mirror of https://github.com/hashicorp/consul
191 lines
13 KiB
Markdown
191 lines
13 KiB
Markdown
---
|
||
layout: docs
|
||
page_title: Consul Integration Program
|
||
description: Guide to partnership integrations for Consul.
|
||
---
|
||
|
||
# Consul Integration Program
|
||
|
||
The HashiCorp Consul Integration Program enables prospective partners to build integrations with HashiCorp Consul that are reviewed and verified by HashiCorp. Consul can be consumed in three ways:
|
||
|
||
- **Self-Managed**. Open source, always free
|
||
- **HashiCorp Cloud Platform (HCP)**. A hosted version of Consul managed in the cloud
|
||
- **Consul Enterprise**. Self-managed, with additional features for custom deployments
|
||
|
||
The program is intended to be largely self-service with links to resources, code samples, documentation, and clear integration steps.
|
||
|
||
## Categories of Consul Integrations
|
||
|
||
By leveraging Consul’s RESTful HTTP API system, prospective partners are able to build extensible integrations at the data plane, platform, and the infrastructure layer to extend Consul’s functionalities. These integrations can be performed both with the open source version of Consul, Consul Enterprise, and HCP Consul.
|
||
|
||
**The Consul ecosystem of integrations:**
|
||
|
||
<ImageConfig width={624}>
|
||
|
||
![Consul Architecture](/img/consul_ecosystem_diagram2.png)
|
||
|
||
</ImageConfig>
|
||
|
||
**Data Plane**: These integrations extend Consul’s certificate management, secure ACL configuration, observability metrics and logging, and service discovery that allows for dynamic service mapping APM and logging tools, extend sidecar proxies to support Consul connect, and extend API gateways to allow Consul to route incoming traffic to the proxies for Connect-enabled services.
|
||
|
||
**Control Plane**: Consul has a client-server architecture and is the control plane for the service mesh.
|
||
|
||
**Platform**: These integrations leverage automation of Consul agent deployment, configuration, and management. Designed to be platform agnostic, Consul can be deployed in a variety of form factors, including major Public Cloud providers (AWS, GCP, Azure) as well as in bare-metal, virtual machine, and container (Docker, Kubernetes) environments. They include the Consul agent running in both client and server mode.
|
||
|
||
**Infrastructure**: There are two integration options in this category: natively through a direct integration with Consul or via Consul-Terraform-Sync (CTS). By leveraging Consul’s powerful **Network Infrastructure Automation (NIA)*** capabilities through CTS, changes in an infrastructure are seamlessly automated when Consul detects a change in its service catalog. For example, these integrations could be used to automate IP updates of load balancers or firewall security policies by leveraging Consul service discovery.
|
||
|
||
-> **Network Infrastructure Automation (NIA)***: These integrations leverage Consul’s service catalog to seamlessly integrate with Consul-Terraform-Sync (CTS) to automate changes in network infrastructure via a publisher-subscriber method. More details can be found [here](/docs/integrate/nia-integration).
|
||
|
||
**HCP Consul**: HCP Consul is secure by default and offers an enterprise-level service level agreement (SLA) to deploy an organization’s most important applications. Sign up for HCP Consul is free and available [here](https://cloud.hashicorp.com/products/consul).
|
||
|
||
**Consul integration verification badges**: Partners will be issued the Consul Enterprise badge for integrations that work with [Consul Enterprise features](https://www.consul.io/docs/enterprise) such as namespaces. Partners will be issued the HCP Consul badge for integrations validated to work with [HCP Consul](https://cloud.hashicorp.com/docs/consul/features). Each badge would be displayed on HashiCorp’s partner page as well as be available for posting on the partner’s own website to provide better visibility and differentiation of the integration for joint customers.
|
||
|
||
<span style={{display:'block', textAlign:'center'}}>
|
||
<ImageConfig inline height={192} width={192}>
|
||
|
||
![Consul Enterprise Badge](/img/consul_enterprise_partner_badge.png)
|
||
|
||
</ImageConfig>
|
||
<ImageConfig inline height={192} width={192}>
|
||
|
||
![HCP Consul](/img/HCPc_badge.png)
|
||
|
||
</ImageConfig>
|
||
</span>
|
||
|
||
Developing a valid integration with either Consul Enterprise or HCP Consul also qualifies the partner for the Premier tier of the HashiCorp Technology Partners program. The process for verification of these integrations is detailed below.
|
||
|
||
## Development Process
|
||
|
||
The Consul integration development process is described in the steps below. By following these steps, Consul integrations can be developed alongside HashiCorp to ensure new integrations are reviewed, approved and released as quickly as possible.
|
||
|
||
<ImageConfig width={624}>
|
||
|
||
![Integration Program Steps](/img/consul_integration_program_steps.png)
|
||
|
||
</ImageConfig>
|
||
|
||
1. Engage: Initial contact between vendor and HashiCorp
|
||
2. Enable: Documentation, code samples and best practices for developing the integration
|
||
3. Develop and Test: Integration development and testing by vendor
|
||
4. Review/Certification: HashiCorp code review and certification of integration
|
||
5. Release: Consul integration released
|
||
6. Support: Ongoing maintenance and support of the integration by the vendor.
|
||
|
||
### 1. Engage
|
||
|
||
Please begin by completing [Consul Integration Program webform](https://docs.google.com/forms/d/e/1FAIpQLSf-RyVR9F0lmosao8Nnur0TTDjnl99gttnK3QP1OkfRefVKSw/viewform) to tell us about your company and the Consul integration you are developing.
|
||
|
||
### 2. Enable
|
||
|
||
Here are links to resources, documentation, examples and best practices to guide you through the Consul integration development and testing process:
|
||
|
||
#### Data Plane:
|
||
|
||
**Proxy**
|
||
|
||
- [How to Integrate a Sidecar Proxy Documentation](/docs/connect/proxies/integrate)
|
||
- [Example of Envoy Integration](/docs/connect/proxies/envoy)
|
||
|
||
**API Gateway**
|
||
|
||
- [Ambassador Integration documentation](https://learn.hashicorp.com/tutorials/consul/service-mesh-gateway-ambassador)
|
||
- [F5 Terminating Gateway Integration Documentation](https://www.hashicorp.com/integrations/f5-networks/consul)
|
||
- [Traefik Integration with Consul Service Mesh](https://traefik.io/blog/integrating-consul-connect-service-mesh-with-traefik-2-5/)
|
||
- [Kong's Ingress Controller Integration with Consul](https://www.hashicorp.com/integrations/kong/consul)
|
||
|
||
**Application Performance Monitoring (APM)**
|
||
|
||
- [Consul Telemetry Documentation](/docs/agent/telemetry)
|
||
- [Monitoring Consul with Datadog APM](https://www.datadoghq.com/blog/consul-datadog/)
|
||
- [Monitoring Consul with Dynatrace APM](https://www.dynatrace.com/news/blog/automatic-intelligent-observability-into-your-hashicorp-consul-service-mesh/)
|
||
|
||
**Logging**
|
||
|
||
- [Monitor Consul with Logz.io](https://www.hashicorp.com/integrations/logz-io/consul)
|
||
- [Monitor Consul with Splunk SignalFx](https://www.hashicorp.com/integrations/splunksignalfx/consul)
|
||
- [Consul Datacenter Monitoring with New Relic](https://www.hashicorp.com/integrations/new-relic/consul)
|
||
|
||
#### Platform:
|
||
|
||
- [Consul-AWS for AWS Cloud Map](https://learn.hashicorp.com/tutorials/consul/sync-aws-services)
|
||
- [Consul Integration with AWS ECS](/docs/ecs/get-started/install)
|
||
- [Consul Integration with Layer5 Meshery](https://www.hashicorp.com/integrations/layer5-io/consul)
|
||
- [Consul Integration with VMware Tanzu Application Service](https://learn.hashicorp.com/tutorials/consul/sync-pivotal-cloud-services)
|
||
|
||
#### Infrastructure:
|
||
|
||
-> **Note**: The types of integration areas below could be developed to natively work with Consul or through leveraging Consul-Terraform-Sync and Consul’s network automation capabilities.
|
||
|
||
**Firewalls**
|
||
|
||
**Network Infrastructure Automation (using CTS):**
|
||
|
||
- [Automated Firewalling with Check Point](https://www.hashicorp.com/integrations/checkpoint-software/consul)
|
||
- [Automated Firewalling with Palo Alto Networks](https://www.hashicorp.com/integrations/pan/consul)
|
||
- [Automated Firewalling with Cisco FMC](https://registry.terraform.io/modules/CiscoDevNet/dynamicobjects/fmc/latest)
|
||
- [Automated Firewalling with Fortinet FortiManager](https://registry.terraform.io/modules/fortinetdev/cts-agpu/fortimanager/latest)
|
||
|
||
**Software-Defined Networking \(SDN\)**
|
||
|
||
- [Automating Cisco ACI with Consul](https://www.hashicorp.com/integrations/cisco/consul)
|
||
|
||
**Load Balancer**
|
||
|
||
- [Load Balancing with NGINX and Consul Template](https://learn.hashicorp.com/tutorials/consul/load-balancing-nginx)
|
||
- [Load Balancing with HAProxy Service Discovery](https://learn.hashicorp.com/tutorials/consul/load-balancing-haproxy)
|
||
|
||
**Network Infrastructure Automation \(using CTS\):**
|
||
|
||
- [Automate F5 BIG-IP with Consul NIA](https://learn.hashicorp.com/tutorials/consul/consul-terraform-sync-f5-bigip-fast?in=consul/network-infrastructure-automation)
|
||
- [Automate VMware Advanced Load Balancers (Avi) with Consul NIA](https://www.hashicorp.com/integrations/_vmware/consul)
|
||
|
||
**Application Delivery Controllers \(ADC\):**
|
||
|
||
- [Automate A10 ADC with Consul NIA](https://learn.hashicorp.com/tutorials/consul/consul-terraform-sync-a10-adc?in=consul/network-infrastructure-automation)
|
||
- [Automate Citrix ADC with Consul NIA](https://www.hashicorp.com/integrations/citrix-adc/consul)
|
||
|
||
### 3. Develop and Test
|
||
|
||
The only knowledge necessary to write a plugin is basic command-line skills and knowledge of the [Go programming language](http://www.golang.org). Use the plugin interface to develop your integration. All integrations should contain unit and acceptance testing.
|
||
|
||
**HCP Consul**: The process to configure a testing instance of HCP consul [is very simple](https://learn.hashicorp.com/tutorials/cloud/get-started-consul). HCP has been designed as a HashiCorp managed service so configuration is minimal as only Consul client agents need to be installed. Furthermore, HashiCorp provides all new users an initial credit which should last approximately 2 months using a [development cluster](https://cloud.hashicorp.com/pricing/consul). When deployed with AWS free tier services, there should be no cost beyond the time spent by the designated tester.
|
||
|
||
Please note that HCP Consul is currently only deployed on AWS so the partner’s application should be able to be deployed or run in AWS. For more information, please refer to [Peering an HVN to an AWS VPC for HCP Consul](https://www.youtube.com/watch?v=vuKjkIGYZlU).
|
||
|
||
#### HCP Consul Resource Links:
|
||
|
||
- [Getting Started with HCP Consul](https://learn.hashicorp.com/tutorials/cloud/get-started-consul?in=consul/cloud-get-started)
|
||
- [Peering an HVN to a VPC for HCP Consul](https://www.youtube.com/watch?v=vuKjkIGYZlU)
|
||
- [Connecting a Consul Client to HCP Consul](https://learn.hashicorp.com/tutorials/cloud/consul-client-virtual-machines?in=consul/cloud-get-started)
|
||
- [Monitoring HCP Consul with Datadog](https://docs.datadoghq.com/integrations/guide/hcp-consul/)
|
||
|
||
**Consul Enterprise**: An integration qualifies for Consul Enterprise when it is tested and compatible with Consul Enterprise Namespaces.
|
||
|
||
### 4. Review and Approval
|
||
|
||
HashiCorp will review and approve your Consul integration. Please send an email to [technologypartners@hashicorp.com](mailto:technologypartners@hashicorp.com) with any relevant documentation, demos or other resources and let us know your integration is ready for review.
|
||
|
||
### 5. Release
|
||
|
||
At this stage, the Consul integration is fully developed, documented, reviewed and approved. Once released, HashiCorp will officially list the Consul integration.
|
||
|
||
### 6. Support
|
||
|
||
Many vendors view the release step to be the end of the journey, while at HashiCorp we view it to be the start. Getting the Consul integration built is just the first step in enabling users. Once this is done, ongoing effort is required to maintain the integration and address any issues in a timely manner.
|
||
|
||
The expectation for vendors is to respond to all critical issues within 48 hours and all other issues within 5 business days. HashiCorp Consul has an extremely wide community of users and we encourage everyone to report issues, however small, as well as help resolve them when possible.
|
||
|
||
## Checklist
|
||
|
||
Below is a checklist of steps that should be followed during the Consul integration development process. This reiterates the steps described above.
|
||
|
||
- Complete the [Consul Integration Program webform](https://docs.google.com/forms/d/e/1FAIpQLSf-RyVR9F0lmosao8Nnur0TTDjnl99gttnK3QP1OkfRefVKSw/viewform)
|
||
- Develop and test your Consul integration following examples, documentation and best practices
|
||
- When the integration is completed and ready for HashiCorp review, send us the documentation, demos and any other resources for review at: [technologypartners@hashicorp.com](mailto:technologypartners@hashicorp.com)
|
||
- Plan to continue to support the integration with additional functionality and responding to customer issues.
|
||
|
||
## Contact Us
|
||
|
||
For any questions or feedback, please contact us at: [technologypartners@hashicorp.com](mailto:technologypartners@hashicorp.com)
|