mirror of https://github.com/hashicorp/consul
282 lines
8.5 KiB
YAML
282 lines
8.5 KiB
YAML
common:
|
||
brand:
|
||
consul: Consul
|
||
terraform: Terraform
|
||
nomad: Nomad
|
||
vault: Vault
|
||
aws: AWS
|
||
kubernetes: Kubernetes
|
||
jwt: JWT
|
||
oidc: OIDC
|
||
ui:
|
||
remove: Remove {item}
|
||
filtered-by: Filtered by {item}
|
||
name: Name
|
||
creation: Creation
|
||
maxttl: Max TTL
|
||
consul:
|
||
name: Name
|
||
passing: Passing
|
||
warning: Warning
|
||
critical: Critical
|
||
registered: Registered
|
||
not-registered: Not Registered
|
||
empty: No checks
|
||
tags: Tags
|
||
service: Service
|
||
gateway: Gateway
|
||
mesh: Mesh
|
||
ingress-gateway: Ingress Gateway
|
||
terminating-gateway: Terminating Gateway
|
||
mesh-gateway: Mesh Gateway
|
||
status: Health Status
|
||
service-name: Service Name
|
||
node-name: Node Name
|
||
accessorid: AccessorID
|
||
datacenter: Datacenter
|
||
localbindaddress: Local Bind Address
|
||
localbindport: Local Bind Port
|
||
destinationname: Destination Name
|
||
sourcename: Source Name
|
||
displayname: Display Name
|
||
search:
|
||
search: Search
|
||
searchproperty: Search Across
|
||
source: Source
|
||
critical: Failing
|
||
in-mesh: In service mesh
|
||
not-in-mesh: Not in service mesh
|
||
sort:
|
||
alpha:
|
||
asc: A to Z
|
||
desc: Z to A
|
||
numeric:
|
||
asc: Ascending
|
||
desc: Descending
|
||
age:
|
||
asc: Oldest to Newest
|
||
desc: Newest to Oldest
|
||
duration:
|
||
asc: Longest to shortest
|
||
desc: Shortest to longest
|
||
status:
|
||
asc: Unhealthy to Healthy
|
||
desc: Healthy to Unhealthy
|
||
|
||
routes:
|
||
dc:
|
||
services:
|
||
show:
|
||
upstreams:
|
||
intro: |
|
||
<p>
|
||
Upstreams are services that may receive traffic from this gateway. If you are not using Consul DNS, please make sure your <code>Host:</code> header uses the correct domain name for the gateway to correctly proxy to its upstreams. Learn more about configuring gateways in our <a href="{CONSUL_DOCS_URL}/connect/ingress-gateways" target="_blank" rel="noopener noreferrer">documentation</a>.
|
||
</p>
|
||
|
||
components:
|
||
app:
|
||
skip_to_content: Skip to Content
|
||
toggle_menu: Toggle Menu
|
||
# landmark aria-labels - only screen read, so potentially included with
|
||
# screenreader landmarks/phrases i.e. Main Navigation for nav elements and
|
||
# therefore potentially do not need the word 'navigation' adding to them
|
||
main: Main
|
||
complementary: Complementary
|
||
consul:
|
||
service:
|
||
search-bar:
|
||
kind: Service Type
|
||
in-mesh: In service mesh
|
||
not-in-mesh: Not in service mesh
|
||
upstream:
|
||
search-bar:
|
||
instance:
|
||
name: Type
|
||
service-instance:
|
||
search-bar:
|
||
sort:
|
||
name:
|
||
name: Service Name
|
||
health-check:
|
||
search-bar:
|
||
kind:
|
||
name: Kind
|
||
options:
|
||
service: Service Check
|
||
node: Node Check
|
||
check:
|
||
name: Type
|
||
options:
|
||
alias: alias
|
||
docker: docker
|
||
grpc: grpc
|
||
http: http
|
||
script: script
|
||
serf: serf
|
||
tcp: tcp
|
||
ttl: ttl
|
||
sort:
|
||
name:
|
||
name: Check Name
|
||
kind:
|
||
name: Check Type
|
||
asc: Service to Node
|
||
desc: Node to Service
|
||
acl:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
management: Management
|
||
client: Client
|
||
token:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
global-management: Global Management
|
||
global: Global Scope
|
||
local: Local Scope
|
||
policy:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
global-management: Global Management
|
||
standard: Standard
|
||
auth-method:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
locality:
|
||
name: Source
|
||
options:
|
||
local: Creates local tokens
|
||
global: Creates global tokens
|
||
binding-list:
|
||
bind-type:
|
||
service: The bind name value is used as an ACLServiceIdentity.ServiceName field in the token that is created.
|
||
node: The bind name value is used as an ACLNodeIdentity.NodeName field in the token that is created.
|
||
role: The bind name value is used as an RoleLink.Name field in the token that is created.
|
||
kv:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
folder: Folder
|
||
key: Key
|
||
sort:
|
||
kind:
|
||
asc: Folders to Keys
|
||
desc: Keys to Folders
|
||
intention:
|
||
search-bar:
|
||
access:
|
||
name: Permission
|
||
options:
|
||
allow: Allow
|
||
deny: Deny
|
||
app-aware: App aware
|
||
sort:
|
||
access:
|
||
name: Permission
|
||
asc: Allow to Deny
|
||
desc: Deny to Allow
|
||
source-name:
|
||
name: Source
|
||
asc: "Source: A to Z"
|
||
desc: "Source: Z to A"
|
||
destination-name:
|
||
name: Destination
|
||
asc: "Destination: A to Z"
|
||
desc: "Destination: Z to A"
|
||
precedence:
|
||
name: Precedence
|
||
asc: Ascending
|
||
desc: Descending
|
||
transparent-proxy: Transparent Proxy
|
||
topology-metrics:
|
||
source-type:
|
||
tooltip: This connection was defined in a proxy registration.
|
||
text: Defined in proxy registration
|
||
notice:
|
||
limited-access:
|
||
header: Limited Access
|
||
body: This service may have dependencies you won’t see because you don’t have access to them.
|
||
default-allow:
|
||
header: Intentions are set to default allow
|
||
body: Your Intention settings are currently set to default allow. This means that this view will show connections to every service in your cluster. We recommend changing your Intention settings to default deny and creating specific Intentions for upstream and downstream services for this view to be useful.
|
||
footer:
|
||
name: Edit intentions
|
||
URL: dc.services.show.intentions
|
||
not-defined-intention:
|
||
header: Connections are not explicitly defined
|
||
body: There appears to be an Intention defining traffic, but the services are unable to communicate until that connection is explicitly defined as a downstream or Transparent Proxy mode is turned on.
|
||
footer: Read the documentation
|
||
wildcard-intention:
|
||
header: Permissive Intention
|
||
body: One or more of your Intentions are set to allow traffic to and/or from all other services in a namespace. This Topology view will show all of those connections if that remains unchanged. We recommend setting more specific Intentions for upstream and downstream services to make this vizualization more useful.
|
||
footer:
|
||
name: Edit intentions
|
||
URL: dc.services.show.intentions
|
||
popover:
|
||
l7:
|
||
header: Layer 7 permissions
|
||
body: Certain HTTP request info must be identified.
|
||
action: View
|
||
deny:
|
||
header: Connection Denied
|
||
body:
|
||
isExact: Change the action of this intention to allow.
|
||
notExact: Add an intention that allows these two services to connect.
|
||
action:
|
||
isExact: Allow
|
||
notExact: Create
|
||
not-defined:
|
||
header: No traffic
|
||
body: Add the current service as an explicit upstream or turn on Transparent Proxy mode to initiate traffic.
|
||
action: Documentation
|
||
|
||
|
||
|
||
|
||
models:
|
||
auth-method:
|
||
Description: Description
|
||
DisplayName: Display name
|
||
TokenLocality: Token locality
|
||
Type: Type
|
||
MaxTokenTTL: Maximum token TTL
|
||
Selector: Selector
|
||
BindNamespace: Bind Namespace
|
||
Config:
|
||
Host: Host
|
||
CACert: CA Cert
|
||
ServiceAccountJWT: Service account JSON Web Token
|
||
JWKSURL: JWKS URL
|
||
JWKSCACert: JWKS CA Cert
|
||
JWTValidationPubKeys: JWT validation pub keys
|
||
OIDCDiscoveryURL: Discovery URL
|
||
JWTSupportedAlgs: JWT supported algorithms
|
||
BoundAudiences: Bound audiences
|
||
BoundIssuer: Bound issuer
|
||
ExpirationLeeway: Expiration leeway
|
||
NotBeforeLeeway: Not before leeway
|
||
ClockSkewLeeway: Clock skew leeway
|
||
OIDCDiscoveryCACert: OIDC discovery CA cert
|
||
OIDCClientID: Client ID
|
||
OIDCClientSecret: Client secret
|
||
AllowedRedirectURIs: Allowed redirect URIs
|
||
OIDCScopes: OIDC scopes
|
||
VerboseOIDCLogging: Verbose OIDC logging
|
||
ClaimMappings: Claim Mappings
|
||
ListClaimMappings: List Claim Mappings
|
||
binding-rule:
|
||
BindType: Type
|
||
Description: Description
|
||
Selector: Selector
|
||
|
||
|
||
|
||
|