ultrafear
854d6e6d59
Fixing spelling under Matching and Prefix Values
2021-11-17 10:33:08 -08:00
Luke Kysow
3c68766286
Add docs for Consul Ent on ECS ( #11537 )
2021-11-17 09:59:32 -08:00
Eric Haberkorn
1bf778f9c7
Merge pull request #11583 from hashicorp/consul-ecs-ga-docs
...
Consul ECS GA Docs
2021-11-17 12:42:47 -05:00
Paul Glass
de8c830a93
docs: Fix some typos in ECS overview
2021-11-17 11:20:23 -06:00
danielehc
eddd648095
Connect.enabled config option ( #11533 )
2021-11-17 12:06:11 +01:00
Paul Glass
e7260321e3
docs: correct some capitalization
2021-11-16 11:06:08 -06:00
Paul Glass
2d4d867e41
docs: ECS docs for GA
2021-11-16 10:55:23 -06:00
Eric
319a7b389c
Update Consul ECS documentation with health sync changes
...
This also switches the task startup image to an svg so it isn't pixelated
anymore
2021-11-16 11:51:32 -05:00
Paul Glass
40f1802f27
docs: Suggestions for ECS architecture from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-16 11:51:31 -05:00
Paul Glass
03d4deeaa3
docs: ECS graceful shutdown refinements
2021-11-16 11:51:31 -05:00
Paul Glass
089a699bc4
docs: Apply suggestions to ecs docs from code review
...
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-16 11:51:31 -05:00
Paul Glass
33c96c4ac5
docs: ECS graceful shutdown docs for GA
2021-11-16 11:51:31 -05:00
mrspanishviking
b8e11507b1
Merge pull request #11543 from hashicorp/envoy-token
...
docs: added more information to help endusers with proxies and ACL
2021-11-11 08:37:12 -08:00
mrspanishviking
f1b4a10c83
Update website/content/docs/connect/proxies/integrate.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-11 08:05:45 -08:00
Freddy
3e486cae86
Merge pull request #11546 from hashicorp/ui/bug/revert-11328
...
ui: Revert #11328 allow-${}-style-interpolation due, to browser support
2021-11-10 14:53:23 -07:00
mrspanishviking
34e1c2b8d2
Merge pull request #11542 from hashicorp/vault-ca
...
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 13:10:01 -08:00
mrspanishviking
42ab9e8aa4
Update website/content/docs/connect/ca/vault.mdx
...
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-11-10 13:03:28 -08:00
David Yu
f1d1c12ad5
docs: provide more example CLI commands and reference Vault ( #11528 )
...
* docs: provide more example CLI commands and reference Vault
* Extra formatting
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* adding more detail around gossip encryption rotation precautions
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
2021-11-10 12:05:20 -08:00
John Cowen
537c4f32f7
Revert "Merge pull request #11328 from radiantly/ui/feature/allow-${}-style-interpolation"
...
This reverts commit cd55c0cda3
, reversing
changes made to 14af8cb7a9
.
2021-11-10 17:54:33 +00:00
trujillo-adam
17ccead352
Merge pull request #11487 from hashicorp/docs/admin-partitions-feedback-acl-policies-redux
...
changed 'segments' in this page to 'resource labels' to disambiguate from 'network segments
updated the code snippets to use CodeBlock component and to include JSON
2021-11-10 07:56:54 -08:00
Karl Cardenas
50ff9e8a6e
docs: added more information to help endusers with proxies and ACL tokens
2021-11-10 08:52:44 -07:00
Karl Cardenas
5644edae5c
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 07:30:12 -07:00
trujillo-adam
9333fad1e3
added json versions for all hcl examples
2021-11-09 18:19:04 -08:00
Karl Cardenas
5522610615
docs: added link to Ambassador tutorial in k8s section
2021-11-09 07:51:17 -07:00
Karl Cardenas
855925cd46
docs: removed broken link to Ambassador
2021-11-08 07:46:38 -07:00
Freddy
5e7eb85f2a
Fix caveat about resolvers operating at L4 ( #11497 )
...
Service resolvers can specify L4 rules such as redirects, or L7 rules such as
hash-based load balancing policies.
2021-11-08 07:11:36 -07:00
David Yu
6defa9ddb8
docs: add `brew install hashicorp/tap/consul-k8s` and re-order install and uninstall workflows ( #11489 )
...
* docs: add `brew install hashicorp/tap/consul-k8s`
* add consul k8s cli brew install to reference
* Update k8s-cli.mdx
* split home-brew commands into two steps
* Update k8s-cli.mdx
* slight changes on recommended way of installing Consul K8s for CLI or multi-DC
* Update install.mdx
* reorder cli and helm uninstall
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/k8s-cli.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/k8s-cli.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-05 16:33:11 -07:00
Luke Kysow
5caee36a76
Document default storage class requirements ( #11492 )
2021-11-05 11:27:49 -07:00
Connor
efe4b21287
Support Vault Namespaces explicitly in CA config ( #11477 )
...
* Support Vault Namespaces explicitly in CA config
If there is a Namespace entry included in the Vault CA configuration,
set it as the Vault Namespace on the Vault client
Currently the only way to support Vault namespaces in the Consul CA
config is by doing one of the following:
1) Set the VAULT_NAMESPACE environment variable which will be picked up
by the Vault API client
2) Prefix all Vault paths with the namespace
Neither of these are super pleasant. The first requires direct access
and modification to the Consul runtime environment. It's possible and
expected, not super pleasant.
The second requires more indepth knowledge of Vault and how it uses
Namespaces and could be confusing for anyone without that context. It
also infers that it is not supported
* Add changelog
* Remove fmt.Fprint calls
* Make comment clearer
* Add next consul version to website docs
* Add new test for default configuration
* go mod tidy
* Add skip if vault not present
* Tweak changelog text
2021-11-05 11:42:28 -05:00
trujillo-adam
b4abd242e8
applied feedback
2021-11-05 09:30:28 -07:00
FFMMM
fdb0ee6093
change vault ca docs to mention root cert ttl config ( #11488 )
...
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
2021-11-04 15:44:22 -07:00
FFMMM
61bd417a82
plumb thru root cert tll to the aws ca provider ( #11449 )
...
* plumb thru root cert ttl to the aws ca provider
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Update .changelog/11449.txt
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
2021-11-04 12:19:08 -07:00
David Yu
8f8055352d
docs: consul-k8s uninstall with namespace ( #11478 )
...
* docs: consul-k8s uninstall with namespace
Uninstall with namespace
* change release name to consul in uninstall
* Update website/content/docs/k8s/operations/uninstall.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* add --create-namespace command to install for custom values file
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-03 16:48:48 -07:00
trujillo-adam
e09744adde
changed 'segments' in this page to 'resource labels' to disambiguate from 'network segments'
2021-11-03 15:16:42 -07:00
Kevin Wang
7e80484013
chore: react-subnav ( #11486 )
2021-11-03 17:05:12 -04:00
Kyle Rarey
a775e9a274
Update namespaced replication token example
2021-11-03 15:33:30 -04:00
Thomas Eckert
875fa920c9
Update Helm Docs for v0.36.0 Consul K8s release ( #11483 )
...
Co-authored-by: David Yu <dyu@hashicorp.com>
2021-11-03 10:04:16 -07:00
Luke Kysow
9b680b3f81
Add quick-link for users coming from UI ( #11403 )
...
The Consul UI topology view has an icon with the text
"Configure metrics dashboard" that links to this page. Add a notice at
the top of the page that links them directly to the relevant section.
2021-11-03 09:37:30 -07:00
trujillo-adam
3ffa05495e
Merge pull request #11307 from hashicorp/docs/admin-partitions-cli-v1.11.0
...
admin partition docs part 1 - cli
2021-11-02 14:44:43 -07:00
Luke Kysow
7eb32cdb73
Remove Name/Namespace fields from upstream default ( #11456 )
...
The UpstreamConfig.Defaults field does not support setting Name or
Namespace because the purpose is to apply defaults to all upstreams.
I think this was just missed in the docs since those fields would
error if set under Defaults.
i.e. this is not supported:
```
UpstreamConfig {
Defaults {
Name = "foo"
Namespace = "bar"
# Defaults config here
}
}
```
2021-11-02 14:21:15 -07:00
FFMMM
4ddf973a31
add root_cert_ttl option for consul connect, vault ca providers ( #11428 )
...
* add root_cert_ttl option for consul connect, vault ca providers
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Apply suggestions from code review
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
* add changelog, pr feedback
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Update .changelog/11428.txt, more docs
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
* Update website/content/docs/agent/options.mdx
Co-authored-by: Kyle Havlovitz <kylehav@gmail.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
Co-authored-by: Kyle Havlovitz <kylehav@gmail.com>
2021-11-02 11:02:10 -07:00
Daniel Nephin
51d8417545
Merge pull request #10690 from tarat44/h2c-support-in-ping-checks
...
add support for h2c in h2 ping health checks
2021-11-02 13:53:06 -04:00
Peter M
697e97f57f
adding K8s page to subnav ( #11467 )
...
* adding K8s page to subnav
per request from HLT, updating use case tab to lead to K8s page instead of service mesh.
* Update subnav.js
2021-11-01 12:41:55 -07:00
Melissa Kam
c8240101dc
docs/nia: Fix typo in TLS configs for CTS
2021-11-01 14:03:19 -05:00
Melissa Kam
e7cf8226a1
Merge pull request #11463 from hashicorp/docs-cts-tls
...
docs/nia: Update TLS-related configurations for CTS
2021-11-01 12:39:39 -05:00
Daniel Upton
d47b7311b8
Support Check-And-Set deletion of config entries ( #11419 )
...
Implements #11372
2021-11-01 16:42:01 +00:00
trujillo-adam
8ca5be47c8
Merge pull request #11441 from hashicorp/docs/admin-partitions-feedback-acl-policies
...
admin partitions feedback related to ACLs; additional improvements to ACL rule docs
2021-11-01 09:09:38 -07:00
trujillo-adam
78e59170fa
Update website/content/docs/security/acl/acl-rules.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2021-11-01 09:07:08 -07:00
Melissa Kam
0b744289b7
docs/nia: Update TLS-related configurations for CTS
...
- Clarify file types and uses of the configurations
- Update some wording to match between Consul and TFE TLS configs
2021-11-01 10:44:14 -05:00
trujillo-adam
138f9f31e6
Apply suggestions from code review
...
fixed typos
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2021-11-01 08:08:04 -07:00