Nitya Dhanushkodi
d382ca0aec
extensions: refactor serverless plugin to use extensions from config entry fields ( #15817 )
...
docs: update config entry docs and the Lambda manual registration docs
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
Co-authored-by: Eric <eric@haberkorn.co>
2022-12-19 12:19:37 -08:00
Eric Haberkorn
4268c1c25c
Remove the `connect.enable_serverless_plugin` agent configuration option ( #15710 )
2022-12-08 14:46:42 -05:00
Derek Menteer
2703545331
Add -grpc-ca-file and -grpc-ca-path CLI info on upgrade notes. ( #15500 )
...
* Add -grpc-ca-file and -grpc-ca-path CLI info on upgrade notes.
2022-11-21 09:41:29 -06:00
Jared Kirschner
f0837a2cd0
docs: remove unnecessary ent label ( #15081 )
2022-11-19 08:53:52 -05:00
Derek Menteer
9a8c47d589
Add Consul 1.14.0 known issue. ( #15469 )
...
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
2022-11-18 14:59:57 -07:00
Jared Kirschner
c14f664399
docs: include upgrade path to 1.14 ( #15463 )
2022-11-18 09:56:41 -08:00
Derek Menteer
ad0cba9fd5
Improve language on 1.14 upgrade instructions. ( #15412 )
2022-11-17 16:28:47 -06:00
Michael Schurter
527b58db66
docs: add nomad incompatibility to 1.14 docs ( #15397 )
...
docs: add nomad incompatibility to 1.14 docs
2022-11-16 16:45:58 -06:00
Derek Menteer
5853710829
Include addresses.grpc_tls in upgrade docs. ( #15408 )
2022-11-16 14:10:29 -06:00
Derek Menteer
b0041311f7
Fix issue with formatting in upgrade notes. ( #15395 )
2022-11-16 13:38:09 -06:00
Derek Menteer
931cec42b3
Prevent serving TLS via ports.grpc ( #15339 )
...
Prevent serving TLS via ports.grpc
We remove the ability to run the ports.grpc in TLS mode to avoid
confusion and to simplify configuration. This breaking change
ensures that any user currently using ports.grpc in an encrypted
mode will receive an error message indicating that ports.grpc_tls
must be explicitly used.
The suggested action for these users is to simply swap their ports.grpc
to ports.grpc_tls in the configuration file. If both ports are defined,
or if the user has not configured TLS for grpc, then the error message
will not be printed.
2022-11-11 14:29:22 -06:00
Derek Menteer
d981fb8d14
Add peering incompatibility warning to upgrade docs. ( #15319 )
2022-11-10 09:32:31 -06:00
malizz
b9a9e1219c
update config defaults, add docs ( #15302 )
...
* update config defaults, add docs
* update grpc tls port for non-default values
* add changelog
* Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
* Update website/content/docs/agent/config/config-files.mdx
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
* update logic for setting grpc tls port value
* move default config to default.go, update changelog
* update docs
* Fix config tests.
* Fix linter error.
* Fix ConnectCA tests.
* Cleanup markdown on upgrade notes.
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
Co-authored-by: Derek Menteer <derek.menteer@hashicorp.com>
2022-11-09 09:29:55 -08:00
Jared Kirschner
1296ce8c4d
Merge pull request #15141 from hashicorp/docs/upgrade-vault-ca-provider-policy-guidance
...
docs: update Vault CA provider policy guidance
2022-10-24 17:34:43 -04:00
Jared Kirschner
1ac7988541
docs: update Vault CA provider policy guidance
2022-10-24 14:16:51 -07:00
Jared Kirschner
61b60a79e1
Merge pull request #15028 from hashicorp/docs/auto-cert-1-13-2
...
Update upgrade docs for 1.13.2.
2022-10-24 11:39:29 -04:00
Freddy
94ff34bbe4
Update website/content/docs/upgrading/upgrade-specific.mdx
2022-10-22 15:49:57 -06:00
Freddy
415e4a5012
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:25 -06:00
Freddy
d47006d27e
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:13 -06:00
freddygv
50709e60d4
Relax start version requirement
2022-10-21 15:27:39 -06:00
Freddy
21c6edcdc7
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:35 -06:00
Freddy
5944c28dd6
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:29 -06:00
Freddy
8c6a8f0b28
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:22 -06:00
Jared Kirschner
cc843c4be8
Merge pull request #14813 from hashicorp/docs/1-10-upgrade-compatibility-clarification
...
docs: clarify 1.10 upgrade compatibility
2022-10-21 16:57:23 -04:00
Jared Kirschner
db413fcdb8
docs: clarify 1.10 upgrade compatibility
2022-10-21 10:04:52 -07:00
Jared Kirschner
f59483bc9e
docs: fix api docs anchor links
2022-10-18 12:53:53 -07:00
freddygv
ef2127ec51
Fixup links
2022-10-18 10:12:45 -06:00
freddygv
0d4b11c01b
Update upgrade docs for 1.13.2.
...
In 1.13.2 we added a new flag called use_auto_cert to address issues
previously documented in the upgrade guide. Originally there was no way
to disable TLS for gRPC when auto-encrypt was in use, because TLS was
enabled for gRPC due to the presence of auto-encrypt certs.
As of 1.13.2, using auto-encrypt certs as the signal to enable TLS for
gRPC is opt-in only. Meaning that if anyone who had upgraded to 1.13
relied on that side-effect, they now need to explicitly configure it.
2022-10-18 09:43:32 -06:00
Bryce Kalow
6a09b284c9
website: fix broken links ( #14943 )
2022-10-11 09:58:52 -05:00
Jared Kirschner
2603c0da52
docs: vault ca provider patch upgrade guidance
2022-10-06 16:04:43 -07:00
Bryce Kalow
85c1a33c42
website: content updates for developer ( #14419 )
...
Co-authored-by: Ashlee Boyer <ashlee.boyer@hashicorp.com>
Co-authored-by: Ashlee M Boyer <43934258+ashleemboyer@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: HashiBot <62622282+hashibot-web@users.noreply.github.com>
Co-authored-by: Kevin Wang <kwangsan@gmail.com>
2022-09-14 17:45:42 -05:00
Derek Menteer
2721fc9a6e
Improve grpc_tls wording in docs. ( #14608 )
...
Improve grpc_tls wording in docs.
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-14 15:25:39 -05:00
Derek Menteer
ce99ccd390
Add documentation and changelog entry.
2022-08-29 13:43:49 -05:00
Jared Kirschner
c201254ae9
docs: add 1.13 upgrade considerations
...
Adds guidance when upgrading a Consul service mesh deployment to 1.13 and:
- using auto-encrypt or auto-config; or
- the HTTPS port is not enabled on Consul agents
2022-08-18 15:13:21 -07:00
Tu Nguyen
10ee4d42fc
Update with more details on 1.13.0 issue
2022-08-11 14:43:27 -07:00
Tu Nguyen
39ec6e4c2b
Apply suggestions from code review
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-08-11 14:40:28 -07:00
Tu Nguyen
605e5052e1
Add upgrade instructions and considerations for Consul 1.13.1
2022-08-11 11:17:17 -07:00
Mike Nomitch
807898a3c2
Updates upgrade docs to clarify Nomad bug is fixed
2022-08-09 15:15:26 -04:00
R.B. Boyer
bb4d4040fb
server: ensure peer replication can successfully use TLS over external gRPC ( #13733 )
...
Ensure that the peer stream replication rpc can successfully be used with TLS activated.
Also:
- If key material is configured for the gRPC port but HTTPS is not
enabled now TLS will still be activated for the gRPC port.
- peerstream replication stream opened by the establishing-side will now
ignore grpc.WithBlock so that TLS errors will bubble up instead of
being awkwardly delayed or suppressed
2022-07-15 13:15:50 -05:00
Jared Kirschner
6d047c453a
Merge pull request #13655 from hashicorp/docs/add-envoy-to-standard-upgrade-instructions
...
docs: add Envoy upgrade step to std upgrade docs
2022-07-14 13:11:12 -04:00
Jared Kirschner
23d556e9ea
docs: add Envoy upgrade step to std upgrade docs
2022-07-14 06:56:11 -07:00
Jared Kirschner
41990d52e0
docs: improve large version change upgrade path
2022-07-01 05:47:24 -07:00
alex
07bc22e405
no 1.9 style metrics ( #13532 )
...
Signed-off-by: acpana <8968914+acpana@users.noreply.github.com>
2022-06-29 09:46:37 -07:00
Michael Schurter
9acce31237
docs: specify 1.12.0+ent incompat with nomad ( #12883 )
...
Due to build changes in Consul 1.12.0 the `+ent` modifier is missing
from the version reported by `/v1/agent/self`.
Nomad looks for the `ent` modifier when determining whether to reconcile
services in non-default namespaces. Without the modifier Nomad will only
end up removing services from the default Consul namespace.
2022-05-16 18:41:13 -04:00
Dan Upton
1bac1544d0
docs: add section to 1.12 upgrade notes about new TLS config style ( #12880 )
2022-05-11 10:28:52 +01:00
Natalie Smith
0a51e145c1
docs: simplify agent docs slugs
2022-04-11 17:38:47 -07:00
Natalie Smith
ddae7d18a2
docs: fix external links to agent config pages
2022-04-11 17:38:11 -07:00
FFMMM
973d2d0f9a
mark disable_compat_1.9 to deprecate in 1.13, change default to true ( #12675 )
...
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
2022-04-01 10:35:56 -07:00
Bryce Kalow
6bf67b7ef4
website: redirect /api to /api-docs ( #12660 )
2022-03-30 16:16:26 -05:00
mrspanishviking
7180c99960
Revert "[Docs] Agent configuration hierarchy "
2022-03-15 16:13:58 -07:00