trujillo-adam
8edc6547df
applying latest round of feedback
2022-01-14 09:51:57 -08:00
Blake Covarrubias
f273cfdc67
docs: Use long form of CLI flags ( #12030 )
...
Use long form of CLI flags in all example commands.
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-01-12 15:05:01 -08:00
Dhia Ayachi
73dd4e66d6
CA certificates relationship HL diagram ( #12022 )
...
* add diagram and text to explain certificates in consul
* use bullet points instead of enumeration
* Apply suggestions from code review
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
* remove non needed text and improve image
* fix cert naming
* move section to the right place
* rename DC
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-12 16:10:00 -05:00
Blake Covarrubias
e3f36ad45c
docs: Fix spelling errors
2022-01-11 09:37:09 -08:00
mrspanishviking
79170d9731
Merge pull request #11983 from hashicorp/resolver_examples
...
docs: added another resolver example for DC and namespace failover
2022-01-11 10:27:57 -07:00
Jasmine W
665c9933ce
Merge pull request #11995 from hashicorp/l7-routing-screenshots
...
Adding UI screenshots to L7 overview
2022-01-11 11:33:20 -05:00
Jasmine W
a5c63acb62
Update website/content/docs/connect/config-entries/service-splitter.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-11 11:18:49 -05:00
Jasmine W
88d752e41e
Update website/content/docs/connect/config-entries/service-router.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-11 11:18:43 -05:00
Jasmine W
8c440d181f
Update website/content/docs/connect/config-entries/service-resolver.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2022-01-11 11:18:36 -05:00
Natalie Smith
24c67f2dfa
docs: simplify agent docs slugs
2022-01-10 17:37:18 -08:00
Natalie Smith
00c2444cfc
docs: fix external links to agent config pages
2022-01-10 17:11:50 -08:00
mrspanishviking
66c5c8f2b5
Merge pull request #12016 from hashicorp/Screenshot-Updates
...
Consul UI Screenshot Updates
2022-01-10 18:05:02 -07:00
Xuan Luo
51a77533e4
Merge pull request #12017 from hashicorp/doc-changes
...
Doc changes
2022-01-10 16:33:47 -08:00
Xuan Luo
cf8c005194
updated image
2022-01-10 16:29:32 -08:00
Xuan Luo
b5a046f5b0
docs: add gateway overview illustration
2022-01-10 15:47:57 -08:00
Luke Kysow
31a436bf82
Add distributed tracing docs ( #12010 )
...
* Add distributed tracing docs
2022-01-10 15:43:31 -08:00
Jake Herschman
60cb4a8d36
updated topology image
2022-01-10 18:39:35 -05:00
Amier Chery
17816d5cff
Added images to respective pages
...
Added the images to each respective page on splitting/routing/resolving along with a brief description on how to navigate there.
2022-01-10 18:14:24 -05:00
Jasmine W
0d61d70e3b
Adding UI screenshots to L7 overview
2022-01-10 14:34:00 -05:00
Karl Cardenas
205d687d07
added additonal example for failover within DC and unique namespace
2022-01-10 11:41:43 -07:00
mrspanishviking
b844d68c4b
Apply suggestions from code review
...
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2022-01-10 11:22:53 -07:00
Karl Cardenas
687f9340f7
removed empty {}
2022-01-10 10:51:00 -07:00
Karl Cardenas
e992522c4c
added another example for DC and namespace failover
2022-01-10 10:45:54 -07:00
Krastin Krastev
d893c9261e
adding JSON examples to /docs/connect/observability/ui-visualization
2022-01-10 17:47:51 +01:00
trujillo-adam
0ac96c7d23
Merge pull request #11930 from hashicorp/docs/admin-partition-updates-1.11.0-misc
...
added line about wildcard intentions not supported for admin partitions
2022-01-10 07:53:58 -08:00
trujillo-adam
d4f9a30927
applied feedback
2022-01-07 15:43:51 -08:00
trujillo-adam
994ef3dfb3
Update website/content/docs/connect/config-entries/mesh.mdx
...
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-01-07 14:20:43 -08:00
trujillo-adam
2ff5f50e8c
tweaks to the language used in the requirements section
2022-01-05 12:01:10 -08:00
Noel Quiles
1ff6da7cdd
website: Update copy ( #11853 )
2022-01-04 15:29:46 -05:00
trujillo-adam
8852810eb5
added line about wildcard intentions not supported for admin partitions
2022-01-03 15:31:58 -08:00
trujillo-adam
65cb869c5b
proposed language about why there is no <CE>.meta.partition field
2022-01-03 14:40:03 -08:00
trujillo-adam
2f4fae73d1
Merge branch 'docs/service-mesh-config-entries-add-partitions--1.11.0' of github.com:hashicorp/consul into docs/service-mesh-config-entries-add-partitions--1.11.0
...
updating local with GH comments
2022-01-03 11:32:34 -08:00
trujillo-adam
5a25979d0b
Apply suggestions from code review
...
typos and minor corrections
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-01-03 11:32:14 -08:00
saurabh-sp-tripathi
69c19ca9fc
Fix typo, Layer 7 is application layer not network
2021-12-22 15:13:56 -08:00
trujillo-adam
885937c14c
Merge branch 'main' of github.com:hashicorp/consul into docs/service-mesh-config-entries-add-partitions--1.11.0
...
pulling main into the this branch
2021-12-22 13:12:08 -08:00
trujillo-adam
a08f294602
Merge pull request #11859 from hashicorp/docs/service-mesh-gateways-clarification-for-1.11.0
...
clarify mesh gateway docs use cases; include admin partition flow
2021-12-22 11:56:11 -08:00
trujillo-adam
52f429db26
fixed bad md syntax
2021-12-22 11:40:26 -08:00
trujillo-adam
e5b3be0597
applied feedback
2021-12-22 11:18:06 -08:00
trujillo-adam
85e86bd316
updated configuration entry params for admin partitions 1.11
2021-12-20 16:30:39 -08:00
David Yu
bd011ab7b6
docs: ExportedServices YAML correction ( #11883 )
...
* docs: ExportedServices YAML correction
* Add enterprise alert to CRD index
2021-12-17 11:29:10 -08:00
trujillo-adam
300daff089
additional clarification on upstream configurations for x-dc and x-partition traffic
2021-12-17 09:46:50 -08:00
David Yu
40d97ca926
docs: fix ExportedServices typo on example
...
Fix typlo
2021-12-17 09:39:55 -08:00
David Yu
b272e8517d
add enterprise inline
2021-12-16 20:23:03 -08:00
David Yu
72412ca910
docs: add exported services to overview
2021-12-16 20:20:11 -08:00
David Yu
8bcdb6dfa2
docs: ExportedServices CRD typo and change heading for services ( #11845 )
2021-12-15 15:51:24 -08:00
trujillo-adam
bcfff8fde4
clarify mesh gateway docs use cases; include admin partition flow
2021-12-15 13:11:52 -08:00
Chris S. Kim
f76fc6cabe
docs: Update discovery chain compilation results with partition fields ( #11835 )
2021-12-14 15:37:34 -05:00
Kyle Havlovitz
f4010065a7
docs: Update exported-services page to include required Name field
2021-12-14 12:10:30 -08:00
Paul Banks
131897bff6
Merge pull request #11164 from hashicorp/docs/ingress-sds
...
Document SDS for ingress gateways
2021-12-14 17:32:40 +00:00
freddygv
e91509383f
Clean up additional refs to partition exports
2021-12-04 15:16:40 -07:00
freddygv
09cdeae13c
Move exported-services docs based on new name
2021-12-03 17:47:32 -07:00
freddygv
ed6076db26
Rename partition-exports to exported-services
...
Using a name less tied to partitions gives us more flexibility to use
this config entry in OSS for exports between datacenters/meshes.
2021-12-03 17:47:31 -07:00
Paul Banks
1d85afeed4
Reformatting suggestions from review
2021-12-01 15:35:24 +00:00
Paul Banks
d5a93d6b88
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-12-01 15:13:40 +00:00
Paul Banks
46849a63f9
Apply suggestions from code review
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2021-12-01 15:13:40 +00:00
Paul Banks
fcfedfdb5d
Add documentation for SDS support in ingress gateways.
2021-12-01 15:13:40 +00:00
John Cowen
b5c8af4580
ui: Add `Service.Partition` as available variable for dashboard urls ( #11654 )
2021-12-01 11:05:57 +00:00
trujillo-adam
cef938e620
Merge pull request #11558 from hashicorp/docs/admin-partitions-service-exports-configuration-entry
...
Admin partition docs: cross-partition support beta2/3
2021-11-30 11:22:30 -08:00
trujillo-adam
0fb360211a
addtional feedback; added PartitionExports to CRDs section
2021-11-30 11:18:12 -08:00
trujillo-adam
632e4bd35c
applied additional feedback
2021-11-29 13:28:05 -08:00
David Yu
29c791c90e
docs: Notes about WAN Federation when using Vault as Connect CA ( #11143 )
...
* docs: Notes about WAN Federation when using Vault as Connect CA
* Apply suggestions from code review
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
* Update website/content/docs/connect/ca/vault.mdx
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
* Update website/content/docs/connect/ca/vault.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/connect/ca/vault.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update vault.mdx
* Update vault.mdx
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-29 12:37:14 -08:00
Karl Cardenas
d4cbe68913
docs: updated proxy page to use new codeblock
2021-11-18 18:17:38 -07:00
Iryna Shustava
0ee456649f
connect: Support auth methods for the vault connect CA provider ( #11573 )
...
* Support vault auth methods for the Vault connect CA provider
* Rotate the token (re-authenticate to vault using auth method) when the token can no longer be renewed
2021-11-18 13:15:28 -07:00
trujillo-adam
e4d89b4214
fixed typo and added link from partition exports to admin partitions section
2021-11-17 08:50:07 -08:00
trujillo-adam
6b8225c6f1
fixed bad links
2021-11-16 12:05:18 -08:00
trujillo-adam
e2ac4c8a30
added link to agent configuration from partition exports in usage section
2021-11-16 10:53:07 -08:00
trujillo-adam
756e65cbcb
applied freddy's feedback
2021-11-16 10:44:21 -08:00
trujillo-adam
91e44f488d
Adding partition exports configuraiton entry details, upstream config, acl impact
2021-11-13 18:52:58 -08:00
trujillo-adam
caf850e135
first commit for cross-partition support - partition exports section
2021-11-11 18:43:57 -08:00
mrspanishviking
b8e11507b1
Merge pull request #11543 from hashicorp/envoy-token
...
docs: added more information to help endusers with proxies and ACL
2021-11-11 08:37:12 -08:00
mrspanishviking
f1b4a10c83
Update website/content/docs/connect/proxies/integrate.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-11 08:05:45 -08:00
mrspanishviking
42ab9e8aa4
Update website/content/docs/connect/ca/vault.mdx
...
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-11-10 13:03:28 -08:00
Karl Cardenas
50ff9e8a6e
docs: added more information to help endusers with proxies and ACL tokens
2021-11-10 08:52:44 -07:00
Karl Cardenas
5644edae5c
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 07:30:12 -07:00
Freddy
5e7eb85f2a
Fix caveat about resolvers operating at L4 ( #11497 )
...
Service resolvers can specify L4 rules such as redirects, or L7 rules such as
hash-based load balancing policies.
2021-11-08 07:11:36 -07:00
Connor
efe4b21287
Support Vault Namespaces explicitly in CA config ( #11477 )
...
* Support Vault Namespaces explicitly in CA config
If there is a Namespace entry included in the Vault CA configuration,
set it as the Vault Namespace on the Vault client
Currently the only way to support Vault namespaces in the Consul CA
config is by doing one of the following:
1) Set the VAULT_NAMESPACE environment variable which will be picked up
by the Vault API client
2) Prefix all Vault paths with the namespace
Neither of these are super pleasant. The first requires direct access
and modification to the Consul runtime environment. It's possible and
expected, not super pleasant.
The second requires more indepth knowledge of Vault and how it uses
Namespaces and could be confusing for anyone without that context. It
also infers that it is not supported
* Add changelog
* Remove fmt.Fprint calls
* Make comment clearer
* Add next consul version to website docs
* Add new test for default configuration
* go mod tidy
* Add skip if vault not present
* Tweak changelog text
2021-11-05 11:42:28 -05:00
FFMMM
fdb0ee6093
change vault ca docs to mention root cert ttl config ( #11488 )
...
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
2021-11-04 15:44:22 -07:00
Luke Kysow
9b680b3f81
Add quick-link for users coming from UI ( #11403 )
...
The Consul UI topology view has an icon with the text
"Configure metrics dashboard" that links to this page. Add a notice at
the top of the page that links them directly to the relevant section.
2021-11-03 09:37:30 -07:00
Luke Kysow
7eb32cdb73
Remove Name/Namespace fields from upstream default ( #11456 )
...
The UpstreamConfig.Defaults field does not support setting Name or
Namespace because the purpose is to apply defaults to all upstreams.
I think this was just missed in the docs since those fields would
error if set under Defaults.
i.e. this is not supported:
```
UpstreamConfig {
Defaults {
Name = "foo"
Namespace = "bar"
# Defaults config here
}
}
```
2021-11-02 14:21:15 -07:00
Evan Culver
bec08f4ec3
connect: Add support for Envoy 1.20 ( #11277 )
2021-10-27 18:38:10 -07:00
Andy Assareh
99ab4f98d4
docs: Mesh gateway requires 1.6.0 *or newer* ( #11333 )
...
* 1.6.0 or newer
* Update website/content/docs/connect/gateways/mesh-gateway/index.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: mrspanishviking <cardenas88karl@gmail.com>
2021-10-18 17:11:00 -07:00
Paul Banks
6c6c75707c
Merge pull request #11037 from hashicorp/docs/mesh-header-manip
...
Document HTTP Header manipulation options added in #10613
2021-10-08 13:11:44 +01:00
Paul Banks
3da2fbdc63
Wording improvements from review
2021-10-08 12:26:11 +01:00
Evan Culver
9b73e7319d
Merge branch 'main' into eculver/envoy-1.19.1
2021-09-28 15:58:20 -07:00
Jared Kirschner
d9e78cd3e8
Merge pull request #11167 from hashicorp/add-cross-dc-comm-model-visual
...
Improve mesh gateway diagram
2021-09-28 13:19:18 -04:00
Jared Kirschner
98f53e913f
Improve mesh gateway diagram
...
Diagram now shows all possible cross-DC communication models supported by mesh
gateways for both the control and data planes.
2021-09-28 09:56:05 -07:00
Paul Banks
1a611f0c1b
Apply suggestions from code review
...
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2021-09-28 17:19:13 +01:00
Chris S. Kim
e3248c20c9
agent: Clean up unused built-in proxy config ( #11165 )
2021-09-28 11:29:10 -04:00
Paul Banks
020e2692da
Merge pull request #10725 from hashicorp/banks-patch-3
...
Call out the incompatibility of wildcards and L7 permissions
2021-09-28 13:51:41 +01:00
Paul Banks
fe92cf7cb6
Document HTTP Header manipulation options added in #10613
2021-09-27 14:46:15 +01:00
Evan Culver
f7380461c7
update docs to indicate support for envoy 1.19.1 in Consul 1.11.x
2021-09-22 10:57:22 -07:00
Kyle MacDonald
4b966094ff
website: fixup incorrect markdown syntax ( #11015 )
2021-09-13 10:36:34 -04:00
Paul Banks
c118e51d5c
Apply suggestions from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-09-10 21:29:43 +01:00
Paul Banks
fd259db9fb
Document how to make namespace wildcard intentions. ( #10724 )
...
* Update intentions.mdx
* Apply suggestions from code review
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2021-09-10 21:25:09 +01:00
Freddy
8d83d27674
connect: update envoy supported versions to latest patch release
...
(#10961 )
Relevant advisory:
https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h
2021-08-31 10:39:18 -06:00
Nitya Dhanushkodi
329ec62582
doc: remove sentence that tproxy works cross-DC with config entries. ( #10885 )
...
It can only work if there is a running service instance in the local DC,
so this is a bit misleading, since failover and redirects are typically
used when there is not an instance in the local DC.
2021-08-23 12:14:28 -07:00
Blake Covarrubias
e62b1d05d8
docs: Add common CA config options to provider doc pages ( #10842 )
...
Add the list of common Connect CA configuration options to the
provider-specific CA docs.
Previously these options were only documented under the agent
configuration options. This change makes it so that all supported CA
provider configuration options are available from a single location.
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-08-19 11:18:55 -07:00
Blake Covarrubias
97b4fdff0d
Document possible risk w.r.t exposing the admin API in Envoy ( #10817 )
...
Add a section to the Connect Security page which highlights the risks
of exposing Envoy's administration interface outside of localhost.
Resolves #5692
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Kent 'picat' Gruber <kent@hashicorp.com>
2021-08-13 10:05:29 -07:00
Blake Covarrubias
8aa89c2c12
docs: Clarify ingress gateway's -address flag ( #10810 )
...
Clarify the function of `-address` flag when instantiating an ingress
gateway.
Resolves #9849
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-08-12 14:56:07 -07:00
Chris Piraino
8f5e2a440b
docs: remove note on ingress gateway hosts field needing a port number ( #10827 )
...
This was necessary in older versions of Consul, but was obsoleted by
making Consul add the port number itself when constructing the Envoy
configuration.
2021-08-11 16:36:57 -05:00