Commit Graph

3324 Commits

Author SHA1 Message Date
David Yu fc4e115380
docs: adding Consul 1.9.x to compat matrix and link to Envoy compat matrix (#9263)
* Adding Consul 1.9.x to compat matrix and link to Envoy compat matrix

Adding 1.9.x and link to Envoy compat matrix
2020-11-24 10:49:53 -08:00
Kit Patella 0ba7f4ce39
Merge pull request #9261 from hashicorp/telemetry/fix-missing-and-stale-docs-2
Telemetry/fix missing and stale docs
2020-11-23 13:34:19 -08:00
Hans Hasselberg 57701695c3 add missing descriptions for metrics 2020-11-23 22:06:30 +01:00
Daniel Nephin 6751d51aa3 docs: mark streaming as experimental 2020-11-23 15:59:47 -05:00
Kit Patella fcec25de40 add entries for missing fsm operations and mark duplicated metrics prefixes as deprecated 2020-11-23 12:42:51 -08:00
Sabeen Syed cfbefc45f0
Update NIA architecture image (#9180) 2020-11-23 01:47:58 -06:00
Kit Patella c6b29a8bba
Merge pull request #9245 from hashicorp/telemetry/fix-missing-and-stale-docs
Telemetry/fix missing and stale docs
2020-11-20 12:54:29 -08:00
freddygv b4ab1e11b9 Update latest version 2020-11-19 16:45:54 -07:00
Kit Patella 5c09dc322e add telemetry and definition help entries for missing catalog and acl metrics 2020-11-19 13:29:44 -08:00
R.B. Boyer 7c7a3e5165
command: when generating envoy bootstrap configs use the datacenter returned from the agent services endpoint (#9229)
Fixes #9215
2020-11-19 15:27:31 -06:00
Kit Patella 9e54e897d7 remove stale entries and rename/define acl.resolveToken 2020-11-19 13:06:28 -08:00
Freddy fd5928fa4e
Require operator:write to get Connect CA config (#9240)
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that operators with `operator:read` ACL permissions are able to read the Consul Connect CA configuration when explicitly configured with the `/v1/connect/ca/configuration` endpoint, including the private key. This allows the user to effectively privilege escalate by enabling the ability to mint certificates for any Consul Connect services. This would potentially allow them to masquerade (receive/send traffic) as any service in the mesh.

--

This PR increases the permissions required to read the Connect CA's private key when it was configured via the `/connect/ca/configuration` endpoint. They are now `operator:write`.
2020-11-19 10:14:48 -07:00
Kit Patella 0cc8d8e0a1
Merge pull request #9091 from scellef/correct-upgrade-guide
Correcting text on when default was changed in Consul
2020-11-18 16:54:48 -08:00
Nitya Dhanushkodi d24be614e5
Add docs for envoyExtraArgs (#9206) 2020-11-18 15:40:39 -08:00
Matt Keeler 66fd23d67f
Refactor to call non-voting servers read replicas (#9191)
Co-authored-by: Kit Patella <kit@jepsen.io>
2020-11-17 10:53:57 -05:00
Matt Keeler 946cc0b82a
[docs] Change links to the DNS information to the right place (#8675)
The redirects were working in many situations but some (INTERNALS.md) was not. This just flips everything over to using the real link.
2020-11-17 10:03:00 -05:00
Luke Kysow 11db2b37c3
Docs for upgrading to CRDs (#9176)
* Add Upgrading to CRDs docs
2020-11-13 15:19:21 -08:00
Kent 'picat' Gruber 53e0683ae6
Merge pull request #9106 from hashicorp/security-model-docs-revamp
Revamp Security Model Documentation
2020-11-13 17:30:24 -05:00
Mike Morris 96df6a7bf5 Merge pull request #9155 from hashicorp/release/1.9.0-beta3
merge: 1.9.0-beta3
2020-11-13 16:45:50 -05:00
Iryna Shustava 491a1ab877
docs: add link to the OpenShift platform guide to k8s docs (#9177) 2020-11-12 15:06:25 -08:00
Kyle Schochenmaier a3653a7ae2
Docs: for consul-k8s health checks (#8819)
* docs for consul-k8s health checks

Co-authored-by: Derek Strickland <1111455+DerekStrickland@users.noreply.github.com>
Co-authored-by: Ashwin Venkatesh <ashwin@hashicorp.com>
Co-authored-by: Iryna Shustava <ishustava@users.noreply.github.com>
Co-authored-by: Luke Kysow <1034429+lkysow@users.noreply.github.com>
2020-11-12 16:55:44 -06:00
Nitya Dhanushkodi 5d31e2d766
Update compatibility matrix
Co-authored-by: Ashwin Venkatesh <ashwin@hashicorp.com>
2020-11-12 14:43:33 -08:00
R.B. Boyer 61eac21f1a
agent: return the default ACL policy to callers as a header (#9101)
Header is: X-Consul-Default-ACL-Policy=<allow|deny>

This is of particular utility when fetching matching intentions, as the
fallthrough for a request that doesn't match any intentions is to
enforce using the default acl policy.
2020-11-12 10:38:32 -06:00
Paul Banks 3f37a3132e
Update ui-visualization.mdx 2020-11-12 15:52:24 +00:00
Matt Keeler 7ef9b04f90
Add a CLI command for retrieving the autopilot configuration. (#9142) 2020-11-11 13:19:02 -05:00
Joel Watson 81fb937e4f
Merge pull request #9098 from hashicorp/watsonian/kv-size-breakdown
Add detailed key size breakdown to snapshot inspect
2020-11-11 11:34:45 -06:00
Joel Watson 2e654a1759 docs: add warning in 0.9.0 upgrade notes 2020-11-11 09:23:43 -05:00
Joel Watson 6957056911 Missed a spot with old params in docs 2020-11-10 11:22:45 -06:00
Joel Watson 1ef259b093 Rename params to better reflect their purpose 2020-11-10 10:44:09 -06:00
Joel Watson 5ad0db73c8 Make docs for params clearer 2020-11-10 10:35:24 -06:00
Matt Keeler 361fe3ad20
Add some autopilot docs and update the changelog (#9139) 2020-11-09 14:14:19 -05:00
Matt Keeler c048e86bb2
Switch to using the external autopilot module 2020-11-09 09:22:11 -05:00
Mike Morris 75019baadd
chore: upgrade to gopsutil/v3 (#9118)
* deps: update golang.org/x/sys

* deps: update imports to gopsutil/v3

* chore: make update-vendor
2020-11-06 20:48:38 -05:00
Mike Morris 9875846509
website: update callout to 1.9.0-beta2 (#9131) 2020-11-06 20:39:25 -05:00
Kent 'picat' Gruber 81efada5c3 Adjust the ACLs requirement section wording and add link to ACL docs
It's better to avoid the ambiguous Vault statement that was not clarified and drop the loaded "roles" term in favor of "capabilities" since the ACL system is described as capability-based in previous ACL documentation.
2020-11-06 16:25:21 -05:00
Paul Banks b5dbeff784
UI Metrics documentation (#9048)
* UI Metrics documentation

* Update website/pages/docs/connect/observability/ui-visualization.mdx

* Fix some review comments

* Fix review comments

* Apply suggestions from code review

Co-authored-by: R.B. Boyer <rb@hashicorp.com>

Co-authored-by: R.B. Boyer <rb@hashicorp.com>
2020-11-06 20:32:28 +00:00
Kent 'picat' Gruber facd48b486 Use the EnterpriseAlert inline widget 2020-11-06 10:47:22 -05:00
Kent 'picat' Gruber fd29187499 Add mention of auto_encrypt to mTLS requirements 2020-11-06 10:15:26 -05:00
Kent 'picat' Gruber c7c151f789 Fix sublist format for client agent threats 2020-11-05 16:41:15 -05:00
Kent 'picat' Gruber 05b34a3cf0 Add link to the keygen command 2020-11-05 16:34:32 -05:00
Kent 'picat' Gruber a06768f582 Use short link to keyring command 2020-11-05 16:33:04 -05:00
Kent 'picat' Gruber d0e4e7a6ff Add link to default_policy with code format to ACLs requirement section 2020-11-05 16:30:00 -05:00
Kent 'picat' Gruber cc58a73716 Cleanup verify_server_hostname mTLS requirement 2020-11-05 16:27:23 -05:00
Kent 'picat' Gruber e0a9e329e5 Add extra clarification around verify_incoming_https for localhost
In many cases access to localhost is restricted to trusted/privellged actors only
2020-11-05 16:20:41 -05:00
Kent 'picat' Gruber 84a345324c Fix inline links + format in mTLS requirements section 2020-11-05 16:09:07 -05:00
Kent 'picat' Gruber 7a7f0425a1 Capitalize enterprise and add link to enerprise docs 2020-11-05 16:03:14 -05:00
Kent 'picat' Gruber e51dbbf529 Soften language by replacing utilize with use 2020-11-05 15:59:53 -05:00
Kim Ngo 52f3714c7a
Fix NIA doc links (#9110)
fix config link and anchor
2020-11-05 13:35:57 -06:00
Jimmy Merritello 80c9f54bbc
Bump HSM version (#9102) 2020-11-05 11:48:12 -06:00
Joel Watson 52ea53f95e Update docs with new flags 2020-11-05 10:31:36 -06:00