From dfcc11ec5f86261c920382188700e0872f2c07e6 Mon Sep 17 00:00:00 2001 From: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> Date: Tue, 17 Jan 2023 10:09:14 -0800 Subject: [PATCH] fixes pre-devdot links in service defaults ref docs (#15989) --- .../config-entries/service-defaults.mdx | 68 +++++++++---------- 1 file changed, 34 insertions(+), 34 deletions(-) diff --git a/website/content/docs/connect/config-entries/service-defaults.mdx b/website/content/docs/connect/config-entries/service-defaults.mdx index f33eb30383..69be94d24d 100644 --- a/website/content/docs/connect/config-entries/service-defaults.mdx +++ b/website/content/docs/connect/config-entries/service-defaults.mdx @@ -14,7 +14,7 @@ service, such as its protocol. ### Default protocol -> **NOTE**: The default protocol can also be configured globally for all proxies -using the [proxy defaults](/docs/connect/config-entries/proxy-defaults#default-protocol) +using the [proxy defaults](/consul/docs/connect/config-entries/proxy-defaults#default-protocol) config entry. However, if the protocol value is specified in a service defaults config entry for a given service, that value will take precedence over the globally configured value from proxy defaults. @@ -309,7 +309,7 @@ represents a location outside the Consul cluster. They can be dialed directly wh type: `string: "default"`, enterprise: true, description: - 'Specifies the name of the admin partition in which the configuration entry applies. Refer to the [Admin Partitions documentation](/docs/enterprise/admin-partitions) for additional information.', + 'Specifies the name of the admin partition in which the configuration entry applies. Refer to the [Admin Partitions documentation](/consul/docs/enterprise/admin-partitions) for additional information.', yaml: false, }, { @@ -329,13 +329,13 @@ represents a location outside the Consul cluster. They can be dialed directly wh { name: 'namespace', description: - 'If running Consul Open Source, the namespace is ignored (see [Kubernetes Namespaces in Consul OSS](/docs/k8s/crds#consul-oss)). If running Consul Enterprise see [Kubernetes Namespaces in Consul Enterprise](/docs/k8s/crds#consul-enterprise) for more details.', + 'If running Consul Open Source, the namespace is ignored (see [Kubernetes Namespaces in Consul OSS](/consul/docs/k8s/crds#consul-oss)). If running Consul Enterprise see [Kubernetes Namespaces in Consul Enterprise](/consul/docs/k8s/crds#consul-enterprise) for more details.', }, { name: 'partition', enterprise: true, description: - 'Specifies the admin partition in which the configuration will apply. The current partition is used if unspecified. Refer to the [Admin Partitions documentation](/docs/enterprise/admin-partitions) for details. The partitions parameter is not supported in Consul OSS.', + 'Specifies the admin partition in which the configuration will apply. The current partition is used if unspecified. Refer to the [Admin Partitions documentation](/consul/docs/enterprise/admin-partitions) for details. The partitions parameter is not supported in Consul OSS.', }, ], hcl: false, @@ -345,10 +345,10 @@ represents a location outside the Consul cluster. They can be dialed directly wh type: `string: "tcp"`, description: `Sets the protocol of the service. This is used by Connect proxies for things like observability features and to unlock usage - of the [\`service-splitter\`](/docs/connect/config-entries/service-splitter) and - [\`service-router\`](/docs/connect/config-entries/service-router) config entries + of the [\`service-splitter\`](/consul/docs/connect/config-entries/service-splitter) and + [\`service-router\`](/consul/docs/connect/config-entries/service-router) config entries for a service. It also unlocks the ability to define L7 intentions via - [\`service-intentions\`](/docs/connect/config-entries/service-intentions). + [\`service-intentions\`](/consul/docs/connect/config-entries/service-intentions). Supported values are one of \`tcp\`, \`http\`, \`http2\`, or \`grpc\`.`, }, { @@ -425,12 +425,12 @@ represents a location outside the Consul cluster. They can be dialed directly wh type: 'string: ""', description: `The protocol for the upstream listener.

NOTE: The protocol of a service should ideally be configured via the - [\`protocol\`](/docs/connect/config-entries/service-defaults#protocol) + [\`protocol\`](/consul/docs/connect/config-entries/service-defaults#protocol) field of a - [\`service-defaults\`](/docs/connect/config-entries/service-defaults) + [\`service-defaults\`](/consul/docs/connect/config-entries/service-defaults) config entry for the upstream destination service. Configuring it in a proxy upstream config will not fully enable some - [L7 features](/docs/connect/l7-traffic). + [L7 features](/consul/docs/connect/l7-traffic). It is supported here for backwards compatibility with Consul versions prior to 1.6.0. `, }, @@ -440,22 +440,22 @@ represents a location outside the Consul cluster. They can be dialed directly wh description: { hcl: `The number of milliseconds to allow when making upstream connections before timing out.

NOTE: The connect timeout of a service should ideally be configured via the - [\`connect_timeout\`](/docs/connect/config-entries/service-resolver#connecttimeout) + [\`connect_timeout\`](/consul/docs/connect/config-entries/service-resolver#connecttimeout) field of a - [\`service-resolver\`](/docs/connect/config-entries/service-resolver) + [\`service-resolver\`](/consul/docs/connect/config-entries/service-resolver) config entry for the upstream destination service. Configuring it in a proxy upstream config will not fully enable some - [L7 features](/docs/connect/l7-traffic). + [L7 features](/consul/docs/connect/l7-traffic). It is supported here for backwards compatibility with Consul versions prior to 1.6.0. `, yaml: `The number of milliseconds to allow when making upstream connections before timing out.

NOTE: The connect timeout of a service should ideally be configured via the - [\`connectTimeout\`](/docs/connect/config-entries/service-resolver#connecttimeout) + [\`connectTimeout\`](/consul/docs/connect/config-entries/service-resolver#connecttimeout) field of a - [\`ServiceResolver\`](/docs/connect/config-entries/service-resolver) + [\`ServiceResolver\`](/consul/docs/connect/config-entries/service-resolver) CRD for the upstream destination service. Configuring it in a proxy upstream config will not fully enable some - [L7 features](/docs/connect/l7-traffic). + [L7 features](/consul/docs/connect/l7-traffic). It is supported here for backwards compatibility with Consul versions prior to 1.6.0. `, }, @@ -464,7 +464,7 @@ represents a location outside the Consul cluster. They can be dialed directly wh name: 'MeshGateway', type: 'MeshGatewayConfig: ', description: `Controls the default - [mesh gateway configuration](/docs/connect/gateways/mesh-gateway#connect-proxy-configuration) + [mesh gateway configuration](/consul/docs/connect/gateways/mesh-gateway#connect-proxy-configuration) for this upstream.`, children: [ { @@ -565,22 +565,22 @@ represents a location outside the Consul cluster. They can be dialed directly wh description: { hcl: `The protocol for the upstream listener.

NOTE: The protocol of a service should ideally be configured via the - [\`protocol\`](/docs/connect/config-entries/service-defaults#protocol) + [\`protocol\`](/consul/docs/connect/config-entries/service-defaults#protocol) field of a - [\`service-defaults\`](/docs/connect/config-entries/service-defaults) + [\`service-defaults\`](/consul/docs/connect/config-entries/service-defaults) config entry for the upstream destination service. Configuring it in a proxy upstream config will not fully enable some - [L7 features](/docs/connect/l7-traffic). + [L7 features](/consul/docs/connect/l7-traffic). It is supported here for backwards compatibility with Consul versions prior to 1.6.0. `, yaml: `The protocol for the upstream listener.

NOTE: The protocol of a service should ideally be configured via the - [\`protocol\`](/docs/connect/config-entries/service-defaults#protocol) + [\`protocol\`](/consul/docs/connect/config-entries/service-defaults#protocol) field of a - [\`ServiceDefaults\`](/docs/connect/config-entries/service-defaults) + [\`ServiceDefaults\`](/consul/docs/connect/config-entries/service-defaults) CRD for the upstream destination service. Configuring it in a proxy upstream config will not fully enable some - [L7 features](/docs/connect/l7-traffic). + [L7 features](/consul/docs/connect/l7-traffic). It is supported here for backwards compatibility with Consul versions prior to 1.6.0. `, }, @@ -591,22 +591,22 @@ represents a location outside the Consul cluster. They can be dialed directly wh description: { hcl: `The number of milliseconds to allow when making upstream connections before timing out.

NOTE: The connect timeout of a service should ideally be configured via the - [\`connect_timeout\`](/docs/connect/config-entries/service-resolver#connecttimeout) + [\`connect_timeout\`](/consul/docs/connect/config-entries/service-resolver#connecttimeout) field of a - [\`service-resolver\`](/docs/connect/config-entries/service-resolver) + [\`service-resolver\`](/consul/docs/connect/config-entries/service-resolver) config entry for the upstream destination service. Configuring it in a proxy upstream config will not fully enable some - [L7 features](/docs/connect/l7-traffic). + [L7 features](/consul/docs/connect/l7-traffic). It is supported here for backwards compatibility with Consul versions prior to 1.6.0. `, yaml: `The number of milliseconds to allow when making upstream connections before timing out.

NOTE: The connect timeout of a service should ideally be configured via the - [\`connectTimeout\`](/docs/connect/config-entries/service-resolver#connecttimeout) + [\`connectTimeout\`](/consul/docs/connect/config-entries/service-resolver#connecttimeout) field of a - [\`ServiceResolver\`](/docs/connect/config-entries/service-resolver) + [\`ServiceResolver\`](/consul/docs/connect/config-entries/service-resolver) CRD for the upstream destination service. Configuring it in a proxy upstream config will not fully enable some - [L7 features](/docs/connect/l7-traffic). + [L7 features](/consul/docs/connect/l7-traffic). It is supported here for backwards compatibility with Consul versions prior to 1.6.0. `, }, @@ -615,7 +615,7 @@ represents a location outside the Consul cluster. They can be dialed directly wh name: 'MeshGateway', type: 'MeshGatewayConfig: ', description: `Controls the default - [mesh gateway configuration](/docs/connect/gateways/mesh-gateway/service-to-service-traffic-wan-datacenters#connect-proxy-configuration) + [mesh gateway configuration](/consul/docs/connect/gateways/mesh-gateway/service-to-service-traffic-wan-datacenters#connect-proxy-configuration) for this upstream.`, children: [ { @@ -773,7 +773,7 @@ represents a location outside the Consul cluster. They can be dialed directly wh name: 'MeshGateway', type: 'MeshGatewayConfig: ', description: `Controls the default - [mesh gateway configuration](/docs/connect/gateways/mesh-gateway/service-to-service-traffic-wan-datacenters#connect-proxy-configuration) + [mesh gateway configuration](/consul/docs/connect/gateways/mesh-gateway/service-to-service-traffic-wan-datacenters#connect-proxy-configuration) for this service. Added in v1.6.0.`, children: [ { @@ -795,7 +795,7 @@ represents a location outside the Consul cluster. They can be dialed directly wh name: 'Expose', type: 'ExposeConfig: ', description: `Controls the default - [expose path configuration](/docs/connect/registration/service-registration#expose-paths-configuration-reference) + [expose path configuration](/consul/docs/connect/registration/service-registration#expose-paths-configuration-reference) for Envoy. Added in v1.6.2.

Exposing paths through Envoy enables a service to protect itself by only listening on localhost, while still allowing non-Connect-enabled applications to contact an HTTP endpoint. @@ -806,7 +806,7 @@ represents a location outside the Consul cluster. They can be dialed directly wh type: 'bool: false', description: `If enabled, all HTTP and gRPC checks registered with the agent are exposed through Envoy. Envoy will expose listeners for these checks and will only accept connections originating from localhost or Consul's - [advertise address](/docs/agent/config/config-files#advertise). The port for these listeners are dynamically allocated from + [advertise address](/consul/docs/agent/config/config-files#advertise). The port for these listeners are dynamically allocated from [expose_min_port](/docs/agent/config/config-files#expose_min_port) to [expose_max_port](/docs/agent/config/config-files#expose_max_port). This flag is useful when a Consul client cannot reach registered services over localhost. One example is when running Consul on Kubernetes, and Consul agents run in their own pods.`, @@ -850,7 +850,7 @@ represents a location outside the Consul cluster. They can be dialed directly wh ## ACLs -Configuration entries may be protected by [ACLs](/docs/security/acl). +Configuration entries may be protected by [ACLs](/consul/docs/security/acl). Reading a `service-defaults` config entry requires `service:read` on the resource.