<a href="{CONSUL_DOCS_URL}/architecture/improving-consul-resilience#strategies-to-increase-fault-tolerance" target="_blank" rel="noopener noreferrer">Learn how to improve fault tolerance</a>
Consul provides a session mechanism which can be used to build distributed locks. Sessions act as a binding layer between Nodes, Health Checks, and Key/Value data. There are currently no Lock Sessions present, or you may not have <code>key:read</code> or <code>session:read</code> permissions.
This node has a failing serf node check. The health statuses shown on this page are the statuses as they were known before the node became unreachable.
0{There don't seem to be any registered services in this Consul cluster}
other {No Services were found matching your search}
},or you may not have <code>service:read</code> and <code>node:read</code> access to this view. Use Terraform, Kubernetes CRDs, Vault, or the Consul CLI to register Services.
</p>
instance:
exposedpaths:
intro:|
<p>
The following list shows individual HTTP paths exposed through Envoy for external services like Prometheus. Read more about this in our <a href="{CONSUL_DOCS_URL}/connect/registration/service-registration#expose-paths-configuration-reference" target="_blank" rel="noopener noreferrer">documentation</a>.
</p>
empty:
body:|
<p>
There are no individual HTTP paths exposed through Envoy for external services like Prometheus. Read more about this in our <a href="{CONSUL_DOCS_URL}/connect/registration/service-registration#expose-paths-configuration-reference" target="_blank" rel="noopener noreferrer">documentation</a>.
</p>
healthchecks:
empty:|
<p>
This instance has no health checks{items, select,
0{}
other { matching that search}
}.
</p>
critical-serf-notice:
header:Failing serf check
body:|
<p>
This instance has a failing serf node check. The health statuses shown on this page are the statuses as they were known before the node became unreachable.
</p>
upstreams:
tproxy-mode:
header:Transparent proxy mode
body:|
<p>
The upstreams listed on this page have been defined in a proxy registration. There may be more upstreams, though, as "transparent" mode is enabled on this proxy.
</p>
footer:|
<p>
<a href="{CONSUL_DOCS_URL}/connect/transparent-proxy" target="_blank" rel="noopener noreferrer">Read the documentation
</p>
empty:|
<p>
This Service Instance has no Upstreams{items, select,
body:Your current ACL settings allow all services to connect to each other. Either create a deny intention between all services, or set your default ACL policy to deny to improve your security posture and make this topology view reflect the actual upstreams and downstreams of this service.
body:There is currently a wildcard Intention that allows all services to connect to each other. Change the action of that Intention to deny to improve your security posture and have this topology view reflect the actual upstreams and downstreams of this service.
body:An Intention was defined that allows traffic between services, but those services are unable to communicate. Define an explicit upstream in the service definition or enable transparent proxy to fix this.
<a href="{CONSUL_DOCS_URL}/connect/registration/service-registration#upstreams" target="_blank" rel="noopener noreferrer">Learn how to add upstreams</a>
body:Your current ACL settings allow all services to connect to each other. Either create a deny intention between all services, or enable ACLs and set your default ACL policy to deny to improve your security posture and make this topology view reflect the actual upstreams and downstreams of this service.
The following services may receive traffic from external services through this gateway. Learn more about configuring gateways in our <a href="{CONSUL_DOCS_URL}/connect/terminating-gateway" target="_blank" rel="noopener noreferrer">step-by-step guide</a>.
Upstreams are services that may receive traffic from this gateway. If you are not using Consul DNS, please make sure your <code>Host:</code> header uses the correct domain name for the gateway to correctly proxy to its upstreams. Learn more about configuring gateways in our <a href="{CONSUL_DOCS_URL}/connect/ingress-gateways" target="_blank" rel="noopener noreferrer">documentation</a>.
0{There don't seem to be any Intentions in this Consul cluster}
other {No Intentions were found matching your search}
},or you may not have <code>intentions:read</code> permissions access to this view.
</p>
kv:
index:
empty:
header:|
{items, select,
0{Welcome to Key/Value}
other {No Key/Values found}
}
body:|
<p>
{items, select,
0{There don't seem to be any K/V pairs in this Consul cluster yet}
other {No K/V pairs were found matching your search}
},or you may not have <code>key:read</code> permissions access to this view.
</p>
acls:
tokens:
index:
empty:
header:|
{items, select,
0{Welcome to Tokens}
other {No Tokens found}
}
body:|
<p>
{items, select,
0{There don't seem to be any Tokens}
other {No Tokens were found matching your search}
},or you may not have <code>acl:read</code> permissions to view Tokens yet.
</p>
policies:
index:
empty:
header:|
{items, select,
0{Welcome to Policies}
other {No Policies found}
}
body:|
<p>
{items, select,
0{There don't seem to be any Policies}
other {No Policies were found matching your search}
},or you may not have <code>acl:read</code> permissions to view Policies yet.
</p>
roles:
index:
empty:
header:|
{items, select,
0{Welcome to Roles}
other {No Roles found}
}
body:|
<p>
{items, select,
0{There don't seem to be any Roles}
other {No Roles were found matching your search}
},or you may not have <code>acl:read</code> permissions to view Roles yet.
</p>
auth-methods:
show:
binding-rules:
empty:
header:NoBinding Rules
body:|
<p>
Binding rules allow an operator to express a systematic way of automatically linking roles and service identities to newly created tokens without operator intervention.
</p>
nspace-rules:
empty:
header:NoNamespace Rules
body:|
<p>
A set of rules that can control which namespace tokens created via this auth method will be created within. Unlike binding rules, the first matching namespace rule wins.
</p>
index:
empty:
header:|
{items, select,
0{Welcome to Auth Methods}
other {No Auth Methods found}
}
body:|
<p>
{items, select,
0{There don't seem to be any Auth Methods}
other {No Auth Methods were found matching your search}
},or you may not have <code>acl:read</code> permissions to view Auth Methods yet.