From 930d7d31589f13f2f06962ba86b4a36968b845f9 Mon Sep 17 00:00:00 2001 From: Derek Strickland <1111455+DerekStrickland@users.noreply.github.com> Date: Thu, 13 Aug 2020 17:02:44 -0400 Subject: [PATCH] Learn/link updates derek (#8487) * Updated Learn url paths. Co-authored-by: danielehc <40759828+danielehc@users.noreply.github.com> --- .../docs/connect/gateways/mesh-gateway.mdx | 4 ++-- .../connect/gateways/terminating-gateway.mdx | 8 ++++---- .../wan-federation-via-mesh-gateways.mdx | 6 +++--- website/pages/docs/connect/index.mdx | 8 ++++---- website/pages/docs/connect/intentions.mdx | 4 ++-- website/pages/docs/connect/observability.mdx | 2 +- .../pages/docs/connect/proxies/built-in.mdx | 2 +- website/pages/docs/connect/proxies/envoy.mdx | 2 +- .../connect/registration/sidecar-service.mdx | 2 +- website/pages/docs/connect/security.mdx | 6 +++--- website/pages/docs/enterprise/backups.mdx | 2 +- website/pages/docs/enterprise/federation.mdx | 2 +- website/pages/docs/enterprise/namespaces.mdx | 4 ++-- .../docs/enterprise/network-segments.mdx | 10 +++++----- website/pages/docs/enterprise/redundancy.mdx | 4 ++-- website/pages/docs/enterprise/upgrades.mdx | 2 +- website/pages/docs/faq.mdx | 2 +- website/pages/docs/guides/acl-index.mdx | 2 +- website/pages/docs/guides/acl-legacy.mdx | 4 ++-- .../pages/docs/guides/consul-splitting.mdx | 2 +- .../pages/docs/guides/containers-guide.mdx | 2 +- .../docs/guides/managing-acl-policies.mdx | 2 +- website/pages/docs/install/index.mdx | 2 +- website/pages/docs/install/performance.mdx | 6 +++--- website/pages/docs/internals/acl.mdx | 2 +- website/pages/docs/internals/architecture.mdx | 6 +++--- website/pages/docs/internals/coordinates.mdx | 2 +- website/pages/docs/internals/sessions.mdx | 2 +- .../docs/k8s/connect/ingress-gateways.mdx | 2 +- website/pages/docs/k8s/helm.mdx | 2 +- website/pages/docs/k8s/index.mdx | 20 ++++++++++++------- .../installation/multi-cluster/kubernetes.mdx | 4 ++-- website/pages/docs/k8s/service-sync.mdx | 2 +- website/pages/docs/partnerships.mdx | 20 +++++++++---------- .../pages/docs/upgrading/upgrade-specific.mdx | 20 +++++++++---------- website/pages/downloads_tools/index.mdx | 2 +- website/pages/intro/index.mdx | 2 +- 37 files changed, 91 insertions(+), 85 deletions(-) diff --git a/website/pages/docs/connect/gateways/mesh-gateway.mdx b/website/pages/docs/connect/gateways/mesh-gateway.mdx index af38f244c0..00f245339b 100644 --- a/website/pages/docs/connect/gateways/mesh-gateway.mdx +++ b/website/pages/docs/connect/gateways/mesh-gateway.mdx @@ -21,7 +21,7 @@ within the mTLS session is not decrypted by the Gateway. ![Mesh Gateway Architecture](/img/mesh-gateways.png) For a complete example of how to connect services across datacenters, -review the [mesh gateway guide](https://learn.hashicorp.com/consul/developer-mesh/connect-gateways). +review the [mesh gateway tutorial](https://learn.hashicorp.com/tutorials/consul/service-mesh-gateways). ## Prerequisites @@ -36,7 +36,7 @@ Mesh gateways also require that your Consul datacenters are configured correctly - You'll need to use Consul version 1.6.0. - Consul [Connect](/docs/agent/options#connect) must be enabled in both datacenters. - Each of your [datacenters](/docs/agent/options#datacenter) must have a unique name. -- Your datacenters must be [WAN joined](https://learn.hashicorp.com/consul/security-networking/datacenters). +- Your datacenters must be [WAN joined](https://learn.hashicorp.com/tutorials/consul/federarion-gossip-wan). - The [primary datacenter](/docs/agent/options#primary_datacenter) must be set to the same value in both datacenters. This specifies which datacenter is the authority for Connect certificates and is required for services in all datacenters to establish mutual TLS with each other. - [gRPC](/docs/agent/options#grpc_port) must be enabled. - If you want to [enable gateways globally](/docs/connect/mesh-gateway#enabling-gateways-globally) you must enable [centralized configuration](/docs/agent/options#enable_central_service_config). diff --git a/website/pages/docs/connect/gateways/terminating-gateway.mdx b/website/pages/docs/connect/gateways/terminating-gateway.mdx index e6c3373921..024d362bec 100644 --- a/website/pages/docs/connect/gateways/terminating-gateway.mdx +++ b/website/pages/docs/connect/gateways/terminating-gateway.mdx @@ -19,8 +19,8 @@ and forward requests to the appropriate destination. ![Terminating Gateway Architecture](/img/terminating-gateways.png) -For additional use cases and usage patterns, review the guide for -[understanding terminating gateways](https://learn.hashicorp.com/consul/developer-mesh/understand-terminating-gateways). +For additional use cases and usage patterns, review the tutorial for +[understanding terminating gateways](https://learn.hashicorp.com/tutorials/consul/service-mesh-terminating-gateways). ~> **Known limitations:** Terminating gateways currently do not support targeting service subsets with [L7 configuration](/docs/connect/l7-traffic-management). They route to all instances of a service with no capabilities @@ -79,7 +79,7 @@ a terminating gateway as long as they discover upstreams with the ## Running and Using a Terminating Gateway For a complete example of how to enable connections from services in the Consul service mesh to -services outside the mesh, review the [terminating gateway guide](https://learn.hashicorp.com/consul/developer-mesh/terminating-gateways). +services outside the mesh, review the [terminating gateway tutorial](https://learn.hashicorp.com/tutorials/consul/teminating-gateways-connect-external-services). ## Terminating Gateway Configuration @@ -124,4 +124,4 @@ does not match the node name of any Consul client agent node. If the node name o Consul's [anti-entropy sync](/docs/internals/anti-entropy) will delete the services registered via the `/catalog/register` HTTP API endpoint. For a complete example of how to register external services review the -[external services guide](https://learn.hashicorp.com/consul/developer-discovery/external). +[external services tutorial](https://learn.hashicorp.com/tutorials/consul/service-registration-external-services). diff --git a/website/pages/docs/connect/gateways/wan-federation-via-mesh-gateways.mdx b/website/pages/docs/connect/gateways/wan-federation-via-mesh-gateways.mdx index 3afc50e677..f0b9ad25f6 100644 --- a/website/pages/docs/connect/gateways/wan-federation-via-mesh-gateways.mdx +++ b/website/pages/docs/connect/gateways/wan-federation-via-mesh-gateways.mdx @@ -16,7 +16,7 @@ WAN federation via mesh gateways allows for Consul servers in different datacent to be federated exclusively through mesh gateways. When setting up a -[multi-datacenter](https://learn.hashicorp.com/consul/security-networking/datacenters) +[multi-datacenter](https://learn.hashicorp.com/tutorials/consul/federarion-gossip-wan) Consul cluster, operators must ensure that all Consul servers in every datacenter must be directly connectable over their WAN-advertised network address from each other. @@ -60,7 +60,7 @@ means you could introduce a set of firewall rules prohibiting `10.0.0.0/24` from sending any traffic at all to `10.1.2.0/24` for security isolation. You may already have configured [mesh -gateways](https://learn.hashicorp.com/consul/developer-mesh/connect-gateways) +gateways](https://learn.hashicorp.com/tutorials/consul/service-mesh-gateways) to allow for services in the service mesh to freely connect between datacenters regardless of the lateral connectivity of the nodes hosting the Consul client agents. @@ -99,7 +99,7 @@ each datacenter otherwise the WAN will become only partly connected. There are a few necessary additional pieces of configuration beyond those required for standing up a -[multi-datacenter](https://learn.hashicorp.com/consul/security-networking/datacenters) +[multi-datacenter](https://learn.hashicorp.com/tutorials/consul/federarion-gossip-wan) Consul cluster. Consul servers in the _primary_ datacenter should add this snippet to the diff --git a/website/pages/docs/connect/index.mdx b/website/pages/docs/connect/index.mdx index 6062a35ed7..b9d19697b4 100644 --- a/website/pages/docs/connect/index.mdx +++ b/website/pages/docs/connect/index.mdx @@ -53,22 +53,22 @@ applications can also send open tracing data through Envoy. There are several ways to try Connect in different environments. -- The [Getting Started with Consul Service Mesh track](https://learn.hashicorp.com/consul/gs-consul-service-mesh/understand-consul-service-mesh?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) +- The [Getting Started with Consul Service Mesh collection](https://learn.hashicorp.com/tutorials/consul/service-mesh?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) walks you through installing Consul as service mesh for Kubernetes using the Helm chart, deploying services in the service mesh, and using intentions to secure service communications. -- The [Secure Service-to-Service Communication guide](https://learn.hashicorp.com/consul/developer-mesh/connect-services?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) +- The [Secure Service-to-Service Communication tutorial](https://learn.hashicorp.com/tutorials/consul/service-mesh-with-envoy-proxy?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) is a simple walk through of connecting two services on your local machine using Consul Connect's built-in proxy and configuring your first intention. The guide also includes an introduction to using Envoy as the Connect sidecar proxy. -- The [Kubernetes guide](https://learn.hashicorp.com/consul/getting-started-k8s/minikube?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) +- The [Kubernetes tutorial](https://learn.hashicorp.com/tutorials/consul/kubernetes-minikube?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) walks you through configuring Consul Connect in Kubernetes using the Helm chart, and using intentions. You can run the guide on Minikube or an existing Kubernetes cluster. -- The [observability guide](https://learn.hashicorp.com/consul/kubernetes/l7-observability-k8s?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) +- The [observability tutorial](https://learn.hashicorp.com/tutorials/consul/kubernetes-layer7-observability?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) shows how to deploy a basic metrics collection and visualization pipeline on a Minikube or Kubernetes cluster using the official Helm charts for Consul, Prometheus, and Grafana. diff --git a/website/pages/docs/connect/intentions.mdx b/website/pages/docs/connect/intentions.mdx index 00337d9811..57befa2e0e 100644 --- a/website/pages/docs/connect/intentions.mdx +++ b/website/pages/docs/connect/intentions.mdx @@ -22,7 +22,7 @@ is allowed by testing the intentions. If authorize returns false the connection must be terminated. The default intention behavior is defined by the default -[ACL policy](https://learn.hashicorp.com/consul/security-networking/production-acls). If the default ACL policy is "allow all", +[ACL policy](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production). If the default ACL policy is "allow all", then all Connect connections are allowed by default. If the default ACL policy is "deny all", then all Connect connections are denied by default. @@ -122,7 +122,7 @@ the table with a `*` for either the source namespace or destination namespace ar ## Intention Management Permissions -Intention management can be protected by [ACLs](https://learn.hashicorp.com/consul/security-networking/production-acls). +Intention management can be protected by [ACLs](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production). Permissions for intentions are _destination-oriented_, meaning the ACLs for managing intentions are looked up based on the destination value of the intention, not the source. diff --git a/website/pages/docs/connect/observability.mdx b/website/pages/docs/connect/observability.mdx index b5f5772188..de40770f77 100644 --- a/website/pages/docs/connect/observability.mdx +++ b/website/pages/docs/connect/observability.mdx @@ -27,7 +27,7 @@ configuration](/docs/agent/options#enable_central_service_config). If you are using Kubernetes, the Helm chart can simplify much of the necessary configuration, which you can learn about in the [observability -guide](https://learn.hashicorp.com/consul/kubernetes/l7-observability-k8s). +tutorial](https://learn.hashicorp.com/tutorials/consul/kubernetes-layer7-observability). ### Metrics Destination diff --git a/website/pages/docs/connect/proxies/built-in.mdx b/website/pages/docs/connect/proxies/built-in.mdx index f4a40b6496..9f52ee2099 100644 --- a/website/pages/docs/connect/proxies/built-in.mdx +++ b/website/pages/docs/connect/proxies/built-in.mdx @@ -14,7 +14,7 @@ Connect. ## Getting Started -To get started with the built-in proxy and see a working example you can follow the [Getting Started](https://learn.hashicorp.com/consul/getting-started/connect) guide. +To get started with the built-in proxy and see a working example you can follow the [Getting Started](https://learn.hashicorp.com/tutorials/consul/get-started-service-networking) tutorial. ## Proxy Config Key Reference diff --git a/website/pages/docs/connect/proxies/envoy.mdx b/website/pages/docs/connect/proxies/envoy.mdx index 5be9b035b4..fa452c7afa 100644 --- a/website/pages/docs/connect/proxies/envoy.mdx +++ b/website/pages/docs/connect/proxies/envoy.mdx @@ -53,7 +53,7 @@ recent supported Envoy for your Consul version where possible.

\* Envoy ## Getting Started To get started with Envoy and see a working example you can follow the [Using -Envoy with Connect](https://learn.hashicorp.com/consul/developer-segmentation/connect-envoy) guide. +Envoy with Connect](https://learn.hashicorp.com/tutorials/consul/service-mesh-with-envoy-proxy) tutorial. ## Configuration diff --git a/website/pages/docs/connect/registration/sidecar-service.mdx b/website/pages/docs/connect/registration/sidecar-service.mdx index 6565a7bfa7..23f0fac765 100644 --- a/website/pages/docs/connect/registration/sidecar-service.mdx +++ b/website/pages/docs/connect/registration/sidecar-service.mdx @@ -18,7 +18,7 @@ instance, Consul 1.3 introduced a new field in the Connect block of the [service definition](/docs/agent/services). To deploy a service and sidecar proxy locally, complete the -[Getting Started guide](https://learn.hashicorp.com/consul/getting-started/connect?utm_source=consul.io&utm_medium=docs). +[Getting Started guide](https://learn.hashicorp.com/tutorials/consul/get-started-service-networking?utm_source=consul.io&utm_medium=docs). The `connect.sidecar_service` field is a complete nested service definition on which almost any regular service definition field can be set. The exceptions are diff --git a/website/pages/docs/connect/security.mdx b/website/pages/docs/connect/security.mdx index d2cb569282..8ad4301b15 100644 --- a/website/pages/docs/connect/security.mdx +++ b/website/pages/docs/connect/security.mdx @@ -13,9 +13,9 @@ description: |- Connect enables secure service-to-service communication over mutual TLS. This provides both in-transit data encryption as well as authorization. This page will document how to secure Connect. To try Connect locally, complete the -[Getting Started guide](https://learn.hashicorp.com/consul/gs-consul-service-mesh/understand-consul-service-mesh?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) or for a full security model reference, +[Getting Started guide](https://learn.hashicorp.com/tutorials/consul/service-mesh?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) or for a full security model reference, see the dedicated [Consul security model](/docs/internals/security.html) page. When -setting up Connect in production, review this [guide](https://learn.hashicorp.com/consul/developer-mesh/connect-production?utm_source=consul.io&utm_medium=docs). +setting up Connect in production, review this [tutorial](https://learn.hashicorp.com/tutorials/consul/service-mesh-production-checklist?utm_source=consul.io&utm_medium=docs). Connect will function in any Consul configuration. However, unless the checklist below is satisfied, Connect is not providing the security guarantees it was @@ -37,7 +37,7 @@ configuration also forces all service-to-service communication to be explicitly allowed via an allow [intention](/docs/connect/intentions). To learn how to enable ACLs, please see the -[guide on ACLs](https://learn.hashicorp.com/consul/security-networking/production-acls). +[tutorial on ACLs](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production). **If ACLs are enabled but are in default allow mode**, then services will be able to communicate by default. Additionally, if a proper anonymous token diff --git a/website/pages/docs/enterprise/backups.mdx b/website/pages/docs/enterprise/backups.mdx index 277be48ed5..5ca332eeb2 100644 --- a/website/pages/docs/enterprise/backups.mdx +++ b/website/pages/docs/enterprise/backups.mdx @@ -34,6 +34,6 @@ datacenter backups include (but are not limited to): - Namespaces For more experience leveraging Consul's snapshot functionality, we suggest you look through our HashiCorp -Learn guide for [Datacenter Backups in Consul](https://learn.hashicorp.com/consul/datacenter-deploy/backup). +Learn tutorial for [Datacenter Backups in Consul](https://learn.hashicorp.com/tutorials/consul/backup-and-restore). For detailed configuration information on configuring the Consul Enterprise's snapshot agent, review the [Consul Snapshot Agent documentation](/docs/commands/snapshot/agent). diff --git a/website/pages/docs/enterprise/federation.mdx b/website/pages/docs/enterprise/federation.mdx index ae0e76bc94..ed338b4242 100644 --- a/website/pages/docs/enterprise/federation.mdx +++ b/website/pages/docs/enterprise/federation.mdx @@ -25,7 +25,7 @@ desirable to have topologies like hub-and-spoke with central management datacenters and "spoke" datacenters that can't interact with each other. [Consul Enterprise](https://www.hashicorp.com/consul) offers a [network -area mechanism](https://learn.hashicorp.com/consul/day-2-operations/advanced-federation) that allows operators to +area mechanism](https://learn.hashicorp.com/tutorials/consul/federation-network-areas) that allows operators to federate Consul datacenters together on a pairwise basis, enabling partially-connected network topologies. Once a link is created, Consul agents can make queries to the remote datacenter in service of both API and DNS diff --git a/website/pages/docs/enterprise/namespaces.mdx b/website/pages/docs/enterprise/namespaces.mdx index f97c3bdbb3..938946bece 100644 --- a/website/pages/docs/enterprise/namespaces.mdx +++ b/website/pages/docs/enterprise/namespaces.mdx @@ -20,8 +20,8 @@ to provide self-service through delegation of administrative privileges. For more information on how to use namespaces with Consul Enterprise please review the following HashiCorp Learn Guides: -- [Register and Discover Services within Namespaces](https://learn.hashicorp.com/consul/namespaces/discovery-namespaces) - Register multiple services within different namespaces in Consul. -- [Setup Secure Namespaces](https://learn.hashicorp.com/consul/namespaces/secure-namespaces) - Secure resources within a namespace and delegate namespace ACL rights via ACL tokens. +- [Register and Discover Services within Namespaces](https://learn.hashicorp.com/tutorials/consul/namespaces-share-datacenter-access) - Register multiple services within different namespaces in Consul. +- [Setup Secure Namespaces](https://learn.hashicorp.com/tutorials/consul/namespaces-secure-shared-access) - Secure resources within a namespace and delegate namespace ACL rights via ACL tokens. ## Namespace Definition diff --git a/website/pages/docs/enterprise/network-segments.mdx b/website/pages/docs/enterprise/network-segments.mdx index b3c3693c2d..209be69168 100644 --- a/website/pages/docs/enterprise/network-segments.mdx +++ b/website/pages/docs/enterprise/network-segments.mdx @@ -21,10 +21,10 @@ with other agents in it's network segment. This functionality is useful for clusters that have multiple tenants that should not be able to communicate with each other. -To get started with network segments you can review the guide on HashiCorp Learn for -[Network Segments](https://learn.hashicorp.com/consul/day-2-operations/network-segments). +To get started with network segments you can review the tutorial on HashiCorp Learn for +[Network Segments](https://learn.hashicorp.com/tutorials/consul/network-partition-datacenters). -~> **Note:** Prior to Consul 1.7.3, a Consul agent configured with too many network segments may not be able to start due to [limitations](https://learn.hashicorp.com/consul/day-2-operations/network-segments#network-segments-limitations) in Serf. +~> **Note:** Prior to Consul 1.7.3, a Consul agent configured with too many network segments may not be able to start due to [limitations](https://learn.hashicorp.com/tutorials/consul/network-partition-datacenters#network-segments-limitations) in Serf. # Consul Networking Models @@ -45,8 +45,8 @@ over the WAN. Consul clients make use of resources in federated clusters by forwarding RPCs through the Consul servers in their local cluster, but they never interact with remote Consul servers directly. There are currently two inter-cluster network models which can be viewed on HashiCorp Learn: -[WAN gossip (OSS)](https://learn.hashicorp.com/consul/security-networking/datacenters) -and [Network Areas (Enterprise)](https://learn.hashicorp.com/consul/day-2-operations/advanced-federation). +[WAN gossip (OSS)](https://learn.hashicorp.com/tutorials/consul/federarion-gossip-wan) +and [Network Areas (Enterprise)](https://learn.hashicorp.com/tutorials/consul/federation-network-areas). **LAN Gossip Pool**: A set of Consul agents that have full mesh connectivity among themselves, and use Serf to maintain a shared view of the members of the diff --git a/website/pages/docs/enterprise/redundancy.mdx b/website/pages/docs/enterprise/redundancy.mdx index 0a5d0957fb..433c1e1501 100644 --- a/website/pages/docs/enterprise/redundancy.mdx +++ b/website/pages/docs/enterprise/redundancy.mdx @@ -29,6 +29,6 @@ for server nodes while also providing (and expanding) the capabilities of [enhanced read scalability](/docs/enterprise/read-scale) by also including recovery capabilities. -For more information, review the HashiCorp Learn guide on -[Redundancy Zones](https://learn.hashicorp.com/consul/day-2-operations/autopilot#redundancy-zones), +For more information, review the HashiCorp Learn tutorial on +[Redundancy Zones](https://learn.hashicorp.com/tutorials/consul/autopilot-datacenter-operations#redundancy-zones), as well as the documentation for [Consul Autopilot](/docs/commands/operator/autopilot). diff --git a/website/pages/docs/enterprise/upgrades.mdx b/website/pages/docs/enterprise/upgrades.mdx index 87184ffa03..c82ee5ab95 100644 --- a/website/pages/docs/enterprise/upgrades.mdx +++ b/website/pages/docs/enterprise/upgrades.mdx @@ -21,4 +21,4 @@ currently in a cluster. When an equal amount of new server nodes are joined runn will be demoted to non voting members. Demotion of legacy server nodes will not occur until the voting members on the new version match. Once this demotion occurs, the previous versioned servers can be removed from the cluster safely. -You can review more information about this functionality in the [Consul operator autopilot](/docs/commands/operator/autopilot) documentation as well as on the HashiCorp Learn [Automated Upgrade](https://learn.hashicorp.com/consul/day-2-operations/autopilot#upgrade-migrations) guide. +You can review more information about this functionality in the [Consul operator autopilot](/docs/commands/operator/autopilot) documentation as well as on the HashiCorp Learn [Automated Upgrade](https://learn.hashicorp.com/tutorials/consul/autopilot-datacenter-operations#upgrade-migrations) tutorial. diff --git a/website/pages/docs/faq.mdx b/website/pages/docs/faq.mdx index 74fb877ab5..1b4c383d21 100644 --- a/website/pages/docs/faq.mdx +++ b/website/pages/docs/faq.mdx @@ -110,7 +110,7 @@ If the remote datacenter is not available, then those resources will also not be available from that datacenter. That will not affect the requests to the local datacenter. There are some special situations where a limited subset of data can be replicated, such as with Consul's built-in -[ACL replication](https://learn.hashicorp.com/consul/day-2-operations/acl-replication) +[ACL replication](https://learn.hashicorp.com/tutorials/consul/access-control-replication-multiple-datacenters) capability, or external tools like [consul-replicate](https://github.com/hashicorp/consul-replicate). diff --git a/website/pages/docs/guides/acl-index.mdx b/website/pages/docs/guides/acl-index.mdx index 644e999825..b54b0ea7e7 100644 --- a/website/pages/docs/guides/acl-index.mdx +++ b/website/pages/docs/guides/acl-index.mdx @@ -43,7 +43,7 @@ one of the guides, you will be directed to a new site. ### Bootstrapping the ACL System -Learn how to control access to Consul resources with this step-by-step [guide](https://learn.hashicorp.com/consul/advanced/day-1-operations/acl-guide) on bootstrapping the ACL system in Consul 1.4.0 and newer. This guide also includes additional steps for configuring the anonymous token, setting up agent-specific default tokens, and creating tokens for Consul UI use. +Learn how to control access to Consul resources with this step-by-step [tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production) on bootstrapping the ACL system in Consul 1.4.0 and newer. This guide also includes additional steps for configuring the anonymous token, setting up agent-specific default tokens, and creating tokens for Consul UI use. ### Securing Consul with ACLs diff --git a/website/pages/docs/guides/acl-legacy.mdx b/website/pages/docs/guides/acl-legacy.mdx index 733e59a042..1761b5d26c 100644 --- a/website/pages/docs/guides/acl-legacy.mdx +++ b/website/pages/docs/guides/acl-legacy.mdx @@ -13,8 +13,8 @@ description: >- # Deprecation Notice The ACL system described here was Consul's original ACL implementation. In Consul 1.4.0 -the ACL system was rewritten and the legacy system was deprecated. The new ACL guide -can be found [here](https://learn.hashicorp.com/consul/advanced/day-1-operations/acl-guide). +the ACL system was rewritten and the legacy system was deprecated. The new ACL tutorial +can be found [here](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production). # New ACL System Differences diff --git a/website/pages/docs/guides/consul-splitting.mdx b/website/pages/docs/guides/consul-splitting.mdx index 3cc92fa30c..b7ce946490 100644 --- a/website/pages/docs/guides/consul-splitting.mdx +++ b/website/pages/docs/guides/consul-splitting.mdx @@ -36,7 +36,7 @@ traffic slowly to the new version. The steps in this guide use Consul’s service mesh feature, Consul Connect. If you aren’t already familiar with Connect you can learn more by following [this -guide](https://learn.hashicorp.com/consul/getting-started/connect). +guide](https://learn.hashicorp.com/tutorials/consul/get-started-service-networking). We created a demo environment for the steps we describe here. The environment relies on Docker and Docker Compose. If you do not already have Docker and diff --git a/website/pages/docs/guides/containers-guide.mdx b/website/pages/docs/guides/containers-guide.mdx index dcc5bd378d..59aa0794b2 100644 --- a/website/pages/docs/guides/containers-guide.mdx +++ b/website/pages/docs/guides/containers-guide.mdx @@ -24,7 +24,7 @@ By following this guide you will learn how to: The guide is Docker-focused, but the principles you will learn apply to other container runtimes as well. -!> Security Warning This guide is not for production use. Please refer to the [Consul Reference Architecture](https://learn.hashicorp.com/consul/datacenter-deploy/reference-architecture) for Consul best practices and the [Docker Documentation](https://docs.docker.com/) for Docker best practices. +!> Security Warning This guide is not for production use. Please refer to the [Consul Reference Architecture](https://learn.hashicorp.com/tutorials/consul/reference-architecture) for Consul best practices and the [Docker Documentation](https://docs.docker.com/) for Docker best practices. ## Prerequisites diff --git a/website/pages/docs/guides/managing-acl-policies.mdx b/website/pages/docs/guides/managing-acl-policies.mdx index 8c219c5a75..667de435ff 100644 --- a/website/pages/docs/guides/managing-acl-policies.mdx +++ b/website/pages/docs/guides/managing-acl-policies.mdx @@ -17,7 +17,7 @@ We expect operators to automate the policy and token generation process in produ ## Prerequisites -We provide high-level recommendations in this guide, however, we will not describe the command by command token generation process. To learn how to create tokens, read the [ACL bootstrapping guide](https://learn.hashicorp.com/consul/security-networking/production-acls). +We provide high-level recommendations in this guide, however, we will not describe the command by command token generation process. To learn how to create tokens, read the [ACL bootstrapping guide](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production). This guide assumes the `default_policy` of `deny` is set on all agents, in accordance to the [security model documentation](https://www.consul.io/docs/internals/security.html#secure-configuration). diff --git a/website/pages/docs/install/index.mdx b/website/pages/docs/install/index.mdx index 729593c3f0..144041fec0 100644 --- a/website/pages/docs/install/index.mdx +++ b/website/pages/docs/install/index.mdx @@ -21,7 +21,7 @@ Downloading a precompiled binary is easiest, and we provide downloads over TLS along with SHA256 sums to verify the binary. We also distribute a PGP signature with the SHA256 sums that can be verified. -The [Getting Started guides](https://learn.hashicorp.com/consul/getting-started/install?utm_source=consul.io&utm_medium=docs) provide a quick walkthrough of installing and using Consul on your local machine. +The [Getting Started guides](https://learn.hashicorp.com/tutorials/consul/get-started-install?utm_source=consul.io&utm_medium=docs) provide a quick walkthrough of installing and using Consul on your local machine. ## Precompiled Binaries diff --git a/website/pages/docs/install/performance.mdx b/website/pages/docs/install/performance.mdx index 5f80f2e719..b05ed3937d 100644 --- a/website/pages/docs/install/performance.mdx +++ b/website/pages/docs/install/performance.mdx @@ -117,9 +117,9 @@ Here are some general recommendations: - For DNS-heavy workloads, configuring all Consul agents in a cluster with the [`allow_stale`](/docs/agent/options#allow_stale) configuration option will allow reads to scale across all Consul servers, not just the leader. Consul 0.7 and later enables stale reads - for DNS by default. See [Stale Reads](https://learn.hashicorp.com/consul/security-networking/dns-caching#stale-reads) in the - [DNS Caching](https://learn.hashicorp.com/consul/security-networking/dns-caching) guide for more details. It's also good to set - reasonable, non-zero [DNS TTL values](https://learn.hashicorp.com/consul/security-networking/dns-caching#ttl-values) if your clients will + for DNS by default. See [Stale Reads](https://learn.hashicorp.com/tutorials/consul/dns-caching#stale-reads) in the + [DNS Caching](https://learn.hashicorp.com/tutorials/consul/dns-caching) guide for more details. It's also good to set + reasonable, non-zero [DNS TTL values](https://learn.hashicorp.com/tutorials/consul/dns-caching#ttl-values) if your clients will respect them. - In other applications that perform high volumes of reads against Consul, consider using the diff --git a/website/pages/docs/internals/acl.mdx b/website/pages/docs/internals/acl.mdx index cddfe93743..59b9269fd4 100644 --- a/website/pages/docs/internals/acl.mdx +++ b/website/pages/docs/internals/acl.mdx @@ -10,7 +10,7 @@ description: >- # ACL System -This content has been moved into the [ACL Guide](https://learn.hashicorp.com/consul/security-networking/production-acls). +This content has been moved into the [ACL Guide](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production). diff --git a/website/pages/docs/internals/architecture.mdx b/website/pages/docs/internals/architecture.mdx index f8a979f3e2..34dff34b02 100644 --- a/website/pages/docs/internals/architecture.mdx +++ b/website/pages/docs/internals/architecture.mdx @@ -18,7 +18,7 @@ page documents the system architecture. [glossary](/docs/glossary) of terms to help clarify what is being discussed. -The architecture concepts in this document can be used with the [Reference Architecture guide](https://learn.hashicorp.com/consul/datacenter-deploy/reference-architecture?utm_source=consul.io&utm_medium=docs) when deploying Consul in production. +The architecture concepts in this document can be used with the [Reference Architecture guide](https://learn.hashicorp.com/tutorials/consul/reference-architecture?utm_source=consul.io&utm_medium=docs) when deploying Consul in production. ## 10,000 foot view @@ -28,7 +28,7 @@ From a 10,000 foot altitude the architecture of Consul looks like this: Let's break down this image and describe each piece. First of all, we can see that there are two datacenters, labeled "one" and "two". Consul has first -class support for [multiple datacenters](https://learn.hashicorp.com/consul/security-networking/datacenters) and +class support for [multiple datacenters](https://learn.hashicorp.com/tutorials/consul/federarion-gossip-wan) and expects this to be the common case. Within each datacenter, we have a mixture of clients and servers. It is expected @@ -68,7 +68,7 @@ an RPC request to the remote Consul servers for that resource and return the res If the remote datacenter is not available, then those resources will also not be available, but that won't otherwise affect the local datacenter. There are some special situations where a limited subset of data can be replicated, such as with Consul's built-in -[ACL replication](https://learn.hashicorp.com/consul/day-2-operations/acl-replication) capability, or +[ACL replication](https://learn.hashicorp.com/tutorials/consul/access-control-replication-multiple-datacenters) capability, or external tools like [consul-replicate](https://github.com/hashicorp/consul-replicate). In some places, client agents may cache data from the servers to make it diff --git a/website/pages/docs/internals/coordinates.mdx b/website/pages/docs/internals/coordinates.mdx index e9b17da5a1..a6c7187b58 100644 --- a/website/pages/docs/internals/coordinates.mdx +++ b/website/pages/docs/internals/coordinates.mdx @@ -32,7 +32,7 @@ Network coordinates manifest in several ways inside Consul: - [Prepared queries](/api/query) can automatically fail over services to other Consul datacenters based on network round trip times. See the - [Geo Failover](https://learn.hashicorp.com/consul/developer-discovery/geo-failover) for some examples. + [Geo Failover](https://learn.hashicorp.com/tutorials/consul/automate-geo-failover) for some examples. - The [Coordinate endpoint](/api/coordinate) exposes raw network coordinates for use in other applications. diff --git a/website/pages/docs/internals/sessions.mdx b/website/pages/docs/internals/sessions.mdx index dc259383b4..db5b464f17 100644 --- a/website/pages/docs/internals/sessions.mdx +++ b/website/pages/docs/internals/sessions.mdx @@ -140,7 +140,7 @@ the goal of Consul to protect against misbehaving clients. The primitives provided by sessions and the locking mechanisms of the KV store can be used to build client-side leader election algorithms. -These are covered in more detail in the [Leader Election guide](https://learn.hashicorp.com/consul/developer-configuration/elections). +These are covered in more detail in the [Leader Election guide](https://learn.hashicorp.com/tutorials/consul/application-leader-elections). ## Prepared Query Integration diff --git a/website/pages/docs/k8s/connect/ingress-gateways.mdx b/website/pages/docs/k8s/connect/ingress-gateways.mdx index 6deaafde87..4b1fdeefb0 100644 --- a/website/pages/docs/k8s/connect/ingress-gateways.mdx +++ b/website/pages/docs/k8s/connect/ingress-gateways.mdx @@ -133,7 +133,7 @@ To create an intention that allows the ingress gateway to route to the service ` $ consul intention create ingress-gateway static-server ``` -For detailed instructions on how to configure zero-trust networking with intentions please refer to this [guide](https://learn.hashicorp.com/consul/gs-consul-service-mesh/network-security-with-consul-service-mesh). +For detailed instructions on how to configure zero-trust networking with intentions please refer to this [guide](https://learn.hashicorp.com/tutorials/consul/service-mesh-zero-trust-network). ## Deploying your application to Kubernetes Now you will deploy a sample application which echoes “hello world” diff --git a/website/pages/docs/k8s/helm.mdx b/website/pages/docs/k8s/helm.mdx index f737bffb89..8e7b1565df 100644 --- a/website/pages/docs/k8s/helm.mdx +++ b/website/pages/docs/k8s/helm.mdx @@ -132,7 +132,7 @@ and consider if they're appropriate for your deployment. `-federation` (if setting `global.name`), otherwise `-consul-federation`. Requires consul-k8s 0.15.0+. - - `tls` ((#v-global-tls)) - Enables TLS [encryption](https://learn.hashicorp.com/consul/security-networking/agent-encryption) across the cluster to verify authenticity of the Consul servers and clients. Requires Consul v1.4.1+ and consul-k8s v0.16.2+ + - `tls` ((#v-global-tls)) - Enables TLS [encryption](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) across the cluster to verify authenticity of the Consul servers and clients. Requires Consul v1.4.1+ and consul-k8s v0.16.2+ - `enabled` ((#v-global-tls-enabled)) (`boolean: false`) - If true, the Helm chart will enable TLS for Consul servers and clients and all consul-k8s components, as well as generate certificate diff --git a/website/pages/docs/k8s/index.mdx b/website/pages/docs/k8s/index.mdx index 0e64114845..3413e0ad49 100644 --- a/website/pages/docs/k8s/index.mdx +++ b/website/pages/docs/k8s/index.mdx @@ -52,22 +52,28 @@ There are several ways to try Consul with Kubernetes in different environments. **Guides** -- The [Getting Started with Consul Service Mesh track](https://learn.hashicorp.com/consul/gs-consul-service-mesh/understand-consul-service-mesh?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) +- The [Getting Started with Consul Service Mesh track](https://learn.hashicorp.com/tutorials/consul/service-mesh?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) provides guidance for installing Consul as service mesh for Kubernetes using the Helm chart, deploying services in the service mesh, and using intentions to secure service communications. -- The [Consul and Minikube guide](https://learn.hashicorp.com/consul/getting-started-k8s/minikube?utm_source=consul.io&utm_medium=docs) is a quick step-by-step guide for deploying Consul with the official Helm chart on a local instance of Minikube. +- The [Consul and Minikube guide](https://learn.hashicorp.com/tutorials/consul/kubernetes-minikube?utm_source=consul.io&utm_medium=docs) is a quick step-by-step guide for deploying Consul with the official Helm chart on a local instance of Minikube. - Review production best practices and cloud-specific configurations for deploying Consul on managed Kubernetes runtimes. - - The [Consul on Azure Kubernetes Service (AKS) guide](https://learn.hashicorp.com/consul/getting-started-k8s/azure-k8s?utm_source=consul.io&utm_medium=docs) is a complete step-by-step guide on how to deploy Consul on AKS. The guide also allows you to practice deploying two microservices. - - The [Consul on Amazon Elastic Kubernetes (EKS) guide](https://learn.hashicorp.com/consul/kubernetes/aws-k8s?utm_source=consul.io&utm_medium=docs) is a complete step-by-step guide on how to deploy Consul on EKS. Additionally, it provides guidance on interacting with your datacenter with the Consul UI, CLI, and API. - - The [Consul on Google Kubernetes Engine (GKE) guide](https://learn.hashicorp.com/consul/kubernetes/google-cloud-k8s?utm_source=consul.io&utm_medium=docs) is a complete step-by-step guide on how to deploy Consul on GKE. Additionally, it provides guidance on interacting with your datacenter with the Consul UI, CLI, and API. + - The [Consul on Azure Kubernetes Service (AKS) tutorial](https://learn.hashicorp.com/tutorials/consul/kubernetes-aks-azure?utm_source=consul.io&utm_medium=docs) is a complete step-by-step guide on how to deploy Consul on AKS. The guide also allows you to practice deploying two microservices. + - The [Consul on Amazon Elastic Kubernetes (EKS) tutorial](https://learn.hashicorp.com/tutorials/consul/kubernetes-eks-aws?utm_source=consul.io&utm_medium=docs) is a complete step-by-step guide on how to deploy Consul on EKS. Additionally, it provides guidance on interacting with your datacenter with the Consul UI, CLI, and API. + - The [Consul on Google Kubernetes Engine (GKE) tutorial](https://learn.hashicorp.com/tutorials/consul/kubernetes-gke-google?utm_source=consul.io&utm_medium=docs) is a complete step-by-step guide on how to deploy Consul on GKE. Additionally, it provides guidance on interacting with your datacenter with the Consul UI, CLI, and API. -- The [Consul and Kubernetes Reference Architecture](https://learn.hashicorp.com/consul/day-1-operations/kubernetes-reference?utm_source=consul.io&utm_medium=docs) guide provides recommended practices for production. +- The [Consul and Kubernetes Reference Architecture](https://learn.hashicorp.com/tutorials/consul/kubernetes-reference-architecture?utm_source=consul.io&utm_medium=docs) guide provides recommended practices for production. -- The [Consul and Kubernetes Deployment](https://learn.hashicorp.com/consul/day-1-operations/kubernetes-deployment-guide?utm_source=consul.io&utm_medium=docs) guide covers the necessary steps to install and configure a new Consul cluster on Kubernetes in production. +- The [Consul and Kubernetes Deployment](https://learn.hashicorp.com/tutorials/consul/kubernetes-deployment-guide?utm_source=consul.io&utm_medium=docs) tutorial covers the necessary steps to install and configure a new Consul cluster on Kubernetes in production. + +- The [Secure Consul and Registered Services on Kubernetes](https://learn.hashicorp.com/tutorials/consul/kubernetes-secure-agents?in=consul/kubernetes) tutorial covers +the necessary steps to secure a Consul cluster running on Kubernetes in production. + +- The [Layer 7 Observability with Consul Service Mesh](https://learn.hashicorp.com/tutorials/consul/kubernetes-layer7-observability) tutorial covers monitoring a +Consul service mesh running on Kubernetes with Prometheus and Grafana. **Documentation** diff --git a/website/pages/docs/k8s/installation/multi-cluster/kubernetes.mdx b/website/pages/docs/k8s/installation/multi-cluster/kubernetes.mdx index 954130a037..ccee5aa366 100644 --- a/website/pages/docs/k8s/installation/multi-cluster/kubernetes.mdx +++ b/website/pages/docs/k8s/installation/multi-cluster/kubernetes.mdx @@ -12,7 +12,7 @@ description: >- ~> This topic requires familiarity with [Mesh Gateways](/docs/connect/mesh-gateway) and [WAN Federation Via Mesh Gateways](/docs/connect/wan-federation-via-mesh-gateways). --> Looking for a step-by-step guide? Please follow our Learn Guide: [Secure and Route Service Mesh Communication Across Kubernetes](https://learn.hashicorp.com/consul/kubernetes/mesh-gateways). +-> Looking for a step-by-step guide? Please follow our Learn tutorial: [Secure and Route Service Mesh Communication Across Kubernetes](https://learn.hashicorp.com/tutorials/consul/kubernetes-mesh-gateways). This page describes how to federate multiple Kubernetes clusters. See [Multi-Cluster Overview](/docs/k8s/installation/multi-cluster/overview) for more information on use-cases and how it works. @@ -389,6 +389,6 @@ in the top left: ## Next Steps With your Kubernetes clusters federated, try out using Consul service mesh to -route between services deployed on each cluster by following our Learn Guide: [Secure and Route Service Mesh Communication Across Kubernetes](https://learn.hashicorp.com/consul/kubernetes/mesh-gateways#deploy-microservices). +route between services deployed on each cluster by following our Learn tutorial: [Secure and Route Service Mesh Communication Across Kubernetes](https://learn.hashicorp.com/tutorials/consul/kubernetes-mesh-gateways#deploy-microservices). You can also read our in-depth documentation on [Consul Service Mesh In Kubernetes](/docs/k8s/connect/overview). diff --git a/website/pages/docs/k8s/service-sync.mdx b/website/pages/docs/k8s/service-sync.mdx index fc33aab0a5..91149bd830 100644 --- a/website/pages/docs/k8s/service-sync.mdx +++ b/website/pages/docs/k8s/service-sync.mdx @@ -90,7 +90,7 @@ for both in-cluster and out-of-cluster authentication. If `kubectl` works, then the sync program should work. For Consul, if ACLs are configured on the cluster, a Consul -[ACL token](https://learn.hashicorp.com/consul/advanced/day-1-operations/acl-guide) +[ACL token](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production) will need to be provided. Review the [ACL rules](/docs/agent/acl-rules) when creating this token so that it only allows the necessary privileges. The catalog sync process accepts this token by using the [`CONSUL_HTTP_TOKEN`](/docs/commands#consul_http_token) diff --git a/website/pages/docs/partnerships.mdx b/website/pages/docs/partnerships.mdx index 9a25f04744..8af20a4064 100644 --- a/website/pages/docs/partnerships.mdx +++ b/website/pages/docs/partnerships.mdx @@ -46,8 +46,8 @@ Here are links to resources, documentation, examples and best practices to guide **Load Balancer** -- [Load Balancing with NGINX and Consul Template](https://learn.hashicorp.com/consul/integrations/nginx-consul-template) -- [Load Balancing with HAProxy Service Discovery](https://learn.hashicorp.com/consul/integrations/haproxy-consul) +- [Load Balancing with NGINX and Consul Template](https://learn.hashicorp.com/tutorials/consul/load-balancing-nginx) +- [Load Balancing with HAProxy Service Discovery](https://learn.hashicorp.com/tutorials/consul/load-balancing-haproxy) **Proxy** @@ -67,7 +67,7 @@ Here are links to resources, documentation, examples and best practices to guide #### Platform: -- [Consul-AWS for AWS Cloud Map](https://learn.hashicorp.com/consul/cloud-integrations/consul-aws) +- [Consul-AWS for AWS Cloud Map](https://learn.hashicorp.com/tutorials/consul/sync-aws-services) - [Consul Agent Cloud Auto-joining](/docs/agent/cloud-auto-join) #### Infrastructure: @@ -75,20 +75,20 @@ Here are links to resources, documentation, examples and best practices to guide **Certificate Authority (CA)** - [Consul Certificate Management Documentation](/docs/connect/ca) -- [Securing RPC Communication with TLS Encryption](https://learn.hashicorp.com/consul/security-networking/certificates) +- [Securing RPC Communication with TLS Encryption](https://learn.hashicorp.com/tutorials/consul/tls-encryption-secure) - [Consul Connect CA API](/api/connect/ca) **Identity and Access Management (IAM)** - [ACL Documentation and Guides](/docs/acl) - [ACL API Documentation](/api/acl/acl) -- [Securing Consul with ACLs](https://learn.hashicorp.com/consul/security-networking/production-acls) +- [Securing Consul with ACLs](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production) **Application Performance Monitoring (APM)** - [Consul Telemetry Documentation](/docs/agent/telemetry) -- [Consul Cluster Monitoring and Metrics](https://learn.hashicorp.com/consul/day-2-operations/monitoring) -- [Monitoring Consul with Telegraf](https://learn.hashicorp.com/consul/integrations/telegraf) +- [Consul Cluster Monitoring and Metrics](https://learn.hashicorp.com/tutorials/consul/monitor-datacenter-health) +- [Monitoring Consul with Telegraf](https://learn.hashicorp.com/tutorials/consul/monitor-health-telegraf) **Logging** @@ -98,9 +98,9 @@ Here are links to resources, documentation, examples and best practices to guide **Information Technology Service Management (ITSM)** -- [Consul Service Registry](https://learn.hashicorp.com/consul/getting-started/services) -- [DNS Query Interface](https://learn.hashicorp.com/consul/getting-started/services#querying-services) -- [HTTP API with Edge Triggers](https://learn.hashicorp.com/consul/getting-started/services#http-api) +- [Consul Service Registry](https://learn.hashicorp.com/tutorials/consul/get-started-service-discovery) +- [DNS Query Interface](https://learn.hashicorp.com/tutorials/consul/get-started-service-discovery#querying-services) +- [HTTP API with Edge Triggers](https://learn.hashicorp.com/tutorials/consul/get-started-service-discovery#http-api) ### 3. Develop and Test diff --git a/website/pages/docs/upgrading/upgrade-specific.mdx b/website/pages/docs/upgrading/upgrade-specific.mdx index 0dca1792ad..6e2ea71be8 100644 --- a/website/pages/docs/upgrading/upgrade-specific.mdx +++ b/website/pages/docs/upgrading/upgrade-specific.mdx @@ -90,7 +90,7 @@ Connect](#connect-multi-datacenter) in the Enterprise version. ### ACL Upgrade Consul 1.4.0 includes a [new ACL -system](https://learn.hashicorp.com/consul/security-networking/production-acls) +system](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production) that is designed to have a smooth upgrade path but requires care to upgrade components in the right order. @@ -269,7 +269,7 @@ Consul 1.0 (and earlier versions of Consul when running with [Raft protocol 3](/docs/agent/options#_raft_protocol) had an issue where performing rolling updates of Consul servers could result in an outage from old servers remaining in the cluster. -[Autopilot](https://learn.hashicorp.com/consul/day-2-operations/autopilot) +[Autopilot](https://learn.hashicorp.com/tutorials/consul/autopilot-datacenter-operations) would normally remove old servers when new ones come online, but it was also waiting to promote servers to voters in pairs to maintain an odd quorum size. The pairwise promotion feature was removed so that servers become voters as @@ -289,7 +289,7 @@ Please be sure to read over all the details here before upgrading. The [`-raft-protocol`](/docs/agent/options#_raft_protocol) default has been changed from 2 to 3, enabling all -[Autopilot](https://learn.hashicorp.com/consul/day-2-operations/autopilot) +[Autopilot](https://learn.hashicorp.com/tutorials/consul/autopilot-datacenter-operations) features by default. Raft protocol version 3 requires Consul running 0.8.0 or newer on all servers @@ -298,9 +298,9 @@ you will need to set this back to 2 in order to upgrade. See [Raft Protocol Version Compatibility](/docs/upgrade-specific#raft-protocol-version-compatibility) for more details. Also the format of `peers.json` used for outage recovery is -different when running with the latest Raft protocol. See [Manual Recovery +different when running with the latest Raft protocol. Review [Manual Recovery Using -peers.json](https://learn.hashicorp.com/consul/day-2-operations/outage#manual-recovery-using-peers-json) +peers.json](https://learn.hashicorp.com/tutorials/consul/recovery-outage#manual-recovery-using-peers-json) for a description of the required format. Please note that the Raft protocol is different from Consul's internal protocol @@ -323,7 +323,7 @@ version 3, it will no longer allow servers running any older Raft protocol versions to be added. If running a single Consul server, restarting it in-place will result in that server not being able to elect itself as a leader. To avoid this, either set the Raft protocol back to 2, or use [Manual Recovery Using -peers.json](https://learn.hashicorp.com/consul/day-2-operations/outage#manual-recovery-using-peers-json) +peers.json](https://learn.hashicorp.com/tutorials/consul/recovery-outage#manual-recovery-using-peers-json) to map the server to its node ID in the Raft quorum configuration. #### Config Files Require an Extension @@ -521,7 +521,7 @@ health checks. If your cluster uses script health checks please be sure to set this to `true` as part of upgrading agents. If this is set to `true`, you should also enable -[ACLs](https://learn.hashicorp.com/consul/security-networking/production-acls) +[ACLs](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production) to provide control over which users are allowed to register health checks that could potentially execute scripts on the agent machines. @@ -601,8 +601,8 @@ table of the Raft Protocol versions supported by each Consul version: | 0.8 | 1, 2, 3 | In order to enable all -[Autopilot](https://learn.hashicorp.com/consul/day-2-operations/autopilot) -features, all servers in a Consul cluster must be running with Raft protocol +[Autopilot](https://learn.hashicorp.com/tutorials/consul/autopilot-datacenter-operations) +features, all servers in a Consul datacenter must be running with Raft protocol version 3 or later. ## Consul 0.7.1 @@ -724,7 +724,7 @@ the file. Consul 0.7 also uses a new, automatically-created raft/peers.info file to avoid ingesting the `peers.json` file on the first start after upgrading (the `peers.json` file is simply deleted on the first start after upgrading). -Please be sure to review the [Outage Recovery Guide](https://learn.hashicorp.com/consul/day-2-operations/outage) +Please be sure to review the [Outage Recovery tutorial](https://learn.hashicorp.com/tutorials/consul/recovery-outage) before upgrading for more details. ## Consul 0.6.4 diff --git a/website/pages/downloads_tools/index.mdx b/website/pages/downloads_tools/index.mdx index 23a6a0ecb6..2188032e38 100644 --- a/website/pages/downloads_tools/index.mdx +++ b/website/pages/downloads_tools/index.mdx @@ -17,7 +17,7 @@ These Consul tools are created and managed by the dedicated engineers at HashiCo - [Envconsul](https://github.com/hashicorp/envconsul) - Read and set environmental variables for processes from Consul. - [Consul Migrate](https://github.com/hashicorp/consul-migrate) - Data migration tool to handle Consul upgrades to 0.5.1+ - [Consul Replicate](https://github.com/hashicorp/consul-replicate) - Consul cross-DC KV replication daemon. -- [Consul Template](https://github.com/hashicorp/consul-template) - Generic template rendering and notifications with Consul. A step by step tutorial is at [HashiCorp Learn](https://learn.hashicorp.com/consul/developer-configuration/consul-template). +- [Consul Template](https://github.com/hashicorp/consul-template) - Generic template rendering and notifications with Consul. A step-by-step tutorial is available on [HashiCorp Learn](https://learn.hashicorp.com/tutorials/consul/consul-template). ## Community Tools diff --git a/website/pages/intro/index.mdx b/website/pages/intro/index.mdx index ac0106d810..c4b7df2b44 100644 --- a/website/pages/intro/index.mdx +++ b/website/pages/intro/index.mdx @@ -106,5 +106,5 @@ forward the request to the remote datacenter and return the result. - See [how Consul compares to other software](/intro/vs) to assess how it fits into your existing infrastructure. -- Continue onwards with the [getting started guide](https://learn.hashicorp.com/consul/getting-started/install) +- Continue onwards with the [getting started guide](https://learn.hashicorp.com/tutorials/consul/get-started-install) to get Consul up and running.