions
|
||||||
[intentions]: /docs/connect/intentions
|
[intentions]: /docs/connect/intentions
|
||||||
|
[pb-cluster]: https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/cluster/v3/cluster.proto
|
||||||
|
[pb-listener]: https://www.envoyproxy.io/docs/envoy/v1.17.2/api-v3/config/listener/v3/listener.proto
|
||||||
|
|
|
@ -14,7 +14,9 @@ provided for their upgrades as a result of new features or changed behavior.
|
||||||
This page is used to document those details separately from the standard
|
This page is used to document those details separately from the standard
|
||||||
upgrade flow.
|
upgrade flow.
|
||||||
|
|
||||||
## Consul 1.10.0 <EnterpriseAlert inline />
|
## Consul 1.10.0
|
||||||
|
|
||||||
|
### Licensing Changes <EnterpriseAlert inline />
|
||||||
|
|
||||||
Consul Enterprise 1.10 has removed temporary licensing capabilities from the binaries
|
Consul Enterprise 1.10 has removed temporary licensing capabilities from the binaries
|
||||||
found on https://releases.hashicorp.com. Servers will no longer load a license previously
|
found on https://releases.hashicorp.com. Servers will no longer load a license previously
|
||||||
|
@ -33,7 +35,7 @@ agents require that either the [`start_join`](/docs/agent/opts#start_join) or
|
||||||
agents. If those stipulations are not met, attempting to start the client or snapshot agent will
|
agents. If those stipulations are not met, attempting to start the client or snapshot agent will
|
||||||
result in it immediately shutting down.
|
result in it immediately shutting down.
|
||||||
|
|
||||||
### Migration <EnterpriseAlert inline />
|
#### Migration <EnterpriseAlert inline />
|
||||||
Prior to upgrading Consul Enterprise to v1.10 you should ensure the license is set in all the right places.
|
Prior to upgrading Consul Enterprise to v1.10 you should ensure the license is set in all the right places.
|
||||||
In general following these steps should be all thats necessary to ensure a smooth upgrade.
|
In general following these steps should be all thats necessary to ensure a smooth upgrade.
|
||||||
|
|
||||||
|
@ -46,6 +48,69 @@ In general following these steps should be all thats necessary to ensure a smoot
|
||||||
4. If ACLs are not in use then repeat step 2 for all snapshot agents.
|
4. If ACLs are not in use then repeat step 2 for all snapshot agents.
|
||||||
5. Now proceed with the [standard upgrade procedure](/docs/upgrading#standard-upgrades).
|
5. Now proceed with the [standard upgrade procedure](/docs/upgrading#standard-upgrades).
|
||||||
|
|
||||||
|
### Envoy xDS Protocol Upgrades
|
||||||
|
|
||||||
|
Consul versions 1.9 and earlier exposed an xDS server for use by
|
||||||
|
[Envoy](https://www.envoyproxy.io) proxies using the v2 ["State of the
|
||||||
|
World"](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-docs/xds_protocol#variants-of-the-xds-transport-protocol)
|
||||||
|
protocol variant.
|
||||||
|
|
||||||
|
Consul 1.10.0 adds support for the v3
|
||||||
|
[Incremental](https://www.envoyproxy.io/docs/envoy/v1.17.2/api-docs/xds_protocol#incremental-xds)
|
||||||
|
protocol variant as the preferred way of conversing with Envoy. Both protocol
|
||||||
|
variants are supported in this Consul version to facilitate upgrading Consul
|
||||||
|
and Envoy in a stairstep order to avoid downtime.
|
||||||
|
|
||||||
|
In a future version of Consul the v2 State of the World protocol support will
|
||||||
|
be removed.
|
||||||
|
|
||||||
|
| Protocol | Version | Compatible Envoy Versions | Compatible Consul Versions |
|
||||||
|
| ------------------ | ------- | ------------------------- | -------------------------- |
|
||||||
|
| Incremental | v3 | 1.18.x, 1.17.x | 1.10.x |
|
||||||
|
| State of the World | v2 | 1.16.x and older | 1.10.x and older |
|
||||||
|
|
||||||
|
#### Escape Hatches
|
||||||
|
|
||||||
|
Any [escape hatches](/docs/connect/proxies/envoy#advanced-configuration) that
|
||||||
|
are defined will likely need to be switched from using xDS v2 to xDS v3
|
||||||
|
structures. Mostly this involves migrating off of deprecated (and now removed)
|
||||||
|
fields and switching untyped config to [typed config](https://www.envoyproxy.io/docs/envoy/v1.17.2/configuration/overview/extension)
|
||||||
|
with `@type` attributes set appropriately.
|
||||||
|
|
||||||
|
xDS v3 syntax has been [supported since Envoy
|
||||||
|
1.13.0](https://www.envoyproxy.io/docs/envoy/v1.13.0/api-v3/api) so this could
|
||||||
|
be done on most earlier versions of Consul+Envoy in advance of the Consul
|
||||||
|
1.10.0 upgrade.
|
||||||
|
|
||||||
|
As an example, here's a Zipkin integration
|
||||||
|
[before](https://github.com/hashicorp/consul/blob/v1.9.5/test/integration/connect/envoy/case-zipkin/service_s2.hcl)
|
||||||
|
and [after](https://github.com/hashicorp/consul/blob/71d45a34601423abdfc0a64d44c6a55cf88fa2fc/test/integration/connect/envoy/case-zipkin/service_s2.hcl)
|
||||||
|
|
||||||
|
#### Stairstep Upgrade Path
|
||||||
|
|
||||||
|
1. Upgrade Envoy sidecars to the latest version of Envoy that is
|
||||||
|
[supported](/docs/connect/proxies/envoy#supported-versions) by the currently
|
||||||
|
running version of Consul as well as Consul 1.10.0.
|
||||||
|
|
||||||
|
1. Determine if you are using the [escape hatch](/docs/connect/proxies/envoy#advanced-configuration)
|
||||||
|
feature. If so, rewrite the escape hatch to use the xDS v3 syntax and update
|
||||||
|
the service registration to reflect the updated escape hatch configuration
|
||||||
|
by re-registering. This should purge v2 elements from any configs.
|
||||||
|
|
||||||
|
1. Perform a normal upgrade of both Consul servers and clients to 1.10.0. At
|
||||||
|
this point the existing Envoy instances will continue to speak the v2 State
|
||||||
|
of the World protocol to the new Consul instances without issue.
|
||||||
|
|
||||||
|
1. Once a Consul client is upgraded, use an updated CLI binary to re-bootstrap
|
||||||
|
and restart Envoy using [`consul connect envoy`](/commands/connect/envoy).
|
||||||
|
This will ensure it switches over to the v3 Incremental xDS protocol.
|
||||||
|
|
||||||
|
Depending upon how you have chosen to run Envoy this is either one step
|
||||||
|
(`consul connect envoy`) or two steps (`consul connect envoy -bootstrap`
|
||||||
|
followed by running Envoy directly).
|
||||||
|
|
||||||
|
1. (Optionally) upgrade Envoy to the latest version supported in Consul 1.10.0.
|
||||||
|
|
||||||
## Consul 1.9.0
|
## Consul 1.9.0
|
||||||
|
|
||||||
### Changes to Raft Protocol Support
|
### Changes to Raft Protocol Support
|
||||||
|
|
Loading…
Reference in New Issue