boruszak
2b122dd262
/docs/connect/observability
2022-09-13 15:34:10 -05:00
boruszak
b79fb73468
/docs/connect/ca
2022-09-13 15:30:45 -05:00
boruszak
df9702f9d1
/docs/connect/l7-traffic
2022-09-13 15:26:51 -05:00
boruszak
4b6fef4c97
/docs/connect/native
2022-09-13 15:24:43 -05:00
boruszak
f76983f1fb
/docs/connect/registration
2022-09-13 15:22:38 -05:00
cskh
f22685b969
Config-entry: Support proxy config in service-defaults ( #14395 )
...
* Config-entry: Support proxy config in service-defaults
* Update website/content/docs/connect/config-entries/service-defaults.mdx
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-12 10:41:58 -04:00
Eric Haberkorn
45a5f28a60
Update the service resolver documentation to include cluster peering failover and redirects ( #14513 )
...
Update the service resolver documentation to include cluster peering failover and redirects
2022-09-09 16:57:23 -04:00
Tu Nguyen
110139a4df
revert links to learn
2022-09-06 08:35:01 -07:00
trujillo-adam
61291ef9c5
Docs cni plugin ( #14009 )
...
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-01 16:22:11 -07:00
DanStough
e617e7df3e
feat(cli): add initial peering cli commands
2022-09-01 17:20:13 -04:00
David Yu
e36650c49c
docs: minor changes to cluster peering k8s docs and typos ( #14442 )
...
* docs: minor changes to cluster peering k8s docs and typos
2022-09-01 10:10:32 -07:00
malizz
b3ac8f48ca
Add additional parameters to envoy passive health check config ( #14238 )
...
* draft commit
* add changelog, update test
* remove extra param
* fix test
* update type to account for nil value
* add test for custom passive health check
* update comments and tests
* update description in docs
* fix missing commas
2022-09-01 09:59:11 -07:00
Chris S. Kim
e62f830fa8
Merge pull request #13998 from jorgemarey/f-new-tracing-envoy
...
Add new envoy tracing configuration
2022-09-01 08:57:23 -04:00
Jorge Marey
f476a80aa9
Fix typo on documentation
2022-08-31 23:14:25 +02:00
Tu Nguyen
c94f8c26c2
Merge branch 'main' into dev-portal
2022-08-31 11:21:14 -07:00
Chris S. Kim
e12a13d277
Fix code example
2022-08-31 12:11:15 -04:00
Thomas Kula
436bc8f3e3
Typo fix in service-splitter.mdx
2022-08-30 17:51:17 -07:00
Jorge Marey
3f3bb8831e
Fix typos. Add test. Add documentation
2022-08-30 16:59:02 +02:00
David Yu
e6b63221eb
docs: Cluster peering with Transparent Proxy updates ( #14369 )
...
* Update Cluster Peering docs to show example with Transparent Proxy
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-29 13:07:08 -07:00
Tu Nguyen
04d66e78c3
Merge branch 'dev-portal' into replace-references-to-learn
2022-08-28 19:34:45 -07:00
Tu Nguyen
f06348c73e
fix merge conflicts
2022-08-28 19:33:37 -07:00
Tu Nguyen
e00e0666ca
Replace references to Learn
2022-08-25 23:05:08 -07:00
Tu Nguyen
6dcc2a2110
Update Learn links in prep for devdot
2022-08-25 22:49:29 -07:00
Evan Culver
8e6b6a49a2
docs: Update Envoy support matrix to match the code ( #14338 )
2022-08-24 17:04:26 -07:00
DanStough
ca228aad8d
doc: tproxy destination fixes
2022-08-24 11:31:05 -04:00
twunderlich-grapl
bb35a8303d
Clarify docs around using either Consul or Vault managed PKI paths ( #13295 )
...
* Clarify docs around using either Consul or Vault managed PKI paths
The current docs can be misread to indicate that you need both the
Consul and Vault managed PKI Paths policies. The [Learning Tutorial](https://learn.hashicorp.com/tutorials/consul/vault-pki-consul-connect-ca?in=consul/vault-secure#create-vault-policies )
is clearer. This tries to make the original docs as clear as the
learning tutorial
* Clarify that PKI secret engines are used to store certs
Co-authored-by: Blake Covarrubias <blake.covarrubias@gmail.com>
2022-08-23 17:06:00 -07:00
Rosemary Wang
8d6b73aed0
Clarify transparent proxy documentation ( #14301 )
...
* Clarify transparent proxy documentation
Some confusion over known limitations for transparent proxy, specifically over federation versus cluster peering.
Updated `KubeDNS` to Kubernetes DNS for consistency with Kubernetes documentation.
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-08-23 14:52:03 -07:00
Ashwin Venkatesh
24a3975494
Updates docs for CRDs ( #14267 )
...
Co-authored-by: NicoletaPopoviciu <nicoleta@hashicorp.com>
2022-08-23 15:14:36 -04:00
cskh
527ebd068a
fix: missing MaxInboundConnections field in service-defaults config entry ( #14072 )
...
* fix: missing max_inbound_connections field in merge config
2022-08-19 14:11:21 -04:00
Nitya Dhanushkodi
550dd08e52
peering: update docs with exposing servers ( #14191 )
2022-08-12 11:22:41 -07:00
David Yu
ada3dc9c19
docs: bumping requirements for cluster peering to consul k8s 0.47.0 and 1.13.1 ( #14177 )
2022-08-12 09:00:04 -07:00
Tu Nguyen
4ed74dd513
Merge pull request #14126 from hashicorp/ashwin/recreate-token-docs
...
Add docs to recreate peering token.
2022-08-10 15:29:20 -07:00
boruszak
6ce3669b82
Blank commit
2022-08-10 16:54:42 -05:00
Ashwin Venkatesh
156fbcbc0c
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 16:53:45 -04:00
Evan Culver
7bec405070
docs: Update supported Envoy versions ( #14130 )
2022-08-10 11:57:09 -07:00
Ashwin Venkatesh
15bd40ffc2
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 14:28:02 -04:00
Ashwin Venkatesh
3286a60a5f
Add docs to recreate peering token.
2022-08-10 13:14:36 -04:00
Jeff Boruszak
26dff8e493
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 10:21:26 -05:00
Jeff Boruszak
e940842476
Update website/content/docs/connect/cluster-peering/index.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-08-10 10:21:20 -05:00
boruszak
c5865d982e
Not available on HCP Consul update
2022-08-10 09:48:18 -05:00
Jeff Boruszak
477b8f1e84
Merge pull request #14011 from hashicorp/docs/cluster-peering-beta
...
docs: Cluster Peering beta
2022-08-09 13:24:49 -05:00
boruszak
1d184a0843
Fixes
2022-08-09 10:09:53 -05:00
boruszak
b7c94abbb7
Merge branch 'docs/cluster-peering-beta' of github.com:hashicorp/consul into docs/cluster-peering-beta
2022-08-09 09:47:19 -05:00
boruszak
fa462915c9
Addt'l fixes
2022-08-09 09:42:22 -05:00
boruszak
166c95e40f
Fixes according to Freddy's review/comments
2022-08-09 09:42:01 -05:00
Jeff Boruszak
fc010e3fe2
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:25:45 -05:00
Jeff Boruszak
c3bebf80ce
Update website/content/docs/connect/cluster-peering/index.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:10:34 -05:00
boruszak
9c2d7fb268
WAN Federation/Cluster Peering comparison table addition
2022-08-09 09:07:25 -05:00
Jeff Boruszak
b019ce6e62
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:02:33 -05:00
Jeff Boruszak
6840861a17
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:02:16 -05:00
Jeff Boruszak
77e4a5f3c4
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:02:05 -05:00
Jeff Boruszak
31434093f1
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:01:42 -05:00
Chris S. Kim
ce316568c9
Update wording on intentions
2022-08-09 10:01:30 -04:00
Jeff Boruszak
2274f35c89
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-09 09:01:27 -05:00
boruszak
7854b6edc9
Delete peering UI instructions
2022-08-09 08:53:03 -05:00
Tu Nguyen
407147b2e6
Fixed rendering
2022-08-08 16:40:14 -07:00
Chris S. Kim
e27d1eb12c
Update docs for peered transparent proxy
2022-08-08 18:33:57 -04:00
boruszak
f0c916479b
UI instructions
2022-08-08 16:32:38 -05:00
boruszak
c972f0ea04
Add peering connection UI iinitial commit.
2022-08-08 15:34:28 -05:00
Dhia Ayachi
2d5425e023
add config parameters doc for destination in service-defaults ( #13950 )
...
* add config parameters doc for destination in service-defaults
* add destination config example
* add documentations around tgateway config
* Apply suggestions from code review
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
* Apply suggestions from code review
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
* fix based on comments
* fix typo
* fix code tab array
* fix yaml description for addresses and port
* do not split yaml and hcl when the description is the same
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Dan Stough <dan.stough@hashicorp.com>
2022-08-08 16:28:37 -04:00
boruszak
3ec5d8a9b1
Added info about Consul server config requirements
2022-08-08 15:09:12 -05:00
boruszak
017a94c0b6
Minor edit
2022-08-02 16:25:13 -05:00
boruszak
8d676619b3
Proofing edits
2022-08-02 16:20:43 -05:00
boruszak
6c5d4df590
Proofing edits
2022-08-02 16:01:22 -05:00
boruszak
0e349ad6aa
New features/functions list
2022-08-02 15:17:09 -05:00
boruszak
8f45d8347f
New "Mesh Gateways for Peered Clusters" page
2022-08-02 15:09:00 -05:00
boruszak
c798db392d
Initial new features commit
2022-08-02 14:26:20 -05:00
boruszak
0d62ad8923
Proofing updates & adjustments
2022-08-01 14:43:10 -05:00
boruszak
3ada8ac95b
Updated functionality + task instructions
2022-08-01 14:28:50 -05:00
boruszak
6aaf674396
Beta release constraints updated
2022-08-01 10:43:38 -05:00
boruszak
4fcfea8be2
Update "technical preview" to "beta"
2022-08-01 10:30:36 -05:00
Krastin Krastev
25b6148aa8
Merge branch 'main' into krastin/docs/sidecarservice-typo
2022-07-21 10:51:39 +03:00
Jared Kirschner
281892ab7c
Merge pull request #13405 from hashicorp/jkirschner-hashicorp-patch-3
...
docs: correct Vault CA multiple namespace support
2022-07-20 17:52:32 -04:00
Krastin Krastev
49ac06a51e
docs: clean-up expanded service def
2022-07-18 13:45:59 +03:00
boruszak
9ba349de8c
Clarification around "peering_token.json" and adding Partition names
2022-07-07 16:10:21 -05:00
boruszak
759f5a2bf5
"<service-name" fix - added brackets
2022-07-07 10:08:53 -05:00
David Yu
8552d875ae
docs: add controller to cluster peering docs ( #13639 )
...
* docs: add controller to cluster peering docs
2022-06-29 11:08:37 -07:00
Tu Nguyen
214495f2a2
Fix typo in cluster peering docs ( #13574 )
...
* Fix typo in cluster peering docs
* Remove highlight, update curly quotes
2022-06-28 15:54:57 -07:00
Matt Keeler
a3a4495e78
Clarify the wording of the peering limitations in the preview ( #13590 )
2022-06-24 09:58:31 -04:00
David Yu
4d9922c1e4
docs: add indent to code block config tab to align with other branches ( #13573 )
2022-06-23 08:38:36 -07:00
David Yu
a0b94d9a3a
docs: add Core requirements to cluster peering k8s docs ( #13569 )
...
* docs: add Core requirements to cluster peering k8s docs
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-22 19:12:08 -07:00
Tu Nguyen
81c1092531
Merge pull request #13433 from hashicorp/docs-cluster-peering-technical-preview
...
docs: Cluster Peering for OSS Technical Preview
2022-06-22 00:10:11 -07:00
David Yu
5469fa6d3f
Update website/content/docs/connect/cluster-peering/k8s.mdx
2022-06-21 16:34:45 -07:00
Tu Nguyen
3c6a20f436
Apply suggestions from code review
2022-06-21 16:31:49 -07:00
David Yu
3124a9245b
adding fixes
2022-06-21 16:27:06 -07:00
Tu Nguyen
63d5f90832
Update website/content/docs/connect/cluster-peering/k8s.mdx
...
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-06-21 16:21:29 -07:00
Tu Nguyen
5936a61de4
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
2022-06-21 16:15:34 -07:00
Tu Nguyen
58c7197e58
Apply suggestions from code review
...
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-21 16:13:39 -07:00
Tu Nguyen
1ead8fac2c
Merge pull request #13448 from hashicorp/docs-cluster-peering-k8s-technical-preview
...
docs: Cluster Peering for Kubernetes Technical Preview
2022-06-21 10:18:13 -07:00
Jeff Boruszak
e2497a3f5a
Apply suggestions from code review
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-20 15:28:50 -05:00
Freddy
1b2df5388c
Additional service mesh docs updates for peering ( #13464 )
...
This PR covers two sets of changes:
- Documenting the new `destination_peer` for proxy upstream definitions.
- Updating the exported-services config entry documentation.
Updates to the `exported-services` config entry include:
- As of 1.13.0 it is no longer only for Consul Enterprise
- A `PeerName` is now a possible consumer for an exported service.
- Added examples for OSS and Enterprise
- Linked to peering docs
2022-06-17 18:40:38 -06:00
Jeff Boruszak
ccbe00e469
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
2022-06-17 12:35:35 -05:00
Jeff Boruszak
5062e89651
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-17 12:31:11 -05:00
Chris S. Kim
c66edb8af5
Update docs with Source.Peer field ( #13463 )
2022-06-16 09:30:05 -04:00
Jeff Boruszak
da72911ba7
Additional consistency edits
2022-06-15 16:25:57 -05:00
Jeff Boruszak
b9917285ea
Apply suggestions from code review
...
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-06-15 16:15:03 -05:00
Jeff Boruszak
611ad5016e
Update website/content/docs/connect/cluster-peering/index.mdx
2022-06-15 14:26:40 -05:00
Jeff Boruszak
40e5d8b0ae
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-15 14:23:18 -05:00
boruszak
3e21f554ef
Limitations -> Constraints
2022-06-15 14:21:58 -05:00
Jeff Boruszak
e79aa5474f
Apply suggestions from code review
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-15 14:19:03 -05:00
boruszak
2bc2f08d1d
typo fix
2022-06-15 14:08:34 -05:00
boruszak
ef4d603972
Switch fronend-service and backend-service
2022-06-15 14:07:56 -05:00
Jeff Boruszak
96fb08ef61
Apply suggestions from code review
2022-06-15 14:04:52 -05:00
Jeff Boruszak
e1277973aa
Apply suggestions from code review
...
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-06-15 14:01:34 -05:00
Jeff Boruszak
fd81c4a412
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-06-15 13:56:55 -05:00
boruszak
e1b3cfc9a9
peering_token.json addition
2022-06-15 13:55:53 -05:00
Jared Kirschner
2743c1b950
Merge branch 'main' into jkirschner-hashicorp-patch-3
2022-06-15 00:06:40 -04:00
Jeff Boruszak
993cd2f3bc
Apply suggestions from code review
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-14 17:34:21 -05:00
Evan Culver
7f8c650d61
connect: Use Envoy 1.22.2 instead of 1.22.1 ( #13444 )
2022-06-14 15:29:41 -07:00
Jeff Boruszak
034861119a
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-06-14 17:29:30 -05:00
Jeff Boruszak
811674d526
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
2022-06-14 17:28:06 -05:00
Jeff Boruszak
92d655e83d
Update website/content/docs/connect/cluster-peering/create-manage-peering.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-06-14 17:27:03 -05:00
Jeff Boruszak
f0737c97dd
Update website/content/docs/connect/cluster-peering/index.mdx
...
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-06-14 17:23:07 -05:00
boruszak
3141469ef7
Cluster Peering on Kubernetes page creation
2022-06-14 17:15:14 -05:00
boruszak
b8ad96b516
Removing k8s updates on this branch
2022-06-14 17:12:45 -05:00
boruszak
740246797b
<CodeBlockConfig> fixes
2022-06-14 16:58:07 -05:00
boruszak
c5b5a6ee76
Code Block fixes
2022-06-14 16:55:25 -05:00
boruszak
923b7d0db6
Cluster Peering on Kubernetes initial draft
2022-06-14 16:33:29 -05:00
boruszak
be152b25c4
Cluster Peering on Kubernetes page creation
2022-06-14 16:15:57 -05:00
Evan Culver
ba6136eb42
connect: Update Envoy support matrix to latest patch releases ( #13431 )
2022-06-14 13:19:09 -07:00
Jeff Boruszak
fb916e999b
Fixing double-ticks `
2022-06-14 10:00:22 -05:00
boruszak
084dc1c6e5
Removing Kubernetes page - will submit separate PR for timing reason
2022-06-13 16:47:47 -05:00
boruszak
b0430df680
Typo fix
2022-06-13 16:42:29 -05:00
boruszak
61f60ceb4f
Create and Manage Peering Connections additional fixes
2022-06-13 16:38:44 -05:00
boruszak
ebe0f5408d
What is Cluster Peering? additional fixes
2022-06-13 16:06:29 -05:00
boruszak
0ddcd78ec1
Create and Manage Peering Connections page
2022-06-13 14:24:02 -05:00
boruszak
de4f9bcf4a
What is Cluster Peering? additional fixes
2022-06-13 13:41:57 -05:00
boruszak
4fd06dff17
What is Cluster Peering? page
2022-06-13 13:31:13 -05:00
boruszak
bb972974cb
Initial page creation
2022-06-13 12:58:16 -05:00
Jared Kirschner
a9c3eebd00
docs: correct Vault CA multiple namespace support
2022-06-08 17:50:56 -04:00
Mark Anderson
ce75f486ed
yUpdate website/content/docs/connect/ca/vault.mdx
...
Port some changes that were made to the backport branch but not in the original PR.
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-31 20:22:12 -07:00
Blake Covarrubias
9378880c42
docs: Remove unnecessary use of CodeBlockConfig ( #12974 )
...
Remove empty CodeBlockConfig elements. These elements are not
providing any benefit for the enclosed code blocks. This PR removes
the elements so so that the source is easier to read.
2022-05-11 15:37:02 -07:00
Blake Covarrubias
8edee753d1
docs: Fix spelling errors across site ( #12973 )
2022-05-10 07:28:33 -07:00
Mark Anderson
7eda81d00d
Update website/content/docs/connect/config-entries/mesh.mdx ( #12943 )
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-05-05 10:39:53 -07:00
Mark Anderson
c6ff4ba7d8
Support vault namespaces in connect CA ( #12904 )
...
* Support vault namespaces in connect CA
Follow on to some missed items from #12655
From an internal ticket "Support standard "Vault namespace in the
path" semantics for Connect Vault CA Provider"
Vault allows the namespace to be specified as a prefix in the path of
a PKI definition, but our usage of the Vault API includes calls that
don't support a namespaced key. In particular the sys.* family of
calls simply appends the key, instead of prefixing the namespace in
front of the path.
Unfortunately it is difficult to reliably parse a path with a
namespace; only vault knows what namespaces are present, and the '/'
separator can be inside a key name, as well as separating path
elements. This is in use in the wild; for example
'dc1/intermediate-key' is a relatively common naming schema.
Instead we add two new fields: RootPKINamespace and
IntermediatePKINamespace, which are the absolute namespace paths
'prefixed' in front of the respective PKI Paths.
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-04 19:41:55 -07:00
Mark Anderson
05dc5a26b7
Docs and changelog edits
...
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-04 08:50:59 -07:00
Mark Anderson
d7e7cb09dc
Add some docs
...
Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-04 08:50:58 -07:00
Blake Covarrubias
54119f3225
docs: Add example Envoy escape hatch configs ( #12764 )
...
Add example escape hatch configurations for all supported override
types.
2022-05-02 11:25:59 -07:00
Karl Cardenas
142c0ac419
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-04-26 13:12:53 -07:00
Karl Cardenas
e0e2b7b547
docs: updated connect docs and re-deploying missed changes
2022-04-25 10:04:06 -07:00
David Yu
d08b5a1832
docs: remove 1.9.x row in Envoy compatibility matrix ( #12828 )
2022-04-20 19:35:06 -07:00
Evan Culver
000d0621b4
connect: Add Envoy 1.22 to integration tests, remove Envoy 1.18 ( #12805 )
...
Co-authored-by: R.B. Boyer <rb@hashicorp.com>
2022-04-18 09:36:07 -07:00
Evan Culver
881e17fae1
connect: Add Envoy 1.21.1 to support matrix, remove 1.17.4 ( #12777 )
2022-04-14 10:44:42 -07:00
Natalie Smith
0a51e145c1
docs: simplify agent docs slugs
2022-04-11 17:38:47 -07:00
Natalie Smith
ddae7d18a2
docs: fix external links to agent config pages
2022-04-11 17:38:11 -07:00
R.B. Boyer
25ba9c147a
xds: ensure that all connect timeout configs can apply equally to tproxy direct dial connections ( #12711 )
...
Just like standard upstreams the order of applicability in descending precedence:
1. caller's `service-defaults` upstream override for destination
2. caller's `service-defaults` upstream defaults
3. destination's `service-resolver` ConnectTimeout
4. system default of 5s
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-04-07 16:58:21 -05:00
Kyle Havlovitz
6cf22a5cef
Merge pull request #12672 from hashicorp/tgate-san-validation
...
Respect SNI with terminating gateways and log a warning if it isn't set alongside TLS
2022-04-05 11:15:59 -07:00
Blake Covarrubias
79144dbac6
docs: Update links to K8s service mesh annotations ( #12652 )
...
The list of supported annotations for Consul service mesh were moved
from /docs/k8s/connect to /docs/k8s/annotations-and-labels in PR
#12323 .
This commit updates various across the site to point to the new
URL for these annotations.
2022-04-04 14:35:07 -07:00
Kyle Havlovitz
1a3b885027
Use the GatewayService SNI field for upstream SAN validation
2022-03-31 13:54:25 -07:00
Kyle Havlovitz
51527907ab
Recommend SNI with TLS in the terminating gateway docs
2022-03-31 12:19:16 -07:00
Bryce Kalow
6bf67b7ef4
website: redirect /api to /api-docs ( #12660 )
2022-03-30 16:16:26 -05:00
R.B. Boyer
e79ce8ab03
xds: adding control of the mesh-wide min/max TLS versions and cipher suites from the mesh config entry ( #12601 )
...
- `tls.incoming`: applies to the inbound mTLS targeting the public
listener on `connect-proxy` and `terminating-gateway` envoy instances
- `tls.outgoing`: applies to the outbound mTLS dialing upstreams from
`connect-proxy` and `ingress-gateway` envoy instances
Fixes #11966
2022-03-30 13:43:59 -05:00
R.B. Boyer
ac5bea862a
server: ensure that service-defaults meta is incorporated into the discovery chain response ( #12511 )
...
Also add a new "Default" field to the discovery chain response to clients
2022-03-30 10:04:18 -05:00
Krastin Krastev
6682a0d4be
docs: fix a trailing comma in JSON body
...
removing a comma after a last element in JSON body
2022-03-22 20:36:59 +01:00
David Yu
858e05e7d7
docs: Consul Service Mesh overview - rename of title and K8s getting started ( #12574 )
...
* Consul Service Mesh overview - rename of title and K8s getting started
* reformat lines
2022-03-18 08:55:57 -07:00
Dan Upton
b36d4e16b6
Support per-listener TLS configuration ⚙️ ( #12504 )
...
Introduces the capability to configure TLS differently for Consul's
listeners/ports (i.e. HTTPS, gRPC, and the internal multiplexed RPC
port) which is useful in scenarios where you may want the HTTPS or
gRPC interfaces to present a certificate signed by a well-known/public
CA, rather than the certificate used for internal communication which
must have a SAN in the form `server.<dc>.consul`.
2022-03-18 10:46:58 +00:00
Jacob
ee78b5a380
Update ui-visualization.mdx
2022-03-16 10:08:22 -04:00
mrspanishviking
7180c99960
Revert "[Docs] Agent configuration hierarchy "
2022-03-15 16:13:58 -07:00
trujillo-adam
4151dc097a
fixing merge conflicts part 3
2022-03-15 15:25:03 -07:00
trujillo-adam
9cc9122be8
fixed merge conflicts pt2
2022-03-15 14:01:24 -07:00
trujillo-adam
76d55ac2b4
merging new hierarchy for agent configuration
2022-03-14 15:44:41 -07:00
Kyle Schochenmaier
d6792f14a3
update docs ( #12543 )
2022-03-09 13:24:20 -06:00
Blake Covarrubias
9a0c2dee60
docs: Update Kubernetes YAML examples in UI visualization ( #12419 )
...
* Update Kubernetes related YAML config examples to document supported
syntax in the latest version of the Helm chart.
* Fix syntax in JSON example configs.
Resolves #12403
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-03-03 21:31:57 -08:00
David Yu
e6e168b3e6
docs: Envoy 'compatibility' typo ( #12513 )
2022-03-03 10:50:56 -08:00
David Yu
fb18aa5529
docs: bump Envoy for 1.10.x ( #12472 )
...
* docs: bump Envoy for 1.10.x
* update security notes and remove previous versions older than n-2
Envoy 1.9.0 and older have last vulnerability.
* Update envoy.mdx
* Update envoy.mdx
* Update envoy.mdx
* Update envoy.mdx
* formatting
* Update website/content/docs/connect/proxies/envoy.mdx
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
* Update website/content/docs/connect/proxies/envoy.mdx
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-03-03 10:34:30 -08:00
Luke Kysow
16085d7eee
Update exported-services.mdx ( #12499 )
2022-03-02 15:57:58 -08:00
Eddie Rowe
28c78c52a2
Remove deprecated built-in proxy tutorial reference
2022-03-01 14:35:28 -06:00
Evan Culver
522676ed8d
connect: Update supported Envoy versions to include 1.19.3 and 1.18.6
2022-02-24 16:59:33 -08:00
Evan Culver
b95f010ac0
connect: Upgrade Envoy 1.20 to 1.20.2 ( #12443 )
2022-02-24 16:19:39 -08:00
Karl Cardenas
48c60946f9
docs: added example for service-router retry
2022-02-24 10:52:41 -07:00
Daniel Nephin
12f12d577a
docs: add docs for using an external CA
2022-02-17 18:21:30 -05:00
Karl Cardenas
497e65426f
docs: updated per feedback
2022-02-08 11:02:36 -07:00
Karl Cardenas
52f1ed3c3b
docs: update the wan mesh gateway page
2022-02-08 10:25:27 -07:00
Luke Kysow
ecc5dae06f
docs: update for k8s support for igw and header manip ( #12264 )
...
Add docs now that k8s supports these new config entry fields
2022-02-03 14:03:21 -08:00
Blake Covarrubias
a6f51d8c1b
docs: Fix discrepancy with sidecar min/max port range
...
Remove incorrect sidecar port range on docs for built-in proxy.
Updates the bind_port/port fields on the built-in proxy and sidecar
service registration pages to link to the `sidecar_min_port` and
`sidecar_max_port` configuration options for the defined port range.
Fixes #12253
2022-02-02 20:12:00 -08:00
Dan Upton
c1cb58bdcb
docs: add transparent proxy visual aid ( #12211 )
...
Co-authored-by: Paul Banks <banks@banksco.de>
2022-01-28 10:57:37 +00:00
Luke Kysow
4df488b1d3
Update distributed-tracing.mdx with caveat on 128 bit IDs ( #12196 )
...
* Update distributed-tracing.mdx
2022-01-26 10:39:33 -08:00
David Yu
f4df4c25f2
docs: iptables for TProxy requirement ( #12180 )
...
* docs: iptables
Add iptables requirement
* Update website/content/docs/connect/transparent-proxy.mdx
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
Co-authored-by: Kyle Schochenmaier <kschoche@gmail.com>
2022-01-26 10:18:31 -08:00
Blake Covarrubias
a3ad4be429
docs: Add ingress TLS cipher and version documentation ( #12163 )
...
Document the new TLS cipher and version parameters that were added to
ingress gateways in #11576 .
Co-authored-by: Mike Morris <mikemorris@users.noreply.github.com>
2022-01-26 08:12:12 -08:00
mrspanishviking
f3514d802b
Merge pull request #11980 from krastin/krastin/docsday-ui-viz
...
adding JSON examples to /docs/connect/observability/ui-visualization
2022-01-24 08:42:46 -07:00
Krastin Krastev
8abf4088c1
fixing K8s notes placement in /docs/connect/observability/ui-visualization
2022-01-24 16:35:18 +01:00
Krastin Krastev
65d750a84d
migrating <Tabs> to <CodeTabs> in /docs/connect/observability/ui-visualization
2022-01-24 16:10:03 +01:00
R.B. Boyer
b9e9f1106b
docs: update config entry docs for proxy-defaults to follow new template ( #12011 )
2022-01-20 15:35:27 -06:00
Blake Covarrubias
f09aea524f
Fix spelling errors
2022-01-20 08:54:23 -08:00
Blake Covarrubias
26401c5c26
Convert absolute URLs to relative URLs for consul.io
2022-01-20 08:52:51 -08:00
Blake Covarrubias
59394e4aa2
docs: Avoid redirects by pointing links to new URLs
...
Avoid HTTP redirects for internal site links by updating old URLs to
point to the new location for the target content.
2022-01-20 08:52:51 -08:00
Blake Covarrubias
17f8c311be
docs: Fix typo in service resolver's RingHashConfig
...
Fix typo in documentation for service resolver's RingHashConfig. The
correct child parameters are `MinimumRingSize` and `MaximumRingSize`.
2022-01-19 15:17:53 -08:00
Jared Kirschner
1a615f63a5
Merge pull request #12100 from hashicorp/update-gateway-overview-visual
...
docs: clarify gateways don't connect to public internet
2022-01-18 19:03:32 -05:00
trujillo-adam
9b00acec40
Merge pull request #11898 from hashicorp/docs/service-mesh-config-entries-add-partitions--1.11.0
...
updated configuration entry params for admin partitions 1.11
2022-01-18 15:46:15 -08:00
trujillo-adam
7573b80454
applied final feedback
2022-01-18 15:40:43 -08:00
trujillo-adam
727dbbd817
Apply suggestions from code review
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-01-18 15:31:58 -08:00
Jared Kirschner
3fc42a2f1f
docs: clarify gateways don't connect to internet
...
Consul's ingress and terminating gateways are meant to enable connectivity
within your organizational network between services outside the Consul service
mesh and those within. They are not meant to connect to the public internet.
2022-01-18 13:28:26 -08:00
Evan Culver
e35dd08a63
connect: Upgrade Envoy 1.20 to 1.20.1 ( #11895 )
2022-01-18 14:35:27 -05:00
Jared Kirschner
1ec3a8524f
Merge pull request #12101 from hashicorp/wan-federation-with-mesh-gateways-networking-visual
...
docs: show WAN fed with/without mesh gateways
2022-01-18 09:22:13 -05:00
Jared Kirschner
a0d48e17c0
docs: show WAN fed with/without mesh gateways
2022-01-16 16:55:12 -08:00
Thomas Kula
ae0fe19d2f
docs: Minor grammar change to ingress-gateway.mdx ( #11365 )
...
Use plural form of "listeners", not possessive form of "listener's"
2022-01-14 16:36:02 -08:00
trujillo-adam
ea4bd71fa3
Merge branch 'docs/service-mesh-config-entries-add-partitions--1.11.0' of github.com:hashicorp/consul into docs/service-mesh-config-entries-add-partitions--1.11.0
...
pre and post docs day merge
2022-01-14 11:34:36 -08:00
trujillo-adam
8edc6547df
applying latest round of feedback
2022-01-14 09:51:57 -08:00
Blake Covarrubias
f273cfdc67
docs: Use long form of CLI flags ( #12030 )
...
Use long form of CLI flags in all example commands.
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-01-12 15:05:01 -08:00
Dhia Ayachi
73dd4e66d6
CA certificates relationship HL diagram ( #12022 )
...
* add diagram and text to explain certificates in consul
* use bullet points instead of enumeration
* Apply suggestions from code review
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
* remove non needed text and improve image
* fix cert naming
* move section to the right place
* rename DC
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-12 16:10:00 -05:00
Blake Covarrubias
e3f36ad45c
docs: Fix spelling errors
2022-01-11 09:37:09 -08:00
mrspanishviking
79170d9731
Merge pull request #11983 from hashicorp/resolver_examples
...
docs: added another resolver example for DC and namespace failover
2022-01-11 10:27:57 -07:00
Jasmine W
665c9933ce
Merge pull request #11995 from hashicorp/l7-routing-screenshots
...
Adding UI screenshots to L7 overview
2022-01-11 11:33:20 -05:00
Jasmine W
a5c63acb62
Update website/content/docs/connect/config-entries/service-splitter.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-11 11:18:49 -05:00
Jasmine W
88d752e41e
Update website/content/docs/connect/config-entries/service-router.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-11 11:18:43 -05:00
Jasmine W
8c440d181f
Update website/content/docs/connect/config-entries/service-resolver.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-11 11:18:36 -05:00
Natalie Smith
24c67f2dfa
docs: simplify agent docs slugs
2022-01-10 17:37:18 -08:00
Natalie Smith
00c2444cfc
docs: fix external links to agent config pages
2022-01-10 17:11:50 -08:00
mrspanishviking
66c5c8f2b5
Merge pull request #12016 from hashicorp/Screenshot-Updates
...
Consul UI Screenshot Updates
2022-01-10 18:05:02 -07:00
Xuan Luo
51a77533e4
Merge pull request #12017 from hashicorp/doc-changes
...
Doc changes
2022-01-10 16:33:47 -08:00
Xuan Luo
cf8c005194
updated image
2022-01-10 16:29:32 -08:00
Xuan Luo
b5a046f5b0
docs: add gateway overview illustration
2022-01-10 15:47:57 -08:00
Luke Kysow
31a436bf82
Add distributed tracing docs ( #12010 )
...
* Add distributed tracing docs
2022-01-10 15:43:31 -08:00
Jake Herschman
60cb4a8d36
updated topology image
2022-01-10 18:39:35 -05:00
Amier Chery
17816d5cff
Added images to respective pages
...
Added the images to each respective page on splitting/routing/resolving along with a brief description on how to navigate there.
2022-01-10 18:14:24 -05:00
Jasmine W
0d61d70e3b
Adding UI screenshots to L7 overview
2022-01-10 14:34:00 -05:00
Karl Cardenas
205d687d07
added additonal example for failover within DC and unique namespace
2022-01-10 11:41:43 -07:00
mrspanishviking
b844d68c4b
Apply suggestions from code review
...
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-01-10 11:22:53 -07:00
Karl Cardenas
687f9340f7
removed empty {}
2022-01-10 10:51:00 -07:00
Karl Cardenas
e992522c4c
added another example for DC and namespace failover
2022-01-10 10:45:54 -07:00
Krastin Krastev
d893c9261e
adding JSON examples to /docs/connect/observability/ui-visualization
2022-01-10 17:47:51 +01:00
trujillo-adam
0ac96c7d23
Merge pull request #11930 from hashicorp/docs/admin-partition-updates-1.11.0-misc
...
added line about wildcard intentions not supported for admin partitions
2022-01-10 07:53:58 -08:00
trujillo-adam
d4f9a30927
applied feedback
2022-01-07 15:43:51 -08:00
trujillo-adam
994ef3dfb3
Update website/content/docs/connect/config-entries/mesh.mdx
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-01-07 14:20:43 -08:00
trujillo-adam
2ff5f50e8c
tweaks to the language used in the requirements section
2022-01-05 12:01:10 -08:00
Noel Quiles
1ff6da7cdd
website: Update copy ( #11853 )
2022-01-04 15:29:46 -05:00
trujillo-adam
8852810eb5
added line about wildcard intentions not supported for admin partitions
2022-01-03 15:31:58 -08:00
trujillo-adam
65cb869c5b
proposed language about why there is no <CE>.meta.partition field
2022-01-03 14:40:03 -08:00
trujillo-adam
2f4fae73d1
Merge branch 'docs/service-mesh-config-entries-add-partitions--1.11.0' of github.com:hashicorp/consul into docs/service-mesh-config-entries-add-partitions--1.11.0
...
updating local with GH comments
2022-01-03 11:32:34 -08:00
trujillo-adam
5a25979d0b
Apply suggestions from code review
...
typos and minor corrections
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-01-03 11:32:14 -08:00
saurabh-sp-tripathi
69c19ca9fc
Fix typo, Layer 7 is application layer not network
2021-12-22 15:13:56 -08:00
trujillo-adam
885937c14c
Merge branch 'main' of github.com:hashicorp/consul into docs/service-mesh-config-entries-add-partitions--1.11.0
...
pulling main into the this branch
2021-12-22 13:12:08 -08:00
trujillo-adam
a08f294602
Merge pull request #11859 from hashicorp/docs/service-mesh-gateways-clarification-for-1.11.0
...
clarify mesh gateway docs use cases; include admin partition flow
2021-12-22 11:56:11 -08:00
trujillo-adam
52f429db26
fixed bad md syntax
2021-12-22 11:40:26 -08:00
trujillo-adam
e5b3be0597
applied feedback
2021-12-22 11:18:06 -08:00
trujillo-adam
85e86bd316
updated configuration entry params for admin partitions 1.11
2021-12-20 16:30:39 -08:00
David Yu
bd011ab7b6
docs: ExportedServices YAML correction ( #11883 )
...
* docs: ExportedServices YAML correction
* Add enterprise alert to CRD index
2021-12-17 11:29:10 -08:00
trujillo-adam
300daff089
additional clarification on upstream configurations for x-dc and x-partition traffic
2021-12-17 09:46:50 -08:00
David Yu
40d97ca926
docs: fix ExportedServices typo on example
...
Fix typlo
2021-12-17 09:39:55 -08:00
David Yu
b272e8517d
add enterprise inline
2021-12-16 20:23:03 -08:00
David Yu
72412ca910
docs: add exported services to overview
2021-12-16 20:20:11 -08:00
David Yu
8bcdb6dfa2
docs: ExportedServices CRD typo and change heading for services ( #11845 )
2021-12-15 15:51:24 -08:00
trujillo-adam
bcfff8fde4
clarify mesh gateway docs use cases; include admin partition flow
2021-12-15 13:11:52 -08:00
Chris S. Kim
f76fc6cabe
docs: Update discovery chain compilation results with partition fields ( #11835 )
2021-12-14 15:37:34 -05:00
Kyle Havlovitz
f4010065a7
docs: Update exported-services page to include required Name field
2021-12-14 12:10:30 -08:00
Paul Banks
131897bff6
Merge pull request #11164 from hashicorp/docs/ingress-sds
...
Document SDS for ingress gateways
2021-12-14 17:32:40 +00:00
freddygv
e91509383f
Clean up additional refs to partition exports
2021-12-04 15:16:40 -07:00
freddygv
09cdeae13c
Move exported-services docs based on new name
2021-12-03 17:47:32 -07:00
freddygv
ed6076db26
Rename partition-exports to exported-services
...
Using a name less tied to partitions gives us more flexibility to use
this config entry in OSS for exports between datacenters/meshes.
2021-12-03 17:47:31 -07:00
Paul Banks
1d85afeed4
Reformatting suggestions from review
2021-12-01 15:35:24 +00:00