mirror of https://github.com/hashicorp/consul
docs updates - cluster peering and virtual services (#18069)
* Update route-to-virtual-services.mdx * Update establish-peering.mdxpull/18088/head^2
parent
a30ba335b6
commit
bfb921229d
|
@ -41,7 +41,7 @@ Refer to the following example Helm configuration:
|
|||
```yaml
|
||||
global:
|
||||
name: consul
|
||||
image: "hashicorp/consul:1.14.1"
|
||||
image: "hashicorp/consul:1.16.0"
|
||||
peering:
|
||||
enabled: true
|
||||
tls:
|
||||
|
|
|
@ -48,7 +48,7 @@ After you provision a Kubernetes cluster and set up your kubeconfig file to mana
|
|||
$ export CLUSTER2_CONTEXT=<CONTEXT for second Kubernetes cluster>
|
||||
```
|
||||
|
||||
### Update the Helm chart
|
||||
### Install Consul using Helm and configure peering over mesh gateways
|
||||
|
||||
To use cluster peering with Consul on Kubernetes deployments, update the Helm chart with [the required values](/consul/docs/k8s/connect/cluster-peering/tech-specs#helm-requirements). After updating the Helm chart, you can use the `consul-k8s` CLI to apply `values.yaml` to each cluster.
|
||||
|
||||
|
@ -59,7 +59,7 @@ To use cluster peering with Consul on Kubernetes deployments, update the Helm ch
|
|||
```
|
||||
|
||||
```shell-session
|
||||
$ helm install ${HELM_RELEASE_NAME1} hashicorp/consul --create-namespace --namespace consul --version "1.0.1" --values values.yaml --set global.datacenter=dc1 --kube-context $CLUSTER1_CONTEXT
|
||||
$ helm install ${HELM_RELEASE_NAME1} hashicorp/consul --create-namespace --namespace consul --version "1.2.0" --values values.yaml --set global.datacenter=dc1 --kube-context $CLUSTER1_CONTEXT
|
||||
```
|
||||
|
||||
1. In `cluster-02`, run the following commands:
|
||||
|
@ -69,9 +69,11 @@ To use cluster peering with Consul on Kubernetes deployments, update the Helm ch
|
|||
```
|
||||
|
||||
```shell-session
|
||||
$ helm install ${HELM_RELEASE_NAME2} hashicorp/consul --create-namespace --namespace consul --version "1.0.1" --values values.yaml --set global.datacenter=dc2 --kube-context $CLUSTER2_CONTEXT
|
||||
$ helm install ${HELM_RELEASE_NAME2} hashicorp/consul --create-namespace --namespace consul --version "1.2.0" --values values.yaml --set global.datacenter=dc2 --kube-context $CLUSTER2_CONTEXT
|
||||
```
|
||||
|
||||
1. For both clusters apply the `Mesh` configuration entry values provided in [Mesh Gateway Specifications](/consul/docs/k8s/connect/cluster-peering/tech-specs#mesh-gateway-specifications) to allow establishing peering connections over mesh gateways.
|
||||
|
||||
### Configure the mesh gateway mode for traffic between services
|
||||
|
||||
In Kubernetes deployments, you can configure mesh gateways to use `local` mode so that a service dialing a service in a remote peer dials the remote mesh gateway instead of the local mesh gateway. To configure the mesh gateway mode so that this traffic always leaves through the local mesh gateway, you can use the `ProxyDefaults` CRD.
|
||||
|
|
|
@ -18,7 +18,7 @@ Complete the following steps to configure failover service instances in Consul o
|
|||
|
||||
## Requirements
|
||||
|
||||
- `consul-k8s` v1.2.0-beta1 or newer.
|
||||
- `consul-k8s` v1.2.0 or newer.
|
||||
- Consul service mesh must be enabled. Refer to [How does Consul Service Mesh Work on Kubernetes](/consul/docs/k8s/connect).
|
||||
- Proxies must be configured to run in transparent proxy mode.
|
||||
- To query virtual DNS names, you must use Consul DNS.
|
||||
|
|
|
@ -20,7 +20,7 @@ Complete the following steps to configure failover service instances in Consul o
|
|||
|
||||
## Requirements
|
||||
|
||||
- `consul-k8s` v1.2.0-beta1 or newer.
|
||||
- `consul-k8s` v1.2.0 or newer.
|
||||
- Consul service mesh must be enabled. Refer to [How does Consul service mesh work on Kubernetes](/consul/docs/k8s/connect).
|
||||
- Proxies must be configured to run in transparent proxy mode.
|
||||
- To query virtual DNS names, you must use Consul DNS.
|
||||
|
|
Loading…
Reference in New Issue