boruszak
f4731bf0df
Installation isntructions
2022-10-03 12:52:07 -05:00
Jeff Boruszak
12aa3cac4a
Apply suggestions from code review
2022-10-03 11:38:43 -05:00
Jeff Boruszak
69189e0381
Update website/content/docs/connect/cluster-peering/index.mdx
2022-10-03 11:36:48 -05:00
Jeff Boruszak
d1d9fd0a5c
Update website/content/docs/connect/dataplane/index.mdx
...
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 11:16:00 -05:00
boruszak
80bbf8995b
Removed external server constraint
2022-10-03 11:15:12 -05:00
boruszak
d80601e96e
proxy default behavior constraint
2022-10-03 11:14:34 -05:00
Jeff Boruszak
eb9895422d
Apply suggestions from code review
...
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:58:43 -05:00
Jeff Boruszak
b530c14032
Update website/content/docs/connect/dataplane/index.mdx
...
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:51:24 -05:00
boruszak
80e3f15d47
Dynamic routing clarifications
2022-09-30 15:32:43 -05:00
boruszak
6866e89630
service-resolver alignment
2022-09-30 14:00:55 -05:00
Jeff Boruszak
443dc35c31
Apply suggestions from code review
...
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
2022-09-30 14:00:37 -05:00
Jeff Boruszak
722881fb40
Update website/content/docs/connect/proxies/envoy.mdx
2022-09-30 10:01:43 -05:00
Jeff Boruszak
57154548f8
Update website/content/docs/connect/proxies/envoy.mdx
2022-09-30 09:59:21 -05:00
Jeff Boruszak
2d72feffda
Update website/content/docs/connect/proxies/envoy.mdx
2022-09-30 09:58:03 -05:00
Jeff Boruszak
ebc069aeb6
Apply suggestions from code review
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-09-30 09:52:53 -05:00
boruszak
10cfc9bbb4
Codeblock Added
2022-09-30 09:51:58 -05:00
Jeff Boruszak
76d4f6e309
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-09-30 09:29:20 -05:00
boruszak
35303f5f79
Page location/nav edits
2022-09-29 14:52:31 -05:00
boruszak
dfd5903c8e
Typo fix
2022-09-28 16:19:24 -05:00
boruszak
055bb88ee5
Typo fix
2022-09-28 16:10:36 -05:00
boruszak
efcb466e38
Typo fix
2022-09-28 16:09:23 -05:00
boruszak
2589f07659
Fixes
2022-09-28 16:03:32 -05:00
boruszak
66f8c65e89
Traffic Management
2022-09-28 15:52:03 -05:00
boruszak
3e2a650e5f
k8s page updates
2022-09-28 15:42:21 -05:00
boruszak
6fd154ec73
Tab groupings
2022-09-28 14:13:38 -05:00
boruszak
6f52816680
Kyle Rarey - requested constraints added
2022-09-28 14:00:21 -05:00
boruszak
ff9348f877
Mike Morris clean up requests
2022-09-28 13:57:04 -05:00
cskh
69f40df548
feat(ingress gateway: support configuring limits in ingress-gateway c… ( #14749 )
...
* feat(ingress gateway: support configuring limits in ingress-gateway config entry
- a new Defaults field with max_connections, max_pending_connections, max_requests
is added to ingress gateway config entry
- new field max_connections, max_pending_connections, max_requests in
individual services to overwrite the value in Default
- added unit test and integration test
- updated doc
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
2022-09-28 14:56:46 -04:00
boruszak
b0fc58474a
Fixes
2022-09-27 15:42:05 -05:00
boruszak
b0cbecae7d
Bootstrap Consul on Windows VMs instructions
2022-09-27 15:16:39 -05:00
Luke Kysow
84f8b87967
Update k8s.mdx ( #14765 )
2022-09-27 09:51:12 -07:00
Derek Menteer
aa4709ab74
Add envoy connection balancing. ( #14616 )
...
Add envoy connection balancing config.
2022-09-26 11:29:06 -05:00
Roman Kunin
a0b1806ba2
Fix MD markup ( #14702 )
2022-09-22 20:00:09 -07:00
Roman Kunin
4c95e16815
Fix md markup
2022-09-22 16:41:52 +10:00
cskh
1d7c82c017
doc(peering): missing network requirement for peering and the partiti… ( #14677 )
...
* doc(peering): missing network requirement for peering and the partition parameter in the list API
* Delete API: move partition from path parameter to query parameter
2022-09-19 16:11:04 -04:00
boruszak
f797d128c7
Spacing and title fixes
2022-09-16 10:28:32 -05:00
boruszak
0e042654dc
Merge 'main' into docs/search-metadata-headers
2022-09-15 15:34:36 -05:00
Jeff Boruszak
bd39e1b25c
Merge pull request #14596 from hashicorp/docs/search-desc-batch04
...
docs: Search Metadata Batch 04
2022-09-15 14:30:09 -05:00
Jeff Boruszak
72e53c7698
Apply suggestions from code review
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
Co-authored-by: Luke Kysow <1034429+lkysow@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-09-15 14:29:34 -05:00
Jeff Boruszak
2b171fc893
Apply suggestions from code review
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-09-15 13:58:47 -05:00
Blake Covarrubias
25cfe31507
docs: Fix spelling errors on website ( #14634 )
2022-09-15 09:03:12 -07:00
Bryce Kalow
85c1a33c42
website: content updates for developer ( #14419 )
...
Co-authored-by: Ashlee Boyer <ashlee.boyer@hashicorp.com>
Co-authored-by: Ashlee M Boyer <43934258+ashleemboyer@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: HashiBot <62622282+hashibot-web@users.noreply.github.com>
Co-authored-by: Kevin Wang <kwangsan@gmail.com>
2022-09-14 17:45:42 -05:00
Evan Culver
d0416f593c
connect: Bump latest Envoy to 1.23.1 in test matrix ( #14573 )
2022-09-14 13:20:16 -07:00
DanStough
0150e88200
feat: add PeerThroughMeshGateways to mesh config
2022-09-13 17:19:54 -04:00
boruszak
2b69d809ce
/docs/connect/config-entries
2022-09-13 16:04:13 -05:00
boruszak
38fd65bb2c
/docs/connect/proxies
2022-09-13 15:58:57 -05:00
boruszak
ebcb557ebf
/docs/connect/gateways/mesh-gateways
2022-09-13 15:55:24 -05:00
boruszak
f60da88228
/docs/connect/gateways
2022-09-13 15:52:02 -05:00
boruszak
76f044d7a3
/connect/cluster-peering
2022-09-13 15:50:15 -05:00
boruszak
653cfb431d
/docs/connect
2022-09-13 15:48:39 -05:00
boruszak
2b122dd262
/docs/connect/observability
2022-09-13 15:34:10 -05:00
boruszak
b79fb73468
/docs/connect/ca
2022-09-13 15:30:45 -05:00
boruszak
df9702f9d1
/docs/connect/l7-traffic
2022-09-13 15:26:51 -05:00
boruszak
4b6fef4c97
/docs/connect/native
2022-09-13 15:24:43 -05:00
boruszak
f76983f1fb
/docs/connect/registration
2022-09-13 15:22:38 -05:00
cskh
f22685b969
Config-entry: Support proxy config in service-defaults ( #14395 )
...
* Config-entry: Support proxy config in service-defaults
* Update website/content/docs/connect/config-entries/service-defaults.mdx
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-12 10:41:58 -04:00
Eric Haberkorn
45a5f28a60
Update the service resolver documentation to include cluster peering failover and redirects ( #14513 )
...
Update the service resolver documentation to include cluster peering failover and redirects
2022-09-09 16:57:23 -04:00
Tu Nguyen
110139a4df
revert links to learn
2022-09-06 08:35:01 -07:00
trujillo-adam
61291ef9c5
Docs cni plugin ( #14009 )
...
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-01 16:22:11 -07:00
DanStough
e617e7df3e
feat(cli): add initial peering cli commands
2022-09-01 17:20:13 -04:00
David Yu
e36650c49c
docs: minor changes to cluster peering k8s docs and typos ( #14442 )
...
* docs: minor changes to cluster peering k8s docs and typos
2022-09-01 10:10:32 -07:00
malizz
b3ac8f48ca
Add additional parameters to envoy passive health check config ( #14238 )
...
* draft commit
* add changelog, update test
* remove extra param
* fix test
* update type to account for nil value
* add test for custom passive health check
* update comments and tests
* update description in docs
* fix missing commas
2022-09-01 09:59:11 -07:00
Chris S. Kim
e62f830fa8
Merge pull request #13998 from jorgemarey/f-new-tracing-envoy
...
Add new envoy tracing configuration
2022-09-01 08:57:23 -04:00
Jorge Marey
f476a80aa9
Fix typo on documentation
2022-08-31 23:14:25 +02:00
Tu Nguyen
c94f8c26c2
Merge branch 'main' into dev-portal
2022-08-31 11:21:14 -07:00
Chris S. Kim
e12a13d277
Fix code example
2022-08-31 12:11:15 -04:00
Thomas Kula
436bc8f3e3
Typo fix in service-splitter.mdx
2022-08-30 17:51:17 -07:00
Jorge Marey
3f3bb8831e
Fix typos. Add test. Add documentation
2022-08-30 16:59:02 +02:00
David Yu
e6b63221eb
docs: Cluster peering with Transparent Proxy updates ( #14369 )
...
* Update Cluster Peering docs to show example with Transparent Proxy
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-29 13:07:08 -07:00
Tu Nguyen
04d66e78c3
Merge branch 'dev-portal' into replace-references-to-learn
2022-08-28 19:34:45 -07:00
Tu Nguyen
f06348c73e
fix merge conflicts
2022-08-28 19:33:37 -07:00
Tu Nguyen
e00e0666ca
Replace references to Learn
2022-08-25 23:05:08 -07:00
Tu Nguyen
6dcc2a2110
Update Learn links in prep for devdot
2022-08-25 22:49:29 -07:00
Evan Culver
8e6b6a49a2
docs: Update Envoy support matrix to match the code ( #14338 )
2022-08-24 17:04:26 -07:00
DanStough
ca228aad8d
doc: tproxy destination fixes
2022-08-24 11:31:05 -04:00
twunderlich-grapl
bb35a8303d
Clarify docs around using either Consul or Vault managed PKI paths ( #13295 )
...
* Clarify docs around using either Consul or Vault managed PKI paths
The current docs can be misread to indicate that you need both the
Consul and Vault managed PKI Paths policies. The [Learning Tutorial](https://learn.hashicorp.com/tutorials/consul/vault-pki-consul-connect-ca?in=consul/vault-secure#create-vault-policies )
is clearer. This tries to make the original docs as clear as the
learning tutorial
* Clarify that PKI secret engines are used to store certs
Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com>
2022-08-23 17:06:00 -07:00
Rosemary Wang
8d6b73aed0
Clarify transparent proxy documentation ( #14301 )
...
* Clarify transparent proxy documentation
Some confusion over known limitations for transparent proxy, specifically over federation versus cluster peering.
Updated `KubeDNS` to Kubernetes DNS for consistency with Kubernetes documentation.
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-08-23 14:52:03 -07:00
Ashwin Venkatesh
24a3975494
Updates docs for CRDs ( #14267 )
...
Co-authored-by: NicoletaPopoviciu <nicoleta@hashicorp.com>
2022-08-23 15:14:36 -04:00
cskh
527ebd068a
fix: missing MaxInboundConnections field in service-defaults config entry ( #14072 )
...
* fix: missing max_inbound_connections field in merge config
2022-08-19 14:11:21 -04:00
Nitya Dhanushkodi
550dd08e52
peering: update docs with exposing servers ( #14191 )
2022-08-12 11:22:41 -07:00
David Yu
ada3dc9c19
docs: bumping requirements for cluster peering to consul k8s 0.47.0 and 1.13.1 ( #14177 )
2022-08-12 09:00:04 -07:00
Tu Nguyen
4ed74dd513
Merge pull request #14126 from hashicorp/ashwin/recreate-token-docs
...
Add docs to recreate peering token.
2022-08-10 15:29:20 -07:00
boruszak
6ce3669b82
Blank commit
2022-08-10 16:54:42 -05:00
Ashwin Venkatesh
156fbcbc0c
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 16:53:45 -04:00
Evan Culver
7bec405070
docs: Update supported Envoy versions ( #14130 )
2022-08-10 11:57:09 -07:00
Ashwin Venkatesh
15bd40ffc2
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 14:28:02 -04:00
Ashwin Venkatesh
3286a60a5f
Add docs to recreate peering token.
2022-08-10 13:14:36 -04:00
Jeff Boruszak
26dff8e493
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 10:21:26 -05:00
Jeff Boruszak
e940842476
Update website/content/docs/connect/cluster-peering/index.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 10:21:20 -05:00
boruszak
c5865d982e
Not available on HCP Consul update
2022-08-10 09:48:18 -05:00
Jeff Boruszak
477b8f1e84
Merge pull request #14011 from hashicorp/docs/cluster-peering-beta
...
docs: Cluster Peering beta
2022-08-09 13:24:49 -05:00
boruszak
1d184a0843
Fixes
2022-08-09 10:09:53 -05:00
boruszak
b7c94abbb7
Merge branch 'docs/cluster-peering-beta' of github.com:hashicorp/consul into docs/cluster-peering-beta
2022-08-09 09:47:19 -05:00
boruszak
fa462915c9
Addt'l fixes
2022-08-09 09:42:22 -05:00
boruszak
166c95e40f
Fixes according to Freddy's review/comments
2022-08-09 09:42:01 -05:00
Jeff Boruszak
fc010e3fe2
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:25:45 -05:00
Jeff Boruszak
c3bebf80ce
Update website/content/docs/connect/cluster-peering/index.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:10:34 -05:00
boruszak
9c2d7fb268
WAN Federation/Cluster Peering comparison table addition
2022-08-09 09:07:25 -05:00
Jeff Boruszak
b019ce6e62
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:02:33 -05:00
Jeff Boruszak
6840861a17
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:02:16 -05:00
Jeff Boruszak
77e4a5f3c4
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:02:05 -05:00
Jeff Boruszak
31434093f1
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:01:42 -05:00
Chris S. Kim
ce316568c9
Update wording on intentions
2022-08-09 10:01:30 -04:00
Jeff Boruszak
2274f35c89
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:01:27 -05:00
boruszak
7854b6edc9
Delete peering UI instructions
2022-08-09 08:53:03 -05:00
Tu Nguyen
407147b2e6
Fixed rendering
2022-08-08 16:40:14 -07:00
Chris S. Kim
e27d1eb12c
Update docs for peered transparent proxy
2022-08-08 18:33:57 -04:00
boruszak
f0c916479b
UI instructions
2022-08-08 16:32:38 -05:00
boruszak
c972f0ea04
Add peering connection UI iinitial commit.
2022-08-08 15:34:28 -05:00
Dhia Ayachi
2d5425e023
add config parameters doc for destination in service-defaults ( #13950 )
...
* add config parameters doc for destination in service-defaults
* add destination config example
* add documentations around tgateway config
* Apply suggestions from code review
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
* Apply suggestions from code review
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
* fix based on comments
* fix typo
* fix code tab array
* fix yaml description for addresses and port
* do not split yaml and hcl when the description is the same
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
2022-08-08 16:28:37 -04:00
boruszak
3ec5d8a9b1
Added info about Consul server config requirements
2022-08-08 15:09:12 -05:00
boruszak
017a94c0b6
Minor edit
2022-08-02 16:25:13 -05:00
boruszak
8d676619b3
Proofing edits
2022-08-02 16:20:43 -05:00
boruszak
6c5d4df590
Proofing edits
2022-08-02 16:01:22 -05:00
boruszak
0e349ad6aa
New features/functions list
2022-08-02 15:17:09 -05:00
boruszak
8f45d8347f
New "Mesh Gateways for Peered Clusters" page
2022-08-02 15:09:00 -05:00
boruszak
c798db392d
Initial new features commit
2022-08-02 14:26:20 -05:00
boruszak
0d62ad8923
Proofing updates & adjustments
2022-08-01 14:43:10 -05:00
boruszak
3ada8ac95b
Updated functionality + task instructions
2022-08-01 14:28:50 -05:00
boruszak
6aaf674396
Beta release constraints updated
2022-08-01 10:43:38 -05:00
boruszak
4fcfea8be2
Update "technical preview" to "beta"
2022-08-01 10:30:36 -05:00
Krastin Krastev
25b6148aa8
Merge branch 'main' into krastin/docs/sidecarservice-typo
2022-07-21 10:51:39 +03:00
Jared Kirschner
281892ab7c
Merge pull request #13405 from hashicorp/jkirschner-hashicorp-patch-3
...
docs: correct Vault CA multiple namespace support
2022-07-20 17:52:32 -04:00
Krastin Krastev
49ac06a51e
docs: clean-up expanded service def
2022-07-18 13:45:59 +03:00
boruszak
9ba349de8c
Clarification around "peering_token.json" and adding Partition names
2022-07-07 16:10:21 -05:00
boruszak
759f5a2bf5
"<service-name" fix - added brackets
2022-07-07 10:08:53 -05:00
David Yu
8552d875ae
docs: add controller to cluster peering docs ( #13639 )
...
* docs: add controller to cluster peering docs
2022-06-29 11:08:37 -07:00
Tu Nguyen
214495f2a2
Fix typo in cluster peering docs ( #13574 )
...
* Fix typo in cluster peering docs
* Remove highlight, update curly quotes
2022-06-28 15:54:57 -07:00
Matt Keeler
a3a4495e78
Clarify the wording of the peering limitations in the preview ( #13590 )
2022-06-24 09:58:31 -04:00
David Yu
4d9922c1e4
docs: add indent to code block config tab to align with other branches ( #13573 )
2022-06-23 08:38:36 -07:00
David Yu
a0b94d9a3a
docs: add Core requirements to cluster peering k8s docs ( #13569 )
...
* docs: add Core requirements to cluster peering k8s docs
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-22 19:12:08 -07:00
Tu Nguyen
81c1092531
Merge pull request #13433 from hashicorp/docs-cluster-peering-technical-preview
...
docs: Cluster Peering for OSS Technical Preview
2022-06-22 00:10:11 -07:00
David Yu
5469fa6d3f
Update website/content/docs/connect/cluster-peering/k8s.mdx
2022-06-21 16:34:45 -07:00
Tu Nguyen
3c6a20f436
Apply suggestions from code review
2022-06-21 16:31:49 -07:00
David Yu
3124a9245b
adding fixes
2022-06-21 16:27:06 -07:00
Tu Nguyen
63d5f90832
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-06-21 16:21:29 -07:00
Tu Nguyen
5936a61de4
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
2022-06-21 16:15:34 -07:00
Tu Nguyen
58c7197e58
Apply suggestions from code review
...
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-21 16:13:39 -07:00
Tu Nguyen
1ead8fac2c
Merge pull request #13448 from hashicorp/docs-cluster-peering-k8s-technical-preview
...
docs: Cluster Peering for Kubernetes Technical Preview
2022-06-21 10:18:13 -07:00
Jeff Boruszak
e2497a3f5a
Apply suggestions from code review
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-20 15:28:50 -05:00
Freddy
1b2df5388c
Additional service mesh docs updates for peering ( #13464 )
...
This PR covers two sets of changes:
- Documenting the new `destination_peer` for proxy upstream definitions.
- Updating the exported-services config entry documentation.
Updates to the `exported-services` config entry include:
- As of 1.13.0 it is no longer only for Consul Enterprise
- A `PeerName` is now a possible consumer for an exported service.
- Added examples for OSS and Enterprise
- Linked to peering docs
2022-06-17 18:40:38 -06:00
Jeff Boruszak
ccbe00e469
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
2022-06-17 12:35:35 -05:00
Jeff Boruszak
5062e89651
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-17 12:31:11 -05:00
Chris S. Kim
c66edb8af5
Update docs with Source.Peer field ( #13463 )
2022-06-16 09:30:05 -04:00
Jeff Boruszak
da72911ba7
Additional consistency edits
2022-06-15 16:25:57 -05:00
Jeff Boruszak
b9917285ea
Apply suggestions from code review
...
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-06-15 16:15:03 -05:00
Jeff Boruszak
611ad5016e
Update website/content/docs/connect/cluster-peering/index.mdx
2022-06-15 14:26:40 -05:00
Jeff Boruszak
40e5d8b0ae
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-15 14:23:18 -05:00
boruszak
3e21f554ef
Limitations -> Constraints
2022-06-15 14:21:58 -05:00
Jeff Boruszak
e79aa5474f
Apply suggestions from code review
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-15 14:19:03 -05:00
boruszak
2bc2f08d1d
typo fix
2022-06-15 14:08:34 -05:00
boruszak
ef4d603972
Switch fronend-service and backend-service
2022-06-15 14:07:56 -05:00
Jeff Boruszak
96fb08ef61
Apply suggestions from code review
2022-06-15 14:04:52 -05:00
Jeff Boruszak
e1277973aa
Apply suggestions from code review
...
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-15 14:01:34 -05:00
Jeff Boruszak
fd81c4a412
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-06-15 13:56:55 -05:00
boruszak
e1b3cfc9a9
peering_token.json addition
2022-06-15 13:55:53 -05:00
Jared Kirschner
2743c1b950
Merge branch 'main' into jkirschner-hashicorp-patch-3
2022-06-15 00:06:40 -04:00
Jeff Boruszak
993cd2f3bc
Apply suggestions from code review
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-14 17:34:21 -05:00
Evan Culver
7f8c650d61
connect: Use Envoy 1.22.2 instead of 1.22.1 ( #13444 )
2022-06-14 15:29:41 -07:00
Jeff Boruszak
034861119a
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-14 17:29:30 -05:00
Jeff Boruszak
811674d526
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
2022-06-14 17:28:06 -05:00
Jeff Boruszak
92d655e83d
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-06-14 17:27:03 -05:00
Jeff Boruszak
f0737c97dd
Update website/content/docs/connect/cluster-peering/index.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-06-14 17:23:07 -05:00
boruszak
3141469ef7
Cluster Peering on Kubernetes page creation
2022-06-14 17:15:14 -05:00
boruszak
b8ad96b516
Removing k8s updates on this branch
2022-06-14 17:12:45 -05:00
boruszak
740246797b
<CodeBlockConfig> fixes
2022-06-14 16:58:07 -05:00
boruszak
c5b5a6ee76
Code Block fixes
2022-06-14 16:55:25 -05:00
boruszak
923b7d0db6
Cluster Peering on Kubernetes initial draft
2022-06-14 16:33:29 -05:00
boruszak
be152b25c4
Cluster Peering on Kubernetes page creation
2022-06-14 16:15:57 -05:00
Evan Culver
ba6136eb42
connect: Update Envoy support matrix to latest patch releases ( #13431 )
2022-06-14 13:19:09 -07:00
Jeff Boruszak
fb916e999b
Fixing double-ticks `
2022-06-14 10:00:22 -05:00
boruszak
084dc1c6e5
Removing Kubernetes page - will submit separate PR for timing reason
2022-06-13 16:47:47 -05:00
boruszak
b0430df680
Typo fix
2022-06-13 16:42:29 -05:00
boruszak
61f60ceb4f
Create and Manage Peering Connections additional fixes
2022-06-13 16:38:44 -05:00
boruszak
ebe0f5408d
What is Cluster Peering? additional fixes
2022-06-13 16:06:29 -05:00
boruszak
0ddcd78ec1
Create and Manage Peering Connections page
2022-06-13 14:24:02 -05:00
boruszak
de4f9bcf4a
What is Cluster Peering? additional fixes
2022-06-13 13:41:57 -05:00
boruszak
4fd06dff17
What is Cluster Peering? page
2022-06-13 13:31:13 -05:00
boruszak
bb972974cb
Initial page creation
2022-06-13 12:58:16 -05:00
Jared Kirschner
a9c3eebd00
docs: correct Vault CA multiple namespace support
2022-06-08 17:50:56 -04:00
Mark Anderson
ce75f486ed
yUpdate website/content/docs/connect/ca/vault.mdx
...
Port some changes that were made to the backport branch but not in the original PR.
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-31 20:22:12 -07:00
Blake Covarrubias
9378880c42
docs: Remove unnecessary use of CodeBlockConfig ( #12974 )
...
Remove empty CodeBlockConfig elements. These elements are not
providing any benefit for the enclosed code blocks. This PR removes
the elements so so that the source is easier to read.
2022-05-11 15:37:02 -07:00
Blake Covarrubias
8edee753d1
docs: Fix spelling errors across site ( #12973 )
2022-05-10 07:28:33 -07:00
Mark Anderson
7eda81d00d
Update website/content/docs/connect/config-entries/mesh.mdx ( #12943 )
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-05-05 10:39:53 -07:00
Mark Anderson
c6ff4ba7d8
Support vault namespaces in connect CA ( #12904 )
...
* Support vault namespaces in connect CA
Follow on to some missed items from #12655
From an internal ticket "Support standard "Vault namespace in the
path" semantics for Connect Vault CA Provider"
Vault allows the namespace to be specified as a prefix in the path of
a PKI definition, but our usage of the Vault API includes calls that
don't support a namespaced key. In particular the sys.* family of
calls simply appends the key, instead of prefixing the namespace in
front of the path.
Unfortunately it is difficult to reliably parse a path with a
namespace; only vault knows what namespaces are present, and the '/'
separator can be inside a key name, as well as separating path
elements. This is in use in the wild; for example
'dc1/intermediate-key' is a relatively common naming schema.
Instead we add two new fields: RootPKINamespace and
IntermediatePKINamespace, which are the absolute namespace paths
'prefixed' in front of the respective PKI Paths.
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-04 19:41:55 -07:00
Mark Anderson
05dc5a26b7
Docs and changelog edits
...
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-04 08:50:59 -07:00
Mark Anderson
d7e7cb09dc
Add some docs
...
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-04 08:50:58 -07:00
Blake Covarrubias
54119f3225
docs: Add example Envoy escape hatch configs ( #12764 )
...
Add example escape hatch configurations for all supported override
types.
2022-05-02 11:25:59 -07:00
Karl Cardenas
142c0ac419
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-04-26 13:12:53 -07:00
Karl Cardenas
e0e2b7b547
docs: updated connect docs and re-deploying missed changes
2022-04-25 10:04:06 -07:00
David Yu
d08b5a1832
docs: remove 1.9.x row in Envoy compatibility matrix ( #12828 )
2022-04-20 19:35:06 -07:00
Evan Culver
000d0621b4
connect: Add Envoy 1.22 to integration tests, remove Envoy 1.18 ( #12805 )
...
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
2022-04-18 09:36:07 -07:00
Evan Culver
881e17fae1
connect: Add Envoy 1.21.1 to support matrix, remove 1.17.4 ( #12777 )
2022-04-14 10:44:42 -07:00
Natalie Smith
0a51e145c1
docs: simplify agent docs slugs
2022-04-11 17:38:47 -07:00
Natalie Smith
ddae7d18a2
docs: fix external links to agent config pages
2022-04-11 17:38:11 -07:00
R.B. Boyer
25ba9c147a
xds: ensure that all connect timeout configs can apply equally to tproxy direct dial connections ( #12711 )
...
Just like standard upstreams the order of applicability in descending precedence:
1. caller's `service-defaults` upstream override for destination
2. caller's `service-defaults` upstream defaults
3. destination's `service-resolver` ConnectTimeout
4. system default of 5s
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-04-07 16:58:21 -05:00
Kyle Havlovitz
6cf22a5cef
Merge pull request #12672 from hashicorp/tgate-san-validation
...
Respect SNI with terminating gateways and log a warning if it isn't set alongside TLS
2022-04-05 11:15:59 -07:00
Blake Covarrubias
79144dbac6
docs: Update links to K8s service mesh annotations ( #12652 )
...
The list of supported annotations for Consul service mesh were moved
from /docs/k8s/connect to /docs/k8s/annotations-and-labels in PR
#12323 .
This commit updates various across the site to point to the new
URL for these annotations.
2022-04-04 14:35:07 -07:00
Kyle Havlovitz
1a3b885027
Use the GatewayService SNI field for upstream SAN validation
2022-03-31 13:54:25 -07:00
Kyle Havlovitz
51527907ab
Recommend SNI with TLS in the terminating gateway docs
2022-03-31 12:19:16 -07:00