docs: Migrate link formats (#15976)
* Adding check-legacy-links-format workflow * Adding test-link-rewrites workflow * Updating docs-content-check-legacy-links-format hash * Migrating links to new format Co-authored-by: Kendall Strautman <kendallstrautman@gmail.com>
This commit is contained in:
parent
b48832dc91
commit
588bca2207
17
.github/workflows/check-legacy-links-format.yml
vendored
Normal file
17
.github/workflows/check-legacy-links-format.yml
vendored
Normal file
|
@ -0,0 +1,17 @@
|
|||
name: Legacy Link Format Checker
|
||||
|
||||
on:
|
||||
push:
|
||||
paths:
|
||||
- "website/content/**/*.mdx"
|
||||
- "website/data/*-nav-data.json"
|
||||
|
||||
jobs:
|
||||
check-links:
|
||||
uses: hashicorp/dev-portal/.github/workflows/docs-content-check-legacy-links-format.yml@475289345d312552b745224b46895f51cc5fc490
|
||||
with:
|
||||
repo-owner: "hashicorp"
|
||||
repo-name: "consul"
|
||||
commit-sha: ${{ github.sha }}
|
||||
mdx-directory: "website/content"
|
||||
nav-data-directory: "website/data"
|
16
.github/workflows/test-link-rewrites.yml
vendored
Normal file
16
.github/workflows/test-link-rewrites.yml
vendored
Normal file
|
@ -0,0 +1,16 @@
|
|||
name: Test Link Rewrites
|
||||
|
||||
on: [deployment_status]
|
||||
|
||||
jobs:
|
||||
test-link-rewrites:
|
||||
if: github.event.deployment_status.state == 'success'
|
||||
uses: hashicorp/dev-portal/.github/workflows/docs-content-link-rewrites-e2e.yml@2aceb60125f6c15f4c8dbe2e4d79148047bfa437
|
||||
with:
|
||||
repo-owner: "hashicorp"
|
||||
repo-name: "consul"
|
||||
commit-sha: ${{ github.sha }}
|
||||
main-branch-preview-url: "https://consul-git-main-hashicorp.vercel.app/"
|
||||
# Workflow is only intended to run for one single migration PR
|
||||
# This variable does not need to be updated
|
||||
pr-branch-preview-url: "https://consul-git-docs-ambmigrate-link-formats-hashicorp.vercel.app/"
|
|
@ -14,7 +14,7 @@ The `/acl/auth-method` endpoints [create](#create-an-auth-method),
|
|||
ACL auth methods in Consul.
|
||||
|
||||
For more information on how to setup ACLs, please check
|
||||
the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
||||
the [ACL tutorial](/consul/tutorials/security/access-control-setup-production).
|
||||
|
||||
## Create an Auth Method
|
||||
|
||||
|
@ -25,16 +25,16 @@ This endpoint creates a new ACL auth method.
|
|||
| `PUT` | `/acl/auth-method` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl auth-method create`](/commands/acl/auth-method/create).
|
||||
The corresponding CLI command is [`consul acl auth-method create`](/consul/commands/acl/auth-method/create).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -49,7 +49,7 @@ The corresponding CLI command is [`consul acl auth-method create`](/commands/acl
|
|||
|
||||
- `Type` `(string: <required>)` - The type of auth method being configured.
|
||||
This field is immutable. For allowed values see the [auth method
|
||||
documentation](/docs/security/acl/auth-methods).
|
||||
documentation](/consul/docs/security/acl/auth-methods).
|
||||
|
||||
- `Description` `(string: "")` - Free form human readable description of the
|
||||
auth method.
|
||||
|
@ -59,7 +59,7 @@ The corresponding CLI command is [`consul acl auth-method create`](/commands/acl
|
|||
|
||||
- `MaxTokenTTL` `(duration: 0s)` - This specifies the maximum life of any token
|
||||
created by this auth method. When set it will initialize the
|
||||
[`ExpirationTime`](/api-docs/acl/tokens#expirationtime) field on all tokens
|
||||
[`ExpirationTime`](/consul/api-docs/acl/tokens#expirationtime) field on all tokens
|
||||
to a value of `Token.CreateTime + AuthMethod.MaxTokenTTL`. This field is not
|
||||
persisted beyond its initial use. Can be specified in the form of `"60s"` or
|
||||
`"5m"` (i.e., 60 seconds or 5 minutes, respectively). This value must be no
|
||||
|
@ -74,7 +74,7 @@ The corresponding CLI command is [`consul acl auth-method create`](/commands/acl
|
|||
- `Config` `(map[string]string: <required>)` - The raw configuration to use for
|
||||
the chosen auth method. Contents will vary depending upon the type chosen.
|
||||
For more information on configuring specific auth method types, see the [auth
|
||||
method documentation](/docs/security/acl/auth-methods).
|
||||
method documentation](/consul/docs/security/acl/auth-methods).
|
||||
|
||||
- `Namespace` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of
|
||||
the auth method you create. This field takes precedence over the `ns` query parameter,
|
||||
|
@ -156,16 +156,16 @@ auth method exists with the given name, a 404 is returned instead of a
|
|||
| `GET` | `/acl/auth-method/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl auth-method read`](/commands/acl/auth-method/read).
|
||||
The corresponding CLI command is [`consul acl auth-method read`](/consul/commands/acl/auth-method/read).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -208,16 +208,16 @@ This endpoint updates an existing ACL auth method.
|
|||
| `PUT` | `/acl/auth-method/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl auth-method update`](/commands/acl/auth-method/update).
|
||||
The corresponding CLI command is [`consul acl auth-method update`](/consul/commands/acl/auth-method/update).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -246,7 +246,7 @@ The corresponding CLI command is [`consul acl auth-method update`](/commands/acl
|
|||
|
||||
- `MaxTokenTTL` `(duration: 0s)` - This specifies the maximum life of any token
|
||||
created by this auth method. When set it will initialize the
|
||||
[`ExpirationTime`](/api-docs/acl/tokens#expirationtime) field on all tokens
|
||||
[`ExpirationTime`](/consul/api-docs/acl/tokens#expirationtime) field on all tokens
|
||||
to a value of `Token.CreateTime + AuthMethod.MaxTokenTTL`. This field is not
|
||||
persisted beyond its initial use. Can be specified in the form of `"60s"` or
|
||||
`"5m"` (i.e., 60 seconds or 5 minutes, respectively). This value must be no
|
||||
|
@ -261,7 +261,7 @@ The corresponding CLI command is [`consul acl auth-method update`](/commands/acl
|
|||
- `Config` `(map[string]string: <required>)` - The raw configuration to use for
|
||||
the chosen auth method. Contents will vary depending upon the type chosen.
|
||||
For more information on configuring specific auth method types, see the [auth
|
||||
method documentation](/docs/security/acl/auth-methods).
|
||||
method documentation](/consul/docs/security/acl/auth-methods).
|
||||
|
||||
- `Namespace` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of
|
||||
the auth method you update. This field takes precedence over the `ns` query parameter,
|
||||
|
@ -336,8 +336,8 @@ $ curl --request PUT \
|
|||
This endpoint deletes an ACL auth method.
|
||||
|
||||
~> Deleting an auth method will also immediately delete all associated
|
||||
[binding rules](/api-docs/acl/binding-rules) as well as any
|
||||
outstanding [tokens](/api-docs/acl/tokens) created from this auth method.
|
||||
[binding rules](/consul/api-docs/acl/binding-rules) as well as any
|
||||
outstanding [tokens](/consul/api-docs/acl/tokens) created from this auth method.
|
||||
|
||||
| Method | Path | Produces |
|
||||
| -------- | ------------------------ | ------------------ |
|
||||
|
@ -347,16 +347,16 @@ Even though the return type is application/json, the value is either true or
|
|||
false indicating whether the delete succeeded.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl auth-method delete`](/commands/acl/auth-method/delete).
|
||||
The corresponding CLI command is [`consul acl auth-method delete`](/consul/commands/acl/auth-method/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -389,16 +389,16 @@ This endpoint lists all the ACL auth methods.
|
|||
| `GET` | `/acl/auth-methods` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl auth-method list`](/commands/acl/auth-method/list).
|
||||
The corresponding CLI command is [`consul acl auth-method list`](/consul/commands/acl/auth-method/list).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -14,7 +14,7 @@ The `/acl/binding-rule` endpoints [create](#create-a-binding-rule),
|
|||
rules in Consul.
|
||||
|
||||
For more information on how to setup ACLs, please check
|
||||
the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
||||
the [ACL tutorial](/consul/tutorials/security/access-control-setup-production).
|
||||
|
||||
## Create a Binding Rule
|
||||
|
||||
|
@ -25,16 +25,16 @@ This endpoint creates a new ACL binding rule.
|
|||
| `PUT` | `/acl/binding-rule` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl binding-rule create`](/commands/acl/binding-rule/create).
|
||||
The corresponding CLI command is [`consul acl binding-rule create`](/consul/commands/acl/binding-rule/create).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -154,16 +154,16 @@ response.
|
|||
| `GET` | `/acl/binding-rule/:id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl binding-rule read`](/commands/acl/binding-rule/read).
|
||||
The corresponding CLI command is [`consul acl binding-rule read`](/consul/commands/acl/binding-rule/read).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -204,16 +204,16 @@ This endpoint updates an existing ACL binding rule.
|
|||
| `PUT` | `/acl/binding-rule/:id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl binding-rule update`](/commands/acl/binding-rule/update).
|
||||
The corresponding CLI command is [`consul acl binding-rule update`](/consul/commands/acl/binding-rule/update).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -342,16 +342,16 @@ Even though the return type is application/json, the value is either true or
|
|||
false indicating whether the delete succeeded.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl binding-rule delete`](/commands/acl/binding-rule/delete).
|
||||
The corresponding CLI command is [`consul acl binding-rule delete`](/consul/commands/acl/binding-rule/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -384,16 +384,16 @@ This endpoint lists all the ACL binding rules.
|
|||
| `GET` | `/acl/binding-rules` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl binding-rule list`](/commands/acl/binding-rule/list).
|
||||
The corresponding CLI command is [`consul acl binding-rule list`](/consul/commands/acl/binding-rule/list).
|
||||
|
||||
## Query Parameters
|
||||
|
||||
|
|
|
@ -6,17 +6,17 @@ description: The /acl endpoints manage the Consul's ACL system.
|
|||
|
||||
# ACL HTTP API
|
||||
|
||||
-> **1.4.0+:** This API documentation is for Consul versions 1.4.0 and later. The documentation for the legacy ACL API is [here](/api-docs/acl/legacy).
|
||||
-> **1.4.0+:** This API documentation is for Consul versions 1.4.0 and later. The documentation for the legacy ACL API is [here](/consul/api-docs/acl/legacy).
|
||||
|
||||
The `/acl` endpoints are used to manage ACL tokens and policies in Consul, [bootstrap the ACL system](#bootstrap-acls), [check ACL replication status](#check-acl-replication), and [translate rules](#translate-rules). There are additional pages for managing [tokens](/api-docs/acl/tokens) and [policies](/api-docs/acl/policies) with the `/acl` endpoints.
|
||||
The `/acl` endpoints are used to manage ACL tokens and policies in Consul, [bootstrap the ACL system](#bootstrap-acls), [check ACL replication status](#check-acl-replication), and [translate rules](#translate-rules). There are additional pages for managing [tokens](/consul/api-docs/acl/tokens) and [policies](/consul/api-docs/acl/policies) with the `/acl` endpoints.
|
||||
|
||||
For more information on how to setup ACLs, please check
|
||||
the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
||||
the [ACL tutorial](/consul/tutorials/security/access-control-setup-production).
|
||||
|
||||
## Bootstrap ACLs
|
||||
|
||||
This endpoint does a special one-time bootstrap of the ACL system, making the first
|
||||
management token if the [`acl.tokens.initial_management`](/docs/agent/config/config-files#acl_tokens_initial_management)
|
||||
management token if the [`acl.tokens.initial_management`](/consul/docs/agent/config/config-files#acl_tokens_initial_management)
|
||||
configuration entry is not specified in the Consul server configuration and if the
|
||||
cluster has not been bootstrapped previously. An operator created token can be provided in the body of the request to
|
||||
bootstrap the cluster if required. The provided token should be presented in a UUID format.
|
||||
|
@ -29,16 +29,16 @@ configuration files.
|
|||
| `PUT` | `/acl/bootstrap` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `none` |
|
||||
|
||||
The corresponding CLI command is [`consul acl bootstrap`](/commands/acl/bootstrap).
|
||||
The corresponding CLI command is [`consul acl bootstrap`](/consul/commands/acl/bootstrap).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -97,7 +97,7 @@ consider the cluster in a potentially compromised state.
|
|||
|
||||
The returned token will have unrestricted privileges to manage all details of the system.
|
||||
It can then be used to further configure the ACL system. Please check the
|
||||
[ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production) for more details.
|
||||
[ACL tutorial](/consul/tutorials/security/access-control-setup-production) for more details.
|
||||
|
||||
## Check ACL Replication
|
||||
|
||||
|
@ -105,7 +105,7 @@ This endpoint returns the status of the ACL replication processes in the
|
|||
datacenter. This is intended to be used by operators or by automation checking
|
||||
to discover the health of ACL replication.
|
||||
|
||||
Please check the [ACL Replication tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-replication-multiple-datacenters)
|
||||
Please check the [ACL Replication tutorial](/consul/tutorials/security-operations/access-control-replication-multiple-datacenters)
|
||||
for more details.
|
||||
|
||||
| Method | Path | Produces |
|
||||
|
@ -113,10 +113,10 @@ for more details.
|
|||
| `GET` | `/acl/replication` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -159,7 +159,7 @@ $ curl \
|
|||
|
||||
- `SourceDatacenter` - The authoritative ACL datacenter that ACLs are being
|
||||
replicated from and will match the
|
||||
[`primary_datacenter`](/docs/agent/config/config-files#primary_datacenter) configuration.
|
||||
[`primary_datacenter`](/consul/docs/agent/config/config-files#primary_datacenter) configuration.
|
||||
|
||||
- `ReplicationType` - The type of replication that is currently in use.
|
||||
|
||||
|
@ -173,17 +173,17 @@ $ curl \
|
|||
- `ReplicatedIndex` - The last index that was successfully replicated. Which data
|
||||
the replicated index refers to depends on the replication type. For `legacy`
|
||||
replication this can be compared with the value of the `X-Consul-Index` header
|
||||
returned by the [`/v1/acl/list`](/api-docs/acl/legacy#list-acls) endpoint to
|
||||
returned by the [`/v1/acl/list`](/consul/api-docs/acl/legacy#list-acls) endpoint to
|
||||
determine if the replication process has gotten all available ACLs. When in either
|
||||
`tokens` or `policies` mode, this index can be compared with the value of the
|
||||
`X-Consul-Index` header returned by the [`/v1/acl/policies`](/api-docs/acl/policies#list-policies)
|
||||
`X-Consul-Index` header returned by the [`/v1/acl/policies`](/consul/api-docs/acl/policies#list-policies)
|
||||
endpoint to determine if the policy replication process has gotten all available
|
||||
ACL policies. Note that ACL replication is rate limited so the indexes may lag behind
|
||||
the primary datacenter.
|
||||
|
||||
- `ReplicatedTokenIndex` - The last token index that was successfully replicated.
|
||||
This index can be compared with the value of the `X-Consul-Index` header returned
|
||||
by the [`/v1/acl/tokens`](/api-docs/acl/tokens#list-tokens) endpoint to determine
|
||||
by the [`/v1/acl/tokens`](/consul/api-docs/acl/tokens#list-tokens) endpoint to determine
|
||||
if the replication process has gotten all available ACL tokens. Note that ACL
|
||||
replication is rate limited so the indexes may lag behind the primary
|
||||
datacenter.
|
||||
|
@ -215,16 +215,16 @@ migrations.
|
|||
| `POST` | `/acl/rules/translate` | `text/plain` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl translate-rules`](/commands/acl/translate-rules).
|
||||
The corresponding CLI command is [`consul acl translate-rules`](/consul/commands/acl/translate-rules).
|
||||
|
||||
### Sample Payload
|
||||
|
||||
|
@ -257,23 +257,23 @@ This endpoint translates the legacy rules embedded within a legacy ACL into the
|
|||
syntax. It is intended to be used by operators managing Consul's ACLs and performing
|
||||
legacy token to new policy migrations. Note that this API requires the auto-generated
|
||||
Accessor ID of the legacy token. This ID can be retrieved using the
|
||||
[`/v1/acl/token/self`](/api-docs/acl/tokens#read-self-token) endpoint.
|
||||
[`/v1/acl/token/self`](/consul/api-docs/acl/tokens#read-self-token) endpoint.
|
||||
|
||||
| Method | Path | Produces |
|
||||
| ------ | ----------------------------------- | ------------ |
|
||||
| `GET` | `/acl/rules/translate/:accessor_id` | `text/plain` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl translate-rules`](/commands/acl/translate-rules).
|
||||
The corresponding CLI command is [`consul acl translate-rules`](/consul/commands/acl/translate-rules).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -292,7 +292,7 @@ agent_prefix "" {
|
|||
## Login to Auth Method
|
||||
|
||||
This endpoint was added in Consul 1.5.0 and is used to exchange an [auth
|
||||
method](/docs/security/acl/auth-methods) bearer token for a newly-created
|
||||
method](/consul/docs/security/acl/auth-methods) bearer token for a newly-created
|
||||
Consul ACL token.
|
||||
|
||||
| Method | Path | Produces |
|
||||
|
@ -300,10 +300,10 @@ Consul ACL token.
|
|||
| `POST` | `/acl/login` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -311,12 +311,12 @@ The table below shows this endpoint's support for
|
|||
|
||||
-> **Note** - To use the login process to create tokens in any connected
|
||||
secondary datacenter, [ACL
|
||||
replication](/docs/agent/config/config-files#acl_enable_token_replication) must be
|
||||
replication](/consul/docs/agent/config/config-files#acl_enable_token_replication) must be
|
||||
enabled. Login requires the ability to create local tokens which is restricted
|
||||
to the primary datacenter and any secondary datacenters with ACL token
|
||||
replication enabled.
|
||||
|
||||
The corresponding CLI command is [`consul login`](/commands/login).
|
||||
The corresponding CLI command is [`consul login`](/consul/commands/login).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -395,10 +395,10 @@ with the `X-Consul-Token` header or the `token` query parameter.
|
|||
| `POST` | `/acl/logout` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -407,7 +407,7 @@ The table below shows this endpoint's support for
|
|||
-> **Note** - This endpoint requires no specific privileges as it is just
|
||||
deleting a token for which you already must possess its secret.
|
||||
|
||||
The corresponding CLI command is [`consul logout`](/commands/logout).
|
||||
The corresponding CLI command is [`consul logout`](/consul/commands/logout).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -426,17 +426,17 @@ $ curl \
|
|||
</EnterpriseAlert>
|
||||
|
||||
This endpoint was added in Consul 1.8.0 and is used to obtain an authorization
|
||||
URL from Consul to start an [OIDC login flow](/docs/security/acl/auth-methods/oidc).
|
||||
URL from Consul to start an [OIDC login flow](/consul/docs/security/acl/auth-methods/oidc).
|
||||
|
||||
| Method | Path | Produces |
|
||||
| ------ | -------------------- | ------------------ |
|
||||
| `POST` | `/acl/oidc/auth-url` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -444,7 +444,7 @@ The table below shows this endpoint's support for
|
|||
|
||||
-> **Note** - To use the login process to create tokens in any connected
|
||||
secondary datacenter, [ACL
|
||||
replication](/docs/agent/config/config-files#acl_enable_token_replication) must be
|
||||
replication](/consul/docs/agent/config/config-files#acl_enable_token_replication) must be
|
||||
enabled. Login requires the ability to create local tokens which is restricted
|
||||
to the primary datacenter and any secondary datacenters with ACL token
|
||||
replication enabled.
|
||||
|
@ -457,10 +457,10 @@ replication enabled.
|
|||
### JSON Request Body Schema
|
||||
|
||||
- `AuthMethod` `(string: <required>)` - The name of the auth method to use for
|
||||
login. This must be of type [`oidc`](/docs/security/acl/auth-methods/oidc).
|
||||
login. This must be of type [`oidc`](/consul/docs/security/acl/auth-methods/oidc).
|
||||
|
||||
- `RedirectURI` `(string: <required>)` - See [Redirect
|
||||
URIs](/docs/security/acl/auth-methods/oidc#redirect-uris) for more information.
|
||||
URIs](/consul/docs/security/acl/auth-methods/oidc#redirect-uris) for more information.
|
||||
|
||||
- `ClientNonce` `(string: "")` - Optional client-provided nonce that must match
|
||||
during callback, if present.
|
||||
|
@ -516,10 +516,10 @@ for a newly-created Consul ACL token.
|
|||
| `POST` | `/acl/oidc/callback` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -527,7 +527,7 @@ The table below shows this endpoint's support for
|
|||
|
||||
-> **Note** - To use the login process to create tokens in any connected
|
||||
secondary datacenter, [ACL
|
||||
replication](/docs/agent/config/config-files#acl_enable_token_replication) must be
|
||||
replication](/consul/docs/agent/config/config-files#acl_enable_token_replication) must be
|
||||
enabled. Login requires the ability to create local tokens which is restricted
|
||||
to the primary datacenter and any secondary datacenters with ACL token
|
||||
replication enabled.
|
||||
|
@ -540,7 +540,7 @@ replication enabled.
|
|||
### JSON Request Body Schema
|
||||
|
||||
- `AuthMethod` `(string: <required>)` - The name of the auth method to use for
|
||||
login. This must be of type [`oidc`](/docs/security/acl/auth-methods/oidc).
|
||||
login. This must be of type [`oidc`](/consul/docs/security/acl/auth-methods/oidc).
|
||||
|
||||
- `State` `(string: <required>)` - Opaque state ID that is part of the
|
||||
Authorization URL and will be included in the the redirect following
|
||||
|
|
|
@ -10,11 +10,11 @@ description: >-
|
|||
|
||||
-> **The legacy ACL system was deprecated in Consul 1.4.0 and removed in Consul 1.11.0.** It's _strongly_
|
||||
recommended you do not build anything using the legacy system and use
|
||||
the new ACL [Token](/api-docs/acl/tokens) and [Policy](/api-docs/acl/policies) APIs instead.
|
||||
the new ACL [Token](/consul/api-docs/acl/tokens) and [Policy](/consul/api-docs/acl/policies) APIs instead.
|
||||
|
||||
The legacy `/acl` endpoints to create, update, destroy, and query legacy ACL tokens in Consul.
|
||||
|
||||
For more information about ACLs, please check the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
||||
For more information about ACLs, please check the [ACL tutorial](/consul/tutorials/security/access-control-setup-production).
|
||||
|
||||
## Create ACL Token
|
||||
|
||||
|
@ -25,10 +25,10 @@ This endpoint makes a new ACL token.
|
|||
| `PUT` | `/acl/create` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -45,7 +45,7 @@ The table below shows this endpoint's support for
|
|||
are: `client` and `management`.
|
||||
|
||||
- `Rules` `(string: "")` - Specifies rules for this ACL token. The format of the
|
||||
`Rules` property is detailed in the [ACL Rule documentation](/docs/security/acl/acl-rules).
|
||||
`Rules` property is detailed in the [ACL Rule documentation](/consul/docs/security/acl/acl-rules).
|
||||
|
||||
### Sample Payload
|
||||
|
||||
|
@ -84,10 +84,10 @@ generating a new token ID, the `ID` field must be provided.
|
|||
| `PUT` | `/acl/update` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -138,10 +138,10 @@ Even though the return type is application/json, the value is either true or
|
|||
false, indicating whether the delete succeeded.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -175,10 +175,10 @@ This endpoint reads an ACL token with the given ID.
|
|||
| `GET` | `/acl/info/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -224,10 +224,10 @@ complex rule management.
|
|||
| `PUT` | `/acl/clone/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -263,10 +263,10 @@ This endpoint lists all the active ACL tokens.
|
|||
| `GET` | `/acl/list` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -296,4 +296,4 @@ $ curl \
|
|||
|
||||
## Check ACL Replication
|
||||
|
||||
The check ACL replication endpoint has not changed between the legacy system and the new system. Review the [latest documentation](/api-docs/acl#check-acl-replication) to learn more about this endpoint.
|
||||
The check ACL replication endpoint has not changed between the legacy system and the new system. Review the [latest documentation](/consul/api-docs/acl#check-acl-replication) to learn more about this endpoint.
|
||||
|
|
|
@ -6,14 +6,14 @@ description: The /acl/policy endpoints manage Consul's ACL policies.
|
|||
|
||||
# ACL Policy HTTP API
|
||||
|
||||
-> **1.4.0+:** The APIs are available in Consul versions 1.4.0 and later. The documentation for the legacy ACL API is [here](/api-docs/acl/legacy).
|
||||
-> **1.4.0+:** The APIs are available in Consul versions 1.4.0 and later. The documentation for the legacy ACL API is [here](/consul/api-docs/acl/legacy).
|
||||
|
||||
The `/acl/policy` endpoints [create](#create-a-policy), [read](#read-a-policy),
|
||||
[update](#update-a-policy), [list](#list-policies) and
|
||||
[delete](#delete-a-policy) ACL policies in Consul.
|
||||
|
||||
For more information on how to setup ACLs, please check
|
||||
the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
||||
the [ACL tutorial](/consul/tutorials/security/access-control-setup-production).
|
||||
|
||||
## Create a Policy
|
||||
|
||||
|
@ -24,16 +24,16 @@ This endpoint creates a new ACL policy.
|
|||
| `PUT` | `/acl/policy` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl policy create`](/commands/acl/policy/create).
|
||||
The corresponding CLI command is [`consul acl policy create`](/consul/commands/acl/policy/create).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -49,7 +49,7 @@ The corresponding CLI command is [`consul acl policy create`](/commands/acl/poli
|
|||
- `Description` `(string: "")` - Free form human readable description of the policy.
|
||||
|
||||
- `Rules` `(string: "")` - Specifies rules for the ACL policy. The format of the
|
||||
`Rules` property is detailed in the [ACL Rules documentation](/docs/security/acl/acl-rules).
|
||||
`Rules` property is detailed in the [ACL Rules documentation](/consul/docs/security/acl/acl-rules).
|
||||
|
||||
- `Datacenters` `(array<string>)` - Specifies the datacenters the policy is valid within.
|
||||
When no datacenters are provided the policy is valid in all datacenters including
|
||||
|
@ -102,16 +102,16 @@ This endpoint reads an ACL policy with the given ID.
|
|||
| `GET` | `/acl/policy/:id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl policy read`](/commands/acl/policy/read).
|
||||
The corresponding CLI command is [`consul acl policy read`](/consul/commands/acl/policy/read).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -152,16 +152,16 @@ This endpoint reads an ACL policy with the given ID.
|
|||
| `GET` | `/acl/policy/name/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl policy read -name=<string>`](/commands/acl/policy/read#name).
|
||||
The corresponding CLI command is [`consul acl policy read -name=<string>`](/consul/commands/acl/policy/read#name).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -202,16 +202,16 @@ This endpoint updates an existing ACL policy.
|
|||
| `PUT` | `/acl/policy/:id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl policy update`](/commands/acl/policy/update).
|
||||
The corresponding CLI command is [`consul acl policy update`](/consul/commands/acl/policy/update).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -234,7 +234,7 @@ The corresponding CLI command is [`consul acl policy update`](/commands/acl/poli
|
|||
- `Description` `(string: "")` - Free form human readable description of this policy.
|
||||
|
||||
- `Rules` `(string: "")` - Specifies rules for this ACL policy. The format of the
|
||||
`Rules` property is detailed in the [ACL Rules documentation](/docs/security/acl/acl-rules).
|
||||
`Rules` property is detailed in the [ACL Rules documentation](/consul/docs/security/acl/acl-rules).
|
||||
|
||||
- `Datacenters` `(array<string>)` - Specifies the datacenters this policy is valid within.
|
||||
When no datacenters are provided the policy is valid in all datacenters including
|
||||
|
@ -289,16 +289,16 @@ Even though the return type is application/json, the value is either true or
|
|||
false indicating whether the delete succeeded.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl policy delete`](/commands/acl/policy/delete).
|
||||
The corresponding CLI command is [`consul acl policy delete`](/consul/commands/acl/policy/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -331,16 +331,16 @@ This endpoint lists all the ACL policies.
|
|||
| `GET` | `/acl/policies` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl policy list`](/commands/acl/policy/list).
|
||||
The corresponding CLI command is [`consul acl policy list`](/consul/commands/acl/policy/list).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@ The `/acl/role` endpoints [create](#create-a-role), [read](#read-a-role),
|
|||
[update](#update-a-role), [list](#list-roles) and [delete](#delete-a-role) ACL roles in Consul.
|
||||
|
||||
For more information on how to setup ACLs, please check
|
||||
the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
||||
the [ACL tutorial](/consul/tutorials/security/access-control-setup-production).
|
||||
|
||||
## Create a Role
|
||||
|
||||
|
@ -23,16 +23,16 @@ This endpoint creates a new ACL role.
|
|||
| `PUT` | `/acl/role` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl role create`](/commands/acl/role/create).
|
||||
The corresponding CLI command is [`consul acl role create`](/consul/commands/acl/role/create).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -56,7 +56,7 @@ The corresponding CLI command is [`consul acl role create`](/commands/acl/role/c
|
|||
breaking tokens.
|
||||
|
||||
- `ServiceIdentities` `(array<ServiceIdentity>)` - The list of [service
|
||||
identities](/docs/security/acl#service-identities) that should be
|
||||
identities](/consul/docs/security/acl#service-identities) that should be
|
||||
applied to the role. Added in Consul 1.5.0.
|
||||
|
||||
- `ServiceName` `(string: <required>)` - The name of the service. The name
|
||||
|
@ -70,7 +70,7 @@ The corresponding CLI command is [`consul acl role create`](/commands/acl/role/c
|
|||
but may in the future.
|
||||
|
||||
- `NodeIdentities` `(array<NodeIdentity>)` - The list of [node
|
||||
identities](/docs/security/acl#node-identities) that should be
|
||||
identities](/consul/docs/security/acl#node-identities) that should be
|
||||
applied to the role. Added in Consul 1.8.1.
|
||||
|
||||
- `NodeName` `(string: <required>)` - The name of the node. The name
|
||||
|
@ -169,16 +169,16 @@ given ID, a 404 is returned instead of a 200 response.
|
|||
| `GET` | `/acl/role/:id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl role read`](/commands/acl/role/read).
|
||||
The corresponding CLI command is [`consul acl role read`](/consul/commands/acl/role/read).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -239,16 +239,16 @@ given name, a 404 is returned instead of a 200 response.
|
|||
| `GET` | `/acl/role/name/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl role read -name=<string>`](/commands/acl/role/read#name).
|
||||
The corresponding CLI command is [`consul acl role read -name=<string>`](/consul/commands/acl/role/read#name).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -308,16 +308,16 @@ This endpoint updates an existing ACL role.
|
|||
| `PUT` | `/acl/role/:id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl role update`](/commands/acl/role/update).
|
||||
The corresponding CLI command is [`consul acl role update`](/consul/commands/acl/role/update).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -347,11 +347,11 @@ The corresponding CLI command is [`consul acl role update`](/commands/acl/role/u
|
|||
breaking tokens.
|
||||
|
||||
- `ServiceIdentities` `(array<ServiceIdentity>)` - The list of [service
|
||||
identities](/docs/security/acl#service-identities) that should be
|
||||
identities](/consul/docs/security/acl#service-identities) that should be
|
||||
applied to the role. Added in Consul 1.5.0.
|
||||
|
||||
- `NodeIdentities` `(array<NodeIdentity>)` - The list of [node
|
||||
identities](/docs/security/acl#node-identities) that should be
|
||||
identities](/consul/docs/security/acl#node-identities) that should be
|
||||
applied to the role. Added in Consul 1.8.1.
|
||||
|
||||
- `Namespace` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you update.
|
||||
|
@ -432,16 +432,16 @@ Even though the return type is application/json, the value is either true or
|
|||
false indicating whether the delete succeeded.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl role delete`](/commands/acl/role/delete).
|
||||
The corresponding CLI command is [`consul acl role delete`](/consul/commands/acl/role/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -474,16 +474,16 @@ This endpoint lists all the ACL roles.
|
|||
| `GET` | `/acl/roles` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl role list`](/commands/acl/role/list).
|
||||
The corresponding CLI command is [`consul acl role list`](/consul/commands/acl/role/list).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -6,13 +6,13 @@ description: The /acl/token endpoints manage Consul's ACL Tokens.
|
|||
|
||||
# ACL Token HTTP API
|
||||
|
||||
-> **1.4.0+:** The APIs are available in Consul versions 1.4.0 and later. The documentation for the legacy ACL API is [here](/api-docs/acl/legacy).
|
||||
-> **1.4.0+:** The APIs are available in Consul versions 1.4.0 and later. The documentation for the legacy ACL API is [here](/consul/api-docs/acl/legacy).
|
||||
|
||||
The `/acl/token` endpoints [create](#create-a-token), [read](#read-a-token),
|
||||
[update](#update-a-token), [list](#list-tokens), [clone](#clone-a-token) and [delete](#delete-a-token) ACL tokens in Consul.
|
||||
|
||||
For more information on how to setup ACLs, please check
|
||||
the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
||||
the [ACL tutorial](/consul/tutorials/security/access-control-setup-production).
|
||||
|
||||
## Create a Token
|
||||
|
||||
|
@ -23,16 +23,16 @@ This endpoint creates a new ACL token.
|
|||
| `PUT` | `/acl/token` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl token create`](/commands/acl/token/create).
|
||||
The corresponding CLI command is [`consul acl token create`](/consul/commands/acl/token/create).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -67,7 +67,7 @@ The corresponding CLI command is [`consul acl token create`](/commands/acl/token
|
|||
enables role renaming without breaking tokens. Added in Consul 1.5.0.
|
||||
|
||||
- `ServiceIdentities` `(array<ServiceIdentity>)` - The list of [service
|
||||
identities](/docs/security/acl#service-identities) that should be
|
||||
identities](/consul/docs/security/acl#service-identities) that should be
|
||||
applied to the token. Added in Consul 1.5.0.
|
||||
|
||||
- `ServiceName` `(string: <required>)` - The name of the service. The name
|
||||
|
@ -81,7 +81,7 @@ The corresponding CLI command is [`consul acl token create`](/commands/acl/token
|
|||
but may in the future.
|
||||
|
||||
- `NodeIdentities` `(array<NodeIdentity>)` - The list of [node
|
||||
identities](/docs/security/acl#node-identities) that should be
|
||||
identities](/consul/docs/security/acl#node-identities) that should be
|
||||
applied to the token. Added in Consul 1.8.1.
|
||||
|
||||
- `NodeName` `(string: <required>)` - The name of the node. The name
|
||||
|
@ -169,16 +169,16 @@ This endpoint reads an ACL token with the given Accessor ID.
|
|||
| `GET` | `/acl/token/:AccessorID` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl token read`](/commands/acl/token/read).
|
||||
The corresponding CLI command is [`consul acl token read`](/consul/commands/acl/token/read).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -325,10 +325,10 @@ specified with the `X-Consul-Token` header or the `token` query parameter.
|
|||
| `GET` | `/acl/token/self` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -337,7 +337,7 @@ The table below shows this endpoint's support for
|
|||
-> **Note** - This endpoint requires no specific privileges as it is just
|
||||
retrieving the data for a token that you must already possess its secret.
|
||||
|
||||
The corresponding CLI command is [`consul acl token read -self`](/commands/acl/token/read#self).
|
||||
The corresponding CLI command is [`consul acl token read -self`](/consul/commands/acl/token/read#self).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -380,16 +380,16 @@ This endpoint updates an existing ACL token.
|
|||
| `PUT` | `/acl/token/:AccessorID` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl token update`](/commands/acl/token/update).
|
||||
The corresponding CLI command is [`consul acl token update`](/consul/commands/acl/token/update).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -429,7 +429,7 @@ The corresponding CLI command is [`consul acl token update`](/commands/acl/token
|
|||
enables role renaming without breaking tokens.
|
||||
|
||||
- `ServiceIdentities` `(array<ServiceIdentity>)` - The list of [service
|
||||
identities](/docs/security/acl#service-identities) that should be
|
||||
identities](/consul/docs/security/acl#service-identities) that should be
|
||||
applied to the token. Added in Consul 1.5.0.
|
||||
|
||||
- `ServiceName` `(string: <required>)` - The name of the service. The name
|
||||
|
@ -443,7 +443,7 @@ The corresponding CLI command is [`consul acl token update`](/commands/acl/token
|
|||
but may in the future.
|
||||
|
||||
- `NodeIdentities` `(array<NodeIdentity>)` - The list of [node
|
||||
identities](/docs/security/acl#node-identities) that should be
|
||||
identities](/consul/docs/security/acl#node-identities) that should be
|
||||
applied to the token. Added in Consul 1.8.1.
|
||||
|
||||
- `NodeName` `(string: <required>)` - The name of the node. The name
|
||||
|
@ -538,16 +538,16 @@ This endpoint clones an existing ACL token.
|
|||
| `PUT` | `/acl/token/:AccessorID/clone` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl token clone`](/commands/acl/token/clone).
|
||||
The corresponding CLI command is [`consul acl token clone`](/consul/commands/acl/token/clone).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -623,16 +623,16 @@ Even though the return type is application/json, the value is either true or
|
|||
false, indicating whether the delete succeeded.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `acl:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl token delete`](/commands/acl/token/delete).
|
||||
The corresponding CLI command is [`consul acl token delete`](/consul/commands/acl/token/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -665,16 +665,16 @@ This endpoint lists all the ACL tokens.
|
|||
| `GET` | `/acl/tokens` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `acl:read` |
|
||||
|
||||
The corresponding CLI command is [`consul acl token list`](/commands/acl/token/list).
|
||||
The corresponding CLI command is [`consul acl token list`](/consul/commands/acl/token/list).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -23,7 +23,7 @@ This endpoint creates a new partition and has the following characteristics:
|
|||
| URL path | `/v1/partition` |
|
||||
| Response type | `application/json` |
|
||||
| [Required ACLs] | `operator:write` |
|
||||
| Corresponding CLI command | [`consul partition create`](/commands/partition#create) |
|
||||
| Corresponding CLI command | [`consul partition create`](/consul/commands/partition#create) |
|
||||
| [Consistency modes] | N/A |
|
||||
| [Blocking queries] | N/A |
|
||||
| [Agent caching] | N/A |
|
||||
|
@ -74,7 +74,7 @@ This endpoint reads a partition with the given name and has the following charac
|
|||
| URL path | `/v1/partition/:name` |
|
||||
| Response type | `application/json` |
|
||||
| [Required ACLs] | `operator:read`; however, a non-anonymous token can always read its own partition |
|
||||
| Corresponding CLI command | [`consul partition read`](/commands/partition#read) |
|
||||
| Corresponding CLI command | [`consul partition read`](/consul/commands/partition#read) |
|
||||
| [Consistency modes] | `default`, `consistent` |
|
||||
| [Blocking queries] | No |
|
||||
| [Agent caching] | No |
|
||||
|
@ -111,7 +111,7 @@ This endpoint updates a partition description and has the following characterist
|
|||
| URL path | `/v1/partition/:name` |
|
||||
| Response type | `application/json` |
|
||||
| [Required ACLs] | `operator:write` |
|
||||
| Corresponding CLI command | [`consul partition write`](/commands/partition#write) |
|
||||
| Corresponding CLI command | [`consul partition write`](/consul/commands/partition#write) |
|
||||
| [Consistency modes] | N/A |
|
||||
| [Blocking queries] | N/A |
|
||||
| [Agent caching] | N/A |
|
||||
|
@ -173,7 +173,7 @@ This endpoint has the following characteristics:
|
|||
| URL path | `/v1/partition/:name` |
|
||||
| Response type | none; success or failure is indicated by the HTTP response status code |
|
||||
| [Required ACLs] | `operator:write` |
|
||||
| Corresponding CLI command | [`consul partition delete`](/commands/partition#delete) |
|
||||
| Corresponding CLI command | [`consul partition delete`](/consul/commands/partition#delete) |
|
||||
| [Consistency modes] | N/A |
|
||||
| [Blocking queries] | N/A |
|
||||
| [Agent caching] | N/A |
|
||||
|
@ -212,7 +212,7 @@ This endpoint lists all the partitions and has the following characteristics:
|
|||
| URL path | `/v1/partitions` |
|
||||
| Response type | `application/json` |
|
||||
| [Required ACLs] | `operator:read` |
|
||||
| Corresponding CLI command | [`consul partition list`](/commands/partition#list) |
|
||||
| Corresponding CLI command | [`consul partition list`](/consul/commands/partition#list) |
|
||||
| [Consistency modes] | `default`, `consistent` |
|
||||
| [Blocking queries] | No |
|
||||
| [Agent caching] | No |
|
||||
|
|
|
@ -7,7 +7,7 @@ description: The /agent/check endpoints interact with checks on the local agent
|
|||
# Check - Agent HTTP API
|
||||
|
||||
Consul's health check capabilities are described in the
|
||||
[health checks overview](/docs/discovery/checks).
|
||||
[health checks overview](/consul/docs/discovery/checks).
|
||||
The `/agent/check` endpoints interact with health checks
|
||||
managed by the local agent in Consul.
|
||||
These should not be confused with checks in the catalog.
|
||||
|
@ -21,7 +21,7 @@ using the HTTP API.
|
|||
It is important to note that the checks known by the agent may be different from
|
||||
those reported by the catalog. This is usually due to changes being made while
|
||||
there is no leader elected. The agent performs active
|
||||
[anti-entropy](/docs/architecture/anti-entropy), so in most situations
|
||||
[anti-entropy](/consul/docs/architecture/anti-entropy), so in most situations
|
||||
everything will be in sync within a few seconds.
|
||||
|
||||
@include 'http_api_results_filtered_by_acls.mdx'
|
||||
|
@ -31,10 +31,10 @@ everything will be in sync within a few seconds.
|
|||
| `GET` | `/agent/checks` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------ |
|
||||
|
@ -109,10 +109,10 @@ check and keeping the Catalog in sync.
|
|||
| `PUT` | `/agent/check/register` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -313,10 +313,10 @@ not exist, no action is taken.
|
|||
| `PUT` | `/agent/check/deregister/:check_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -351,10 +351,10 @@ This endpoint is used with a TTL type check to set the status of the check to
|
|||
| `PUT` | `/agent/check/pass/:check_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -390,10 +390,10 @@ This endpoint is used with a TTL type check to set the status of the check to
|
|||
| `PUT` | `/agent/check/warn/:check_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -424,7 +424,7 @@ This endpoint is used with a TTL type check to set the status of the check to
|
|||
`critical` and to reset the TTL clock.
|
||||
|
||||
If you want to manually mark a service as unhealthy,
|
||||
use [maintenance mode](/api-docs/agent#enable-maintenance-mode)
|
||||
use [maintenance mode](/consul/api-docs/agent#enable-maintenance-mode)
|
||||
instead of defining a TTL health check and using this endpoint.
|
||||
|
||||
| Method | Path | Produces |
|
||||
|
@ -432,10 +432,10 @@ instead of defining a TTL health check and using this endpoint.
|
|||
| `PUT` | `/agent/check/fail/:check_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -466,7 +466,7 @@ This endpoint is used with a TTL type check to set the status of the check and
|
|||
to reset the TTL clock.
|
||||
|
||||
If you want to manually mark a service as unhealthy,
|
||||
use [maintenance mode](/api-docs/agent#enable-maintenance-mode)
|
||||
use [maintenance mode](/consul/api-docs/agent#enable-maintenance-mode)
|
||||
instead of defining a TTL health check and using this endpoint.
|
||||
|
||||
| Method | Path | Produces |
|
||||
|
@ -474,10 +474,10 @@ instead of defining a TTL health check and using this endpoint.
|
|||
| `PUT` | `/agent/check/update/:check_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
|
|
@ -8,10 +8,10 @@ description: >-
|
|||
|
||||
# Connect - Agent HTTP API
|
||||
|
||||
The `/agent/connect` endpoints interact with [Connect](/docs/connect)
|
||||
The `/agent/connect` endpoints interact with [Connect](/consul/docs/connect)
|
||||
with agent-local operations.
|
||||
|
||||
These endpoints may mirror the [non-agent Connect endpoints](/api-docs/connect)
|
||||
These endpoints may mirror the [non-agent Connect endpoints](/consul/api-docs/connect)
|
||||
in some cases. Almost all agent-local Connect endpoints perform local caching
|
||||
to optimize performance of Connect without having to make requests to the server.
|
||||
|
||||
|
@ -22,13 +22,13 @@ defined as _deny_ intentions during evaluation, as this endpoint is only suited
|
|||
for networking layer 4 (e.g. TCP) integration.
|
||||
For performance and reliability reasons it is desirable to implement intention
|
||||
enforcement by listing [intentions that match the
|
||||
destination](/api-docs/connect/intentions#list-matching-intentions) and representing
|
||||
destination](/consul/api-docs/connect/intentions#list-matching-intentions) and representing
|
||||
them in the native configuration of the proxy itself (such as RBAC for Envoy).
|
||||
|
||||
This endpoint tests whether a connection attempt is authorized between
|
||||
two services. This is the primary API that must be implemented by
|
||||
[proxies](/docs/connect/proxies) or
|
||||
[native integrations](/docs/connect/native)
|
||||
[proxies](/consul/docs/connect/proxies) or
|
||||
[native integrations](/consul/docs/connect/native)
|
||||
that wish to integrate with Connect. Prior to calling this API, it is expected
|
||||
that the client TLS certificate has been properly verified against the
|
||||
current CA roots.
|
||||
|
@ -43,10 +43,10 @@ connection attempt.
|
|||
| `POST` | `/agent/connect/authorize` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | -------------------- | --------------- |
|
||||
|
@ -104,11 +104,11 @@ $ curl \
|
|||
## Certificate Authority (CA) Roots
|
||||
|
||||
This endpoint returns the trusted certificate authority (CA) root certificates.
|
||||
This is used by [proxies](/docs/connect/proxies) or
|
||||
[native integrations](/docs/connect/native) to verify served client
|
||||
This is used by [proxies](/consul/docs/connect/proxies) or
|
||||
[native integrations](/consul/docs/connect/native) to verify served client
|
||||
or server certificates are valid.
|
||||
|
||||
This is equivalent to the [non-Agent Connect endpoint](/api-docs/connect),
|
||||
This is equivalent to the [non-Agent Connect endpoint](/consul/api-docs/connect),
|
||||
but the response of this request is cached locally at the agent. This allows
|
||||
for very fast response times and for fail open behavior if the server is
|
||||
unavailable. This endpoint should be used by proxies and native integrations.
|
||||
|
@ -118,10 +118,10 @@ unavailable. This endpoint should be used by proxies and native integrations.
|
|||
| `GET` | `/agent/connect/ca/roots` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | -------------------- | ------------ |
|
||||
|
@ -168,7 +168,7 @@ connections and is also used as the client certificate for establishing
|
|||
outbound connections to other services.
|
||||
|
||||
The agent generates a CSR locally and calls the
|
||||
[CA sign API](/api-docs/connect/ca) to sign it. The resulting certificate
|
||||
[CA sign API](/consul/api-docs/connect/ca) to sign it. The resulting certificate
|
||||
is cached and returned by this API until it is near expiry or the root
|
||||
certificates change.
|
||||
|
||||
|
@ -186,10 +186,10 @@ wait for certificate rotations.
|
|||
| `GET` | `/agent/connect/ca/leaf/:service` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | -------------------- | --------------- |
|
||||
|
|
|
@ -12,7 +12,7 @@ The `/agent` endpoints are used to interact with the local Consul agent.
|
|||
Usually, services and checks are registered with an agent which then takes on
|
||||
the burden of keeping that data synchronized with the cluster. For example, the
|
||||
agent registers services and checks with the Catalog and performs
|
||||
[anti-entropy](/docs/architecture/anti-entropy) to recover from outages.
|
||||
[anti-entropy](/consul/docs/architecture/anti-entropy) to recover from outages.
|
||||
|
||||
In addition to these endpoints, additional endpoints are grouped in the
|
||||
navigation for `Checks` and `Services`.
|
||||
|
@ -31,10 +31,10 @@ GitHub issue to discuss your use case.
|
|||
| `GET` | `/agent/host` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
@ -220,16 +220,16 @@ by agent. The strongly consistent view of nodes is instead provided by
|
|||
| `GET` | `/agent/members` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `node:read` |
|
||||
|
||||
The corresponding CLI command is [`consul members`](/commands/members).
|
||||
The corresponding CLI command is [`consul members`](/consul/commands/members).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -288,10 +288,10 @@ to change without notice or deprecation.
|
|||
| `GET` | `/agent/self` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -360,7 +360,7 @@ This endpoint instructs the agent to reload its configuration. Any errors
|
|||
encountered during this process are returned.
|
||||
|
||||
Not all configuration options are reloadable. See the
|
||||
[Reloadable Configuration](/docs/agent/config#reloadable-configuration)
|
||||
[Reloadable Configuration](/consul/docs/agent/config#reloadable-configuration)
|
||||
section on the agent options page for details on which options are supported.
|
||||
|
||||
| Method | Path | Produces |
|
||||
|
@ -368,16 +368,16 @@ section on the agent options page for details on which options are supported.
|
|||
| `PUT` | `/agent/reload` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
| `NO` | `none` | `none` | `agent:write` |
|
||||
|
||||
The corresponding CLI command is [`consul reload`](/commands/reload).
|
||||
The corresponding CLI command is [`consul reload`](/consul/commands/reload).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -401,16 +401,16 @@ restart.
|
|||
| `PUT` | `/agent/maintenance` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `node:write` |
|
||||
|
||||
The corresponding CLI command is [`consul maint`](/commands/maint).
|
||||
The corresponding CLI command is [`consul maint`](/consul/commands/maint).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -433,12 +433,12 @@ $ curl \
|
|||
## View Metrics
|
||||
|
||||
This endpoint will dump the metrics for the most recent finished interval.
|
||||
For more information about metrics, see the [telemetry](/docs/agent/telemetry)
|
||||
For more information about metrics, see the [telemetry](/consul/docs/agent/telemetry)
|
||||
page.
|
||||
|
||||
In order to enable [Prometheus](https://prometheus.io/) support, you need to use the
|
||||
configuration directive
|
||||
[`prometheus_retention_time`](/docs/agent/config/config-files#telemetry-prometheus_retention_time).
|
||||
[`prometheus_retention_time`](/consul/docs/agent/config/config-files#telemetry-prometheus_retention_time).
|
||||
|
||||
Since Consul 1.7.2 this endpoint will also automatically switch output format if
|
||||
the request contains an `Accept` header with a compatible MIME type such as
|
||||
|
@ -460,10 +460,10 @@ endpoint.
|
|||
| `GET` | `/agent/metrics?format=prometheus` | `text/plain; version=0.0.4; charset=utf-8` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -582,10 +582,10 @@ This endpoint streams logs from the local agent until the connection is closed.
|
|||
| `GET` | `/agent/monitor` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -627,16 +627,16 @@ This endpoint instructs the agent to attempt to connect to a given address.
|
|||
| `PUT` | `/agent/join/:address` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
| `NO` | `none` | `none` | `agent:write` |
|
||||
|
||||
The corresponding CLI command is [`consul join`](/commands/join).
|
||||
The corresponding CLI command is [`consul join`](/consul/commands/join).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -669,16 +669,16 @@ can affect cluster availability.
|
|||
| `PUT` | `/agent/leave` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
| `NO` | `none` | `none` | `agent:write` |
|
||||
|
||||
The corresponding CLI command is [`consul leave`](/commands/leave).
|
||||
The corresponding CLI command is [`consul leave`](/consul/commands/leave).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -708,16 +708,16 @@ the list of members entirely.
|
|||
| `PUT` | `/agent/force-leave/:node_name?prune` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul force-leave`](/commands/force-leave).
|
||||
The corresponding CLI command is [`consul force-leave`](/consul/commands/force-leave).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -745,7 +745,7 @@ $ curl \
|
|||
This endpoint updates the ACL tokens currently in use by the agent. It can be
|
||||
used to introduce ACL tokens to the agent for the first time, or to update
|
||||
tokens that were initially loaded from the agent's configuration. Tokens will be persisted
|
||||
only if the [`acl.enable_token_persistence`](/docs/agent/config/config-files#acl_enable_token_persistence)
|
||||
only if the [`acl.enable_token_persistence`](/consul/docs/agent/config/config-files#acl_enable_token_persistence)
|
||||
configuration is `true`. When not being persisted, they will need to be reset if the agent
|
||||
is restarted.
|
||||
|
||||
|
@ -758,10 +758,10 @@ is restarted.
|
|||
| `PUT` | `/agent/token/replication` | `application/json` |
|
||||
|
||||
The paths above correspond to the token names as found in the agent configuration:
|
||||
[`default`](/docs/agent/config/config-files#acl_tokens_default), [`agent`](/docs/agent/config/config-files#acl_tokens_agent),
|
||||
[`agent_recovery`](/docs/agent/config/config-files#acl_tokens_agent_recovery),
|
||||
[`config_file_service_registration`](/docs/agent/config/config-files#acl_tokens_config_file_service_registration),
|
||||
and [`replication`](/docs/agent/config/config-files#acl_tokens_replication).
|
||||
[`default`](/consul/docs/agent/config/config-files#acl_tokens_default), [`agent`](/consul/docs/agent/config/config-files#acl_tokens_agent),
|
||||
[`agent_recovery`](/consul/docs/agent/config/config-files#acl_tokens_agent_recovery),
|
||||
[`config_file_service_registration`](/consul/docs/agent/config/config-files#acl_tokens_config_file_service_registration),
|
||||
and [`replication`](/consul/docs/agent/config/config-files#acl_tokens_replication).
|
||||
|
||||
-> **Deprecation Note:** The following paths were deprecated in version 1.11
|
||||
|
||||
|
@ -770,7 +770,7 @@ and [`replication`](/docs/agent/config/config-files#acl_tokens_replication).
|
|||
| `PUT` | `/agent/token/agent_master` | `application/json` |
|
||||
|
||||
The paths above correspond to the token names as found in the agent configuration:
|
||||
[`agent_master`](/docs/agent/config/config-files#acl_tokens_agent_master).
|
||||
[`agent_master`](/consul/docs/agent/config/config-files#acl_tokens_agent_master).
|
||||
|
||||
-> **Deprecation Note:** The following paths were deprecated in version 1.4.3
|
||||
|
||||
|
@ -782,21 +782,21 @@ The paths above correspond to the token names as found in the agent configuratio
|
|||
| `PUT` | `/agent/token/acl_replication_token` | `application/json` |
|
||||
|
||||
The paths above correspond to the token names as found in the agent configuration:
|
||||
[`acl_token`](/docs/agent/config/config-files#acl_token_legacy), [`acl_agent_token`](/docs/agent/config/config-files#acl_agent_token_legacy),
|
||||
[`acl_agent_master_token`](/docs/agent/config/config-files#acl_agent_master_token_legacy), and
|
||||
[`acl_replication_token`](/docs/agent/config/config-files#acl_replication_token_legacy).
|
||||
[`acl_token`](/consul/docs/agent/config/config-files#acl_token_legacy), [`acl_agent_token`](/consul/docs/agent/config/config-files#acl_agent_token_legacy),
|
||||
[`acl_agent_master_token`](/consul/docs/agent/config/config-files#acl_agent_master_token_legacy), and
|
||||
[`acl_replication_token`](/consul/docs/agent/config/config-files#acl_replication_token_legacy).
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
| `NO` | `none` | `none` | `agent:write` |
|
||||
|
||||
The corresponding CLI command is [`consul acl set-agent-token`](/commands/acl/set-agent-token).
|
||||
The corresponding CLI command is [`consul acl set-agent-token`](/consul/commands/acl/set-agent-token).
|
||||
|
||||
### JSON Request Body Schema
|
||||
|
||||
|
|
|
@ -20,7 +20,7 @@ or added dynamically using the HTTP API.
|
|||
It is important to note that the services known by the agent may be different
|
||||
from those reported by the catalog. This is usually due to changes being made
|
||||
while there is no leader elected. The agent performs active
|
||||
[anti-entropy](/docs/architecture/anti-entropy), so in most situations
|
||||
[anti-entropy](/consul/docs/architecture/anti-entropy), so in most situations
|
||||
everything will be in sync within a few seconds.
|
||||
|
||||
@include 'http_api_results_filtered_by_acls.mdx'
|
||||
|
@ -30,10 +30,10 @@ everything will be in sync within a few seconds.
|
|||
| `GET` | `/agent/services` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -130,13 +130,13 @@ following selectors and filter operations being supported:
|
|||
|
||||
This endpoint was added in Consul 1.3.0 and returns the full service definition
|
||||
for a single service instance registered on the local agent. It is used by
|
||||
[Connect proxies](/docs/connect/proxies) to discover the embedded proxy
|
||||
[Connect proxies](/consul/docs/connect/proxies) to discover the embedded proxy
|
||||
configuration that was registered with the instance.
|
||||
|
||||
It is important to note that the services known by the agent may be different
|
||||
from those reported by the catalog. This is usually due to changes being made
|
||||
while there is no leader elected. The agent performs active
|
||||
[anti-entropy](/docs/architecture/anti-entropy), so in most situations
|
||||
[anti-entropy](/consul/docs/architecture/anti-entropy), so in most situations
|
||||
everything will be in sync within a few seconds.
|
||||
|
||||
| Method | Path | Produces |
|
||||
|
@ -144,10 +144,10 @@ everything will be in sync within a few seconds.
|
|||
| `GET` | `/agent/service/:service_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ----------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -228,9 +228,9 @@ $ curl \
|
|||
```
|
||||
|
||||
The response has the same structure as the [service
|
||||
definition](/docs/discovery/services) with one extra field `ContentHash` which
|
||||
definition](/consul/docs/discovery/services) with one extra field `ContentHash` which
|
||||
contains the [hash-based blocking
|
||||
query](/api-docs/features/blocking#hash-based-blocking-queries) hash for the result. The
|
||||
query](/consul/api-docs/features/blocking#hash-based-blocking-queries) hash for the result. The
|
||||
same hash is also present in `X-Consul-ContentHash`.
|
||||
|
||||
## Get local service health
|
||||
|
@ -248,10 +248,10 @@ the URL or use Mime Content negotiation by specifying a HTTP Header
|
|||
| `GET` | `/agent/health/service/name/:service_name?format=text` | `text/plain` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -278,7 +278,7 @@ Those endpoints might be useful for the following use-cases:
|
|||
##### Note
|
||||
|
||||
If you know the ID of service you want to target, it is recommended to use
|
||||
[`/v1/agent/health/service/id/:service_id`](/api-docs/agent/service#get-local-service-health-by-id)
|
||||
[`/v1/agent/health/service/id/:service_id`](/consul/api-docs/agent/service#get-local-service-health-by-id)
|
||||
so you have the result for the service only. When requesting
|
||||
`/v1/agent/health/service/name/:service_name`, the caller will receive the
|
||||
worst state of all services having the given name.
|
||||
|
@ -423,7 +423,7 @@ Retrieve the health state of a specific service on the local agent by ID.
|
|||
| `GET` | `/agent/health/service/id/:service_id?format=text` | `text/plain` |
|
||||
|
||||
The supported request parameters are the same as
|
||||
[`/v1/agent/health/service/name/:service_name`](/api-docs/agent/service#get-local-service-health).
|
||||
[`/v1/agent/health/service/name/:service_name`](/consul/api-docs/agent/service#get-local-service-health).
|
||||
|
||||
### Sample Requests
|
||||
|
||||
|
@ -579,16 +579,16 @@ For "connect-proxy" kind services, the `service:write` ACL for the
|
|||
| `PUT` | `/agent/service/register` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `service:write` |
|
||||
|
||||
The corresponding CLI command is [`consul services register`](/commands/services/register).
|
||||
The corresponding CLI command is [`consul services register`](/consul/commands/services/register).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -599,13 +599,13 @@ The corresponding CLI command is [`consul services register`](/commands/services
|
|||
|
||||
### JSON Request Body Schema
|
||||
|
||||
Note that this endpoint, unlike most also [supports `snake_case`](/docs/discovery/services#service-definition-parameter-case)
|
||||
Note that this endpoint, unlike most also [supports `snake_case`](/consul/docs/discovery/services#service-definition-parameter-case)
|
||||
service definition keys for compatibility with the config file format.
|
||||
|
||||
- `Name` `(string: <required>)` - Specifies the logical name of the service.
|
||||
Many service instances may share the same logical service name. We recommend using
|
||||
[valid DNS labels](https://en.wikipedia.org/wiki/Hostname#Restrictions_on_valid_hostnames)
|
||||
for [compatibility with external DNS](/docs/discovery/services#service-and-tag-names-with-dns).
|
||||
for [compatibility with external DNS](/consul/docs/discovery/services#service-and-tag-names-with-dns).
|
||||
|
||||
- `ID` `(string: "")` - Specifies a unique ID for this service. This must be
|
||||
unique per _agent_. This defaults to the `Name` parameter if not provided.
|
||||
|
@ -613,7 +613,7 @@ service definition keys for compatibility with the config file format.
|
|||
- `Tags` `(array<string>: nil)` - Specifies a list of tags to assign to the
|
||||
service. These tags can be used for later filtering and are exposed via the APIs.
|
||||
We recommend using [valid DNS labels](https://en.wikipedia.org/wiki/Hostname#Restrictions_on_valid_hostnames)
|
||||
for [compatibility with external DNS](/docs/discovery/services#service-and-tag-names-with-dns)
|
||||
for [compatibility with external DNS](/consul/docs/discovery/services#service-and-tag-names-with-dns)
|
||||
|
||||
- `Address` `(string: "")` - Specifies the address of the service. If not
|
||||
provided, the agent's address is used as the address for the service during
|
||||
|
@ -634,28 +634,28 @@ service definition keys for compatibility with the config file format.
|
|||
|
||||
- `Kind` `(string: "")` - The kind of service. Defaults to "" which is a
|
||||
typical Consul service. This value may also be "connect-proxy" for
|
||||
[Connect](/docs/connect) proxies representing another service,
|
||||
"mesh-gateway" for instances of a [mesh gateway](/docs/connect/gateways/mesh-gateway#connect-proxy-configuration),
|
||||
"terminating-gateway" for instances of a [terminating gateway](/docs/connect/gateways/terminating-gateway),
|
||||
or "ingress-gateway" for instances of a [ingress gateway](/docs/connect/gateways/ingress-gateway).
|
||||
[Connect](/consul/docs/connect) proxies representing another service,
|
||||
"mesh-gateway" for instances of a [mesh gateway](/consul/docs/connect/gateways/mesh-gateway#connect-proxy-configuration),
|
||||
"terminating-gateway" for instances of a [terminating gateway](/consul/docs/connect/gateways/terminating-gateway),
|
||||
or "ingress-gateway" for instances of a [ingress gateway](/consul/docs/connect/gateways/ingress-gateway).
|
||||
|
||||
- `Proxy` `(Proxy: nil)` - From 1.2.3 on, specifies the configuration for a
|
||||
Connect service proxy instance. This is only valid if `Kind` defines a proxy or gateway.
|
||||
See the [Proxy documentation](/docs/connect/registration/service-registration)
|
||||
See the [Proxy documentation](/consul/docs/connect/registration/service-registration)
|
||||
for full details.
|
||||
|
||||
- `Connect` `(Connect: nil)` - Specifies the
|
||||
[configuration for Connect](/docs/connect/configuration). See the
|
||||
[configuration for Connect](/consul/docs/connect/configuration). See the
|
||||
[Connect Structure](#connect-structure) section below for supported fields.
|
||||
|
||||
- `Check` `(Check: nil)` - Specifies a check. Please see the
|
||||
[check documentation](/api-docs/agent/check) for more information about the
|
||||
[check documentation](/consul/api-docs/agent/check) for more information about the
|
||||
accepted fields. If you don't provide a name or id for the check then they
|
||||
will be generated. To provide a custom id and/or name set the `CheckID`
|
||||
and/or `Name` field.
|
||||
|
||||
- `Checks` `(array<Check>: nil)` - Specifies a list of checks. Please see the
|
||||
[check documentation](/api-docs/agent/check) for more information about the
|
||||
[check documentation](/consul/api-docs/agent/check) for more information about the
|
||||
accepted fields. If you don't provide a name or id for the check then they
|
||||
will be generated. To provide a custom id and/or name set the `CheckID`
|
||||
and/or `Name` field. The automatically generated `Name` and `CheckID` depend
|
||||
|
@ -665,7 +665,7 @@ service definition keys for compatibility with the config file format.
|
|||
|
||||
- `EnableTagOverride` `(bool: false)` - Specifies to disable the anti-entropy
|
||||
feature for this service's tags. If `EnableTagOverride` is set to `true` then
|
||||
external agents can update this service in the [catalog](/api-docs/catalog)
|
||||
external agents can update this service in the [catalog](/consul/api-docs/catalog)
|
||||
and modify the tags. Subsequent local sync operations by this agent will
|
||||
ignore the updated tags. For instance, if an external agent modified both the
|
||||
tags and the port for this service and `EnableTagOverride` was set to `true`
|
||||
|
@ -677,7 +677,7 @@ service definition keys for compatibility with the config file format.
|
|||
modifications would be lost.
|
||||
|
||||
- `Weights` `(Weights: nil)` - Specifies weights for the service. Please see the
|
||||
[service documentation](/docs/discovery/services) for more information about
|
||||
[service documentation](/consul/docs/discovery/services) for more information about
|
||||
weights. If this field is not provided weights will default to
|
||||
`{"Passing": 1, "Warning": 1}`.
|
||||
|
||||
|
@ -687,7 +687,7 @@ service definition keys for compatibility with the config file format.
|
|||
are independent of one another. Updating the tags for the service registered
|
||||
on one node is independent of the same service (by name) registered on
|
||||
another node. If `EnableTagOverride` is not specified the default value is
|
||||
`false`. See [anti-entropy syncs](/docs/architecture/anti-entropy) for
|
||||
`false`. See [anti-entropy syncs](/consul/docs/architecture/anti-entropy) for
|
||||
more info.
|
||||
|
||||
#### Connect Structure
|
||||
|
@ -695,17 +695,17 @@ service definition keys for compatibility with the config file format.
|
|||
For the `Connect` field, the parameters are:
|
||||
|
||||
- `Native` `(bool: false)` - Specifies whether this service supports
|
||||
the [Connect](/docs/connect) protocol [natively](/docs/connect/native).
|
||||
the [Connect](/consul/docs/connect) protocol [natively](/consul/docs/connect/native).
|
||||
If this is true, then Connect proxies, DNS queries, etc. will be able to
|
||||
service discover this service.
|
||||
- `Proxy` `(Proxy: nil)` -
|
||||
[**Deprecated**](/docs/connect/proxies/managed-deprecated) Specifies that
|
||||
[**Deprecated**](/consul/docs/connect/proxies/managed-deprecated) Specifies that
|
||||
a managed Connect proxy should be started for this service instance, and
|
||||
optionally provides configuration for the proxy. The format is as documented
|
||||
in [Managed Proxy Deprecation](/docs/connect/proxies/managed-deprecated).
|
||||
in [Managed Proxy Deprecation](/consul/docs/connect/proxies/managed-deprecated).
|
||||
- `SidecarService` `(ServiceDefinition: nil)` - Specifies an optional nested
|
||||
service definition to register. For more information see
|
||||
[Sidecar Service Registration](/docs/connect/registration/sidecar-service).
|
||||
[Sidecar Service Registration](/consul/docs/connect/registration/sidecar-service).
|
||||
|
||||
### Sample Payload
|
||||
|
||||
|
@ -755,16 +755,16 @@ is an associated check, that is also deregistered.
|
|||
| `PUT` | `/agent/service/deregister/:service_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `service:write` |
|
||||
|
||||
The corresponding CLI command is [`consul services deregister`](/commands/services/deregister).
|
||||
The corresponding CLI command is [`consul services deregister`](/consul/commands/services/deregister).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -795,10 +795,10 @@ will be automatically restored on agent restart.
|
|||
| `PUT` | `/agent/service/maintenance/:service_id` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
|
|
@ -44,7 +44,7 @@ $ curl \
|
|||
this method is highly discouraged because the token can show up in access logs as part of the URL.
|
||||
The `?token=` query parameter is deprecated and will be removed in Consul 1.17.
|
||||
|
||||
To learn more about the ACL system read the [documentation](/docs/security/acl).
|
||||
To learn more about the ACL system read the [documentation](/consul/docs/security/acl).
|
||||
|
||||
## Version Prefix
|
||||
|
||||
|
@ -89,11 +89,11 @@ However, we generally recommend using resource names that don't require URL-enco
|
|||
Depending on the validation that Consul applies to a resource name,
|
||||
Consul may still reject a request if it considers the resource name invalid for that endpoint.
|
||||
And even if Consul considers the resource name valid, it may degrade other functionality,
|
||||
such as failed [DNS lookups](/docs/discovery/dns)
|
||||
such as failed [DNS lookups](/consul/docs/discovery/dns)
|
||||
for nodes or services with names containing invalid DNS characters.
|
||||
|
||||
This HTTP API capability also allows the
|
||||
[CLI to accept arguments with URL-invalid characters](/commands#arguments-with-url-invalid-characters).
|
||||
[CLI to accept arguments with URL-invalid characters](/consul/commands#arguments-with-url-invalid-characters).
|
||||
|
||||
### Invalid Characters
|
||||
|
||||
|
@ -103,7 +103,7 @@ The linefeed character (`%0a`) will cause a request to be rejected even if it is
|
|||
|
||||
Consul 0.7 added the ability to translate addresses in HTTP response based on
|
||||
the configuration setting for
|
||||
[`translate_wan_addrs`](/docs/agent/config/config-files#translate_wan_addrs). In order
|
||||
[`translate_wan_addrs`](/consul/docs/agent/config/config-files#translate_wan_addrs). In order
|
||||
to allow clients to know if address translation is in effect, the
|
||||
`X-Consul-Translate-Addresses` header will be added if translation is enabled,
|
||||
and will have a value of `true`. If translation is not enabled then this header
|
||||
|
@ -114,9 +114,9 @@ will not be present.
|
|||
All API responses for Consul versions after 1.9 will include an HTTP response
|
||||
header `X-Consul-Default-ACL-Policy` set to either "allow" or "deny" which
|
||||
mirrors the current value of the agent's
|
||||
[`acl.default_policy`](/docs/agent/config/config-files#acl_default_policy) option.
|
||||
[`acl.default_policy`](/consul/docs/agent/config/config-files#acl_default_policy) option.
|
||||
|
||||
This is also the default [intention](/docs/connect/intentions) enforcement
|
||||
This is also the default [intention](/consul/docs/connect/intentions) enforcement
|
||||
action if no intention matches.
|
||||
|
||||
This is returned even if ACLs are disabled.
|
||||
|
|
|
@ -16,18 +16,18 @@ API methods look similar.
|
|||
|
||||
This endpoint is a low-level mechanism for registering or updating
|
||||
entries in the catalog. It is usually preferable to instead use the
|
||||
[agent endpoints](/api-docs/agent) for registration as they are simpler and
|
||||
perform [anti-entropy](/docs/architecture/anti-entropy).
|
||||
[agent endpoints](/consul/api-docs/agent) for registration as they are simpler and
|
||||
perform [anti-entropy](/consul/docs/architecture/anti-entropy).
|
||||
|
||||
| Method | Path | Produces |
|
||||
| ------ | ------------------- | ------------------ |
|
||||
| `PUT` | `/catalog/register` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -59,17 +59,17 @@ The table below shows this endpoint's support for
|
|||
provided, it will be defaulted to the value of the `Service.Service` property.
|
||||
Only one service with a given `ID` may be present per node. We recommend using
|
||||
[valid DNS labels](https://en.wikipedia.org/wiki/Hostname#Restrictions_on_valid_hostnames)
|
||||
for service definition names for [compatibility with external DNS](/docs/discovery/services#service-and-tag-names-with-dns).
|
||||
for service definition names for [compatibility with external DNS](/consul/docs/discovery/services#service-and-tag-names-with-dns).
|
||||
The service `Tags`, `Address`, `Meta`, and `Port` fields are all optional. For more
|
||||
information about these fields and the implications of setting them,
|
||||
see the [Service - Agent API](/api-docs/agent/service) page
|
||||
see the [Service - Agent API](/consul/api-docs/agent/service) page
|
||||
as registering services differs between using this or the Services Agent endpoint.
|
||||
|
||||
- `Check` `(Check: nil)` - Specifies to register a check. The register API
|
||||
manipulates the health check entry in the Catalog, but it does not setup the
|
||||
script, TTL, or HTTP check to monitor the node's health. To truly enable a new
|
||||
health check, the check must either be provided in agent configuration or set
|
||||
via the [agent endpoint](agent).
|
||||
via the [agent endpoint](https://consul.io/agent).
|
||||
|
||||
The `CheckID` can be omitted and will default to the value of `Name`. As
|
||||
with `Service.ID`, the `CheckID` must be unique on this node. `Notes` is an
|
||||
|
@ -79,7 +79,7 @@ The table below shows this endpoint's support for
|
|||
check. The `Status` must be one of `passing`, `warning`, or `critical`.
|
||||
|
||||
The `Definition` field can be provided with details for a TCP or HTTP health
|
||||
check. For more information, see the [Health Checks](/docs/discovery/checks) page.
|
||||
check. For more information, see the [Health Checks](/consul/docs/discovery/checks) page.
|
||||
|
||||
Multiple checks can be provided by replacing `Check` with `Checks` and
|
||||
sending an array of `Check` objects.
|
||||
|
@ -168,18 +168,18 @@ $ curl \
|
|||
|
||||
This endpoint is a low-level mechanism for directly removing
|
||||
entries from the Catalog. It is usually preferable to instead use the
|
||||
[agent endpoints](/api-docs/agent) for deregistration as they are simpler and
|
||||
perform [anti-entropy](/docs/architecture/anti-entropy).
|
||||
[agent endpoints](/consul/api-docs/agent) for deregistration as they are simpler and
|
||||
perform [anti-entropy](/consul/docs/architecture/anti-entropy).
|
||||
|
||||
| Method | Path | Produces |
|
||||
| ------ | --------------------- | ------------------ |
|
||||
| `PUT` | `/catalog/deregister` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -263,16 +263,16 @@ Consul servers are routable.
|
|||
| `GET` | `/catalog/datacenters` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `simple` | `none` |
|
||||
|
||||
The corresponding CLI command is [`consul catalog datacenters`](/commands/catalog/datacenters).
|
||||
The corresponding CLI command is [`consul catalog datacenters`](/consul/commands/catalog/datacenters).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -298,16 +298,16 @@ This endpoint and returns the nodes registered in a given datacenter.
|
|||
| `GET` | `/catalog/nodes` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `node:read` |
|
||||
|
||||
The corresponding CLI command is [`consul catalog nodes`](/commands/catalog/nodes).
|
||||
The corresponding CLI command is [`consul catalog nodes`](/consul/commands/catalog/nodes).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -394,16 +394,16 @@ This endpoint returns the services registered in a given datacenter.
|
|||
| `GET` | `/catalog/services` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | -------------------- | -------------- |
|
||||
| `YES` | `all` | `background refresh` | `service:read` |
|
||||
|
||||
The corresponding CLI command is [`consul catalog services`](/commands/catalog/services).
|
||||
The corresponding CLI command is [`consul catalog services`](/consul/commands/catalog/services).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -499,10 +499,10 @@ This endpoint returns the nodes providing a service in a given datacenter.
|
|||
| `GET` | `/catalog/service/:service_name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | -------------------- | ------------------------ |
|
||||
|
@ -539,10 +539,10 @@ The table below shows this endpoint's support for
|
|||
|
||||
- `merge-central-config` - Include this flag in a request for `connect-proxy` kind or `*-gateway` kind
|
||||
services to return a fully resolved service definition that includes merged values from the
|
||||
[proxy-defaults/global](/docs/connect/config-entries/proxy-defaults) and
|
||||
[service-defaults/:service](/docs/connect/config-entries/service-defaults) config entries.
|
||||
[proxy-defaults/global](/consul/docs/connect/config-entries/proxy-defaults) and
|
||||
[service-defaults/:service](/consul/docs/connect/config-entries/service-defaults) config entries.
|
||||
Returning a fully resolved service definition is useful when a service was registered using the
|
||||
[/catalog/register](/api-docs/catalog#register_entity) endpoint, which does not automatically merge config entries.
|
||||
[/catalog/register](/consul/api-docs/catalog#register_entity) endpoint, which does not automatically merge config entries.
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the services you lookup.
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
@ -647,12 +647,12 @@ $ curl \
|
|||
service instance. This includes both the address as well as the port.
|
||||
|
||||
- `ServiceKind` is the kind of service, usually "". See the Agent
|
||||
[service registration API](/api-docs/agent/service#kind) for more information.
|
||||
[service registration API](/consul/api-docs/agent/service#kind) for more information.
|
||||
|
||||
- `ServiceProxy` is the proxy config as specified in
|
||||
[Connect Proxies](/docs/connect/proxies).
|
||||
[Connect Proxies](/consul/docs/connect/proxies).
|
||||
|
||||
- `ServiceConnect` are the [Connect](/docs/connect) settings. The
|
||||
- `ServiceConnect` are the [Connect](/consul/docs/connect) settings. The
|
||||
value of this struct is equivalent to the `Connect` field for service
|
||||
registration.
|
||||
|
||||
|
@ -707,7 +707,7 @@ following selectors and filter operations being supported:
|
|||
## List Nodes for Connect-capable Service
|
||||
|
||||
This endpoint returns the nodes providing a
|
||||
[Connect-capable](/docs/connect) service in a given datacenter.
|
||||
[Connect-capable](/consul/docs/connect) service in a given datacenter.
|
||||
This will include both proxies and native integrations. A service may
|
||||
register both Connect-capable and incapable services at the same time,
|
||||
so this endpoint may be used to filter only the Connect-capable endpoints.
|
||||
|
@ -719,7 +719,7 @@ so this endpoint may be used to filter only the Connect-capable endpoints.
|
|||
| `GET` | `/catalog/connect/:service` | `application/json` |
|
||||
|
||||
Parameters and response format are the same as
|
||||
[`/catalog/service/:service_name`](/api-docs/catalog#list-nodes-for-service).
|
||||
[`/catalog/service/:service_name`](/consul/api-docs/catalog#list-nodes-for-service).
|
||||
|
||||
## Retrieve Map of Services for a Node
|
||||
|
||||
|
@ -732,10 +732,10 @@ This endpoint returns the node's registered services.
|
|||
| `GET` | `/catalog/node/:node_name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------ |
|
||||
|
@ -861,10 +861,10 @@ This endpoint returns the node's registered services.
|
|||
| `GET` | `/catalog/node-services/:node_name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------ |
|
||||
|
@ -884,10 +884,10 @@ The table below shows this endpoint's support for
|
|||
|
||||
- `merge-central-config` - Include this flag in a request for `connect-proxy` kind or `*-gateway` kind
|
||||
services to return a fully resolved service definition that includes merged values from the
|
||||
[proxy-defaults/global](/docs/connect/config-entries/proxy-defaults) and
|
||||
[service-defaults/:service](/docs/connect/config-entries/service-defaults) config entries.
|
||||
[proxy-defaults/global](/consul/docs/connect/config-entries/proxy-defaults) and
|
||||
[service-defaults/:service](/consul/docs/connect/config-entries/service-defaults) config entries.
|
||||
Returning a fully resolved service definition is useful when a service was registered using the
|
||||
[/catalog/register](/api-docs/catalog#register_entity) endpoint, which does not automatically merge config entries.
|
||||
[/catalog/register](/consul/api-docs/catalog#register_entity) endpoint, which does not automatically merge config entries.
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the services you lookup.
|
||||
The namespace may be specified as '\*' to return results for all namespaces.
|
||||
|
@ -1002,10 +1002,10 @@ This endpoint returns the services associated with an ingress gateway or termina
|
|||
| `GET` | `/catalog/gateway-services/:gateway` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -1113,7 +1113,7 @@ $ curl \
|
|||
- `Service.Namespace` is the Consul Enterprise namespace of a service associated with the gateway
|
||||
|
||||
- `GatewayKind` is the kind of service, will be one of "ingress-gateway" or "terminating-gateway". See the Agent
|
||||
[service registration API](/api-docs/agent/service#kind) for more information.
|
||||
[service registration API](/consul/api-docs/agent/service#kind) for more information.
|
||||
|
||||
- `CAFile` is the path to a CA file the gateway will use for TLS origination to the associated service
|
||||
|
||||
|
|
|
@ -10,9 +10,9 @@ description: |-
|
|||
|
||||
The `/config` endpoints create, update, delete and query central configuration
|
||||
entries registered with Consul. See the
|
||||
[agent configuration](/docs/agent/config/config-files#enable_central_service_config)
|
||||
[agent configuration](/consul/docs/agent/config/config-files#enable_central_service_config)
|
||||
for more information on how to enable this functionality for centrally
|
||||
configuring services and [configuration entries docs](/docs/agent/config-entries) for a description
|
||||
configuring services and [configuration entries docs](/consul/docs/agent/config-entries) for a description
|
||||
of the configuration entries content.
|
||||
|
||||
## Apply Configuration
|
||||
|
@ -24,10 +24,10 @@ This endpoint creates or updates the given config entry.
|
|||
| `PUT` | `/config` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------------------------- |
|
||||
|
@ -48,7 +48,7 @@ The table below shows this endpoint's support for
|
|||
| service-splitter | `service:write` |
|
||||
| terminating-gateway | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul config write`](/commands/config/write).
|
||||
The corresponding CLI command is [`consul config write`](/consul/commands/config/write).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -91,10 +91,10 @@ This endpoint returns a specific config entry.
|
|||
| `GET` | `/config/:kind/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -113,7 +113,7 @@ The table below shows this endpoint's support for
|
|||
| service-splitter | `service:read` |
|
||||
| terminating-gateway | `service:read` |
|
||||
|
||||
The corresponding CLI command is [`consul config read`](/commands/config/read).
|
||||
The corresponding CLI command is [`consul config read`](/consul/commands/config/read).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -162,10 +162,10 @@ This endpoint returns all config entries of the given kind.
|
|||
| `GET` | `/config/:kind` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------------------- |
|
||||
|
@ -184,7 +184,7 @@ The table below shows this endpoint's support for
|
|||
| service-splitter | `service:read` |
|
||||
| terminating-gateway | `service:read` |
|
||||
|
||||
The corresponding CLI command is [`consul config list`](/commands/config/list).
|
||||
The corresponding CLI command is [`consul config list`](/consul/commands/config/list).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -236,10 +236,10 @@ This endpoint deletes the given config entry.
|
|||
| `DELETE` | `/config/:kind/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------------------------- |
|
||||
|
@ -258,7 +258,7 @@ The table below shows this endpoint's support for
|
|||
| service-splitter | `service:write` |
|
||||
| terminating-gateway | `operator:write ` |
|
||||
|
||||
The corresponding CLI command is [`consul config delete`](/commands/config/delete).
|
||||
The corresponding CLI command is [`consul config delete`](/consul/commands/config/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
|
|
@ -21,10 +21,10 @@ the cluster.
|
|||
| `GET` | `/connect/ca/roots` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -113,10 +113,10 @@ This endpoint returns the current CA configuration.
|
|||
| `GET` | `/connect/ca/configuration` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ----------------------------- |
|
||||
|
@ -125,7 +125,7 @@ The table below shows this endpoint's support for
|
|||
<sup>1</sup> ACL required was <code>operator:read</code> prior to versions 1.8.6,
|
||||
1.7.10, and 1.6.10.
|
||||
|
||||
The corresponding CLI command is [`consul connect ca get-config`](/commands/connect/ca#get-config).
|
||||
The corresponding CLI command is [`consul connect ca get-config`](/consul/commands/connect/ca#get-config).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -151,30 +151,30 @@ $ curl \
|
|||
## Update CA Configuration
|
||||
|
||||
This endpoint updates the configuration for the CA. If this results in a
|
||||
new root certificate being used, the [Root Rotation](/docs/connect/ca#root-certificate-rotation) process will be triggered.
|
||||
new root certificate being used, the [Root Rotation](/consul/docs/connect/ca#root-certificate-rotation) process will be triggered.
|
||||
|
||||
| Method | Path | Produces |
|
||||
| ------ | --------------------------- | ------------------ |
|
||||
| `PUT` | `/connect/ca/configuration` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul connect ca set-config`](/commands/connect/ca#set-config).
|
||||
The corresponding CLI command is [`consul connect ca set-config`](/consul/commands/connect/ca#set-config).
|
||||
|
||||
~> **If currently using Vault CA provider:**
|
||||
If you intend to change the CA provider from Vault to another,
|
||||
or to change the Vault provider's [`RootPKIPath`](/docs/connect/ca/vault#rootpkipath),
|
||||
or to change the Vault provider's [`RootPKIPath`](/consul/docs/connect/ca/vault#rootpkipath),
|
||||
you must temporarily elevate the privileges of the Vault token
|
||||
or auth method in use as described in the
|
||||
[Vault CA provider documentation](/docs/connect/ca/vault#additional-vault-acl-policies-for-sensitive-operations).
|
||||
[Vault CA provider documentation](/consul/docs/connect/ca/vault#additional-vault-acl-policies-for-sensitive-operations).
|
||||
|
||||
### JSON Request Body Schema
|
||||
|
||||
|
@ -182,7 +182,7 @@ The corresponding CLI command is [`consul connect ca set-config`](/commands/conn
|
|||
|
||||
- `Config` `(map[string]string: <required>)` - The raw configuration to use
|
||||
for the chosen provider. For more information on configuring the Connect CA
|
||||
providers, see [Provider Config](/docs/connect/ca).
|
||||
providers, see [Provider Config](/consul/docs/connect/ca).
|
||||
|
||||
- `ForceWithoutCrossSigning` `(bool: false)` - Indicates that the CA change
|
||||
should be forced to complete even if the current CA doesn't support root cross-signing.
|
||||
|
@ -191,7 +191,7 @@ The corresponding CLI command is [`consul connect ca set-config`](/commands/conn
|
|||
until service mesh proxies and/or Consul client agents receive a new certificate
|
||||
that establishes trust with the new root.
|
||||
Do not use this field unless you are sure you need it.
|
||||
Refer to [Forced Rotation Without Cross-Signing](/docs/connect/ca#forced-rotation-without-cross-signing)
|
||||
Refer to [Forced Rotation Without Cross-Signing](/consul/docs/connect/ca#forced-rotation-without-cross-signing)
|
||||
for more detail.
|
||||
|
||||
### Sample Payload
|
||||
|
|
|
@ -9,11 +9,11 @@ description: >-
|
|||
# Connect HTTP Endpoint
|
||||
|
||||
The `/connect` endpoints provide access to
|
||||
[Connect-related](/docs/connect) operations for
|
||||
[Connect-related](/consul/docs/connect) operations for
|
||||
intentions and the certificate authority.
|
||||
|
||||
There are also Connect-related endpoints in the
|
||||
[Agent](/api-docs/agent) and [Catalog](/api-docs/catalog) APIs. For example,
|
||||
[Agent](/consul/api-docs/agent) and [Catalog](/consul/api-docs/catalog) APIs. For example,
|
||||
the API for requesting a TLS certificate for a service is part of the agent
|
||||
APIs. And the catalog API has an endpoint for finding all Connect-capable
|
||||
services in the catalog.
|
||||
|
|
|
@ -9,11 +9,11 @@ description: |-
|
|||
# Intentions - Connect HTTP API
|
||||
|
||||
The `/connect/intentions` endpoint provide tools for managing
|
||||
[intentions](/docs/connect/intentions).
|
||||
[intentions](/consul/docs/connect/intentions).
|
||||
|
||||
-> **1.9.0 and later:** Reading and writing intentions has been
|
||||
migrated to the
|
||||
[`service-intentions`](/docs/connect/config-entries/service-intentions)
|
||||
[`service-intentions`](/consul/docs/connect/config-entries/service-intentions)
|
||||
config entry kind.
|
||||
|
||||
## Upsert Intention by Name ((#upsert-intention-by-name))
|
||||
|
@ -36,10 +36,10 @@ be persisted using this endpoint and will require editing the enclosing
|
|||
| `PUT` | `/connect/intentions/exact` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------ |
|
||||
|
@ -54,19 +54,19 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention create -replace`](/commands/intention/create#replace).
|
||||
The corresponding CLI command is [`consul intention create -replace`](/consul/commands/intention/create#replace).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
- `source` `(string: <required>)` - Specifies the source service
|
||||
according to the [source naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [source naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `destination` `(string: <required>)` - Specifies the destination service
|
||||
according to the [destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the default namespace
|
||||
to use when `source` or `destination` query parameters do not include a namespace
|
||||
as shown in the [source and destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
as shown in the [source and destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
||||
### JSON Request Body Schema
|
||||
|
@ -83,7 +83,7 @@ The corresponding CLI command is [`consul intention create -replace`](/commands/
|
|||
the `Permissions` field.
|
||||
|
||||
- `Permissions` `(array<IntentionPermission>)` - The list of all [additional L7
|
||||
attributes](/docs/connect/config-entries/service-intentions#intentionpermission)
|
||||
attributes](/consul/docs/connect/config-entries/service-intentions#intentionpermission)
|
||||
that extend the intention match criteria.
|
||||
|
||||
Permission precedence is applied top to bottom. For any given request the
|
||||
|
@ -91,7 +91,7 @@ The corresponding CLI command is [`consul intention create -replace`](/commands/
|
|||
evaluation. As with L4 intentions, traffic that fails to match any of the
|
||||
provided permissions in this intention will be subject to the default
|
||||
intention behavior is defined by the default [ACL
|
||||
policy](/docs/agent/config/config-files#acl_default_policy).
|
||||
policy](/consul/docs/agent/config/config-files#acl_default_policy).
|
||||
|
||||
This should be omitted for an L4 intention as it is mutually exclusive with
|
||||
the `Action` field.
|
||||
|
@ -127,7 +127,7 @@ true
|
|||
|
||||
-> **Deprecated** - This endpoint is deprecated in Consul 1.9.0 in favor of
|
||||
[upserting by name](#upsert-intention-by-name) or editing the
|
||||
[`service-intentions`](/docs/connect/config-entries/service-intentions) config
|
||||
[`service-intentions`](/consul/docs/connect/config-entries/service-intentions) config
|
||||
entry for the destination.
|
||||
|
||||
This endpoint creates a new intention and returns its ID if it was created
|
||||
|
@ -142,10 +142,10 @@ existing intention or delete it prior to creating a new one.
|
|||
| `POST` | `/connect/intentions` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------ |
|
||||
|
@ -160,13 +160,13 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention create`](/commands/intention/create).
|
||||
The corresponding CLI command is [`consul intention create`](/consul/commands/intention/create).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the default namespace
|
||||
to use when `SourceNS` or `DestinationNS` request body parameters do not include a namespace
|
||||
as shown in the [source and destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
as shown in the [source and destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
||||
### JSON Request Body Schema
|
||||
|
@ -229,7 +229,7 @@ $ curl \
|
|||
|
||||
-> **Deprecated** - This endpoint is deprecated in Consul 1.9.0 in favor of
|
||||
[upserting by name](#upsert-intention-by-name) or editing the
|
||||
[`service-intentions`](/docs/connect/config-entries/service-intentions) config
|
||||
[`service-intentions`](/consul/docs/connect/config-entries/service-intentions) config
|
||||
entry for the destination.
|
||||
|
||||
This endpoint updates an intention with the given values.
|
||||
|
@ -239,10 +239,10 @@ This endpoint updates an intention with the given values.
|
|||
| `PUT` | `/connect/intentions/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------ |
|
||||
|
@ -293,10 +293,10 @@ This endpoint reads a specific intention by its unique source and destination.
|
|||
| `GET` | `/connect/intentions/exact` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ----------------------------- |
|
||||
|
@ -311,19 +311,19 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention get`](/commands/intention/get).
|
||||
The corresponding CLI command is [`consul intention get`](/consul/commands/intention/get).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
- `source` `(string: <required>)` - Specifies the source service
|
||||
according to the [source naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [source naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `destination` `(string: <required>)` - Specifies the destination service
|
||||
according to the [destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the default namespace
|
||||
to use when `source` or `destination` query parameters do not include a namespace
|
||||
as shown in the [source and destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
as shown in the [source and destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
||||
### Sample Request
|
||||
|
@ -355,7 +355,7 @@ $ curl \
|
|||
|
||||
-> **Deprecated** - This endpoint is deprecated in Consul 1.9.0 in favor of
|
||||
[reading by name](#read-specific-intention-by-name) or by viewing the
|
||||
[`service-intentions`](/docs/connect/config-entries/service-intentions)
|
||||
[`service-intentions`](/consul/docs/connect/config-entries/service-intentions)
|
||||
config entry for the destination.
|
||||
|
||||
This endpoint reads a specific intention.
|
||||
|
@ -365,10 +365,10 @@ This endpoint reads a specific intention.
|
|||
| `GET` | `/connect/intentions/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ----------------------------- |
|
||||
|
@ -383,7 +383,7 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention get`](/commands/intention/get).
|
||||
The corresponding CLI command is [`consul intention get`](/consul/commands/intention/get).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -428,10 +428,10 @@ This endpoint lists all intentions.
|
|||
| `GET` | `/connect/intentions` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ----------------------------- |
|
||||
|
@ -446,7 +446,7 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention list`](/commands/intention/list).
|
||||
The corresponding CLI command is [`consul intention list`](/consul/commands/intention/list).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -515,10 +515,10 @@ This endpoint deletes a specific intention by its unique source and destination.
|
|||
| `DELETE` | `/connect/intentions/exact` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------ |
|
||||
|
@ -533,19 +533,19 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention delete`](/commands/intention/delete).
|
||||
The corresponding CLI command is [`consul intention delete`](/consul/commands/intention/delete).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
- `source` `(string: <required>)` - Specifies the source service
|
||||
according to the [source naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [source naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `destination` `(string: <required>)` - Specifies the destination service
|
||||
according to the [destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the default namespace
|
||||
to use when `source` or `destination` query parameters do not include a namespace
|
||||
as shown in the [source and destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
as shown in the [source and destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
||||
### Sample Request
|
||||
|
@ -560,7 +560,7 @@ $ curl \
|
|||
|
||||
-> **Deprecated** - This endpoint is deprecated in Consul 1.9.0 in favor of
|
||||
[deleting by name](#delete-intention-by-name) or editing the
|
||||
[`service-intentions`](/docs/connect/config-entries/service-intentions) config
|
||||
[`service-intentions`](/consul/docs/connect/config-entries/service-intentions) config
|
||||
entry for the destination.
|
||||
|
||||
This endpoint deletes a specific intention.
|
||||
|
@ -570,10 +570,10 @@ This endpoint deletes a specific intention.
|
|||
| `DELETE` | `/connect/intentions/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------ |
|
||||
|
@ -588,7 +588,7 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention delete`](/commands/intention/delete).
|
||||
The corresponding CLI command is [`consul intention delete`](/consul/commands/intention/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -614,7 +614,7 @@ networking layer 4 (e.g. TCP) integration.
|
|||
|
||||
For performance and reliability reasons it is desirable to implement intention
|
||||
enforcement by listing [intentions that match the
|
||||
destination](/api-docs/connect/intentions#list-matching-intentions) and representing
|
||||
destination](/consul/api-docs/connect/intentions#list-matching-intentions) and representing
|
||||
them in the native configuration of the proxy itself (such as RBAC for Envoy).
|
||||
|
||||
This endpoint will work even if the destination service has
|
||||
|
@ -626,10 +626,10 @@ does not contain any information about the intention itself.
|
|||
| `GET` | `/connect/intentions/check` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ----------------------------- |
|
||||
|
@ -644,19 +644,19 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention check`](/commands/intention/check).
|
||||
The corresponding CLI command is [`consul intention check`](/consul/commands/intention/check).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
- `source` `(string: <required>)` - Specifies the source service
|
||||
according to the [source naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [source naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `destination` `(string: <required>)` - Specifies the destination service
|
||||
according to the [destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the default namespace
|
||||
to use when `source` or `destination` query parameters do not include a namespace
|
||||
as shown in the [source and destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
as shown in the [source and destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
||||
### Sample Request
|
||||
|
@ -686,10 +686,10 @@ The intentions in the response are in evaluation order.
|
|||
| `GET` | `/connect/intentions/match` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | -------------------- | ----------------------------- |
|
||||
|
@ -704,7 +704,7 @@ The table below shows this endpoint's support for
|
|||
for more details.
|
||||
</p>
|
||||
|
||||
The corresponding CLI command is [`consul intention match`](/commands/intention/match).
|
||||
The corresponding CLI command is [`consul intention match`](/consul/commands/intention/match).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -712,12 +712,12 @@ The corresponding CLI command is [`consul intention match`](/commands/intention/
|
|||
by "source" or "destination".
|
||||
|
||||
- `name` `(string: <required>)` - Specifies a name to match
|
||||
according to the [source and destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
according to the [source and destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
You can repeat this parameter for batching multiple matches.
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the default namespace
|
||||
to use when the `name` query parameter does not include a namespace
|
||||
as shown in the [source and destination naming conventions](/commands/intention#source-and-destination-naming).
|
||||
as shown in the [source and destination naming conventions](/consul/commands/intention#source-and-destination-naming).
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
||||
### Sample Request
|
||||
|
|
|
@ -13,7 +13,7 @@ The `/coordinate` endpoints query for the network coordinates for nodes in the
|
|||
local datacenter as well as Consul servers in the local datacenter and remote
|
||||
datacenters.
|
||||
|
||||
Please see the [Network Coordinates](/docs/architecture/coordinates) internals
|
||||
Please see the [Network Coordinates](/consul/docs/architecture/coordinates) internals
|
||||
guide for more information on how these coordinates are computed, and for
|
||||
details on how to perform calculations with them.
|
||||
|
||||
|
@ -29,16 +29,16 @@ cluster.
|
|||
| `GET` | `/coordinate/datacenters` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `none` |
|
||||
|
||||
The corresponding CLI command is [`consul rtt -wan`](/commands/rtt#wan).
|
||||
The corresponding CLI command is [`consul rtt -wan`](/consul/commands/rtt#wan).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -85,16 +85,16 @@ datacenter.
|
|||
| `GET` | `/coordinate/nodes` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `node:read` |
|
||||
|
||||
The corresponding CLI command is [`consul rtt`](/commands/rtt).
|
||||
The corresponding CLI command is [`consul rtt`](/consul/commands/rtt).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -144,10 +144,10 @@ This endpoint returns the LAN network coordinates for the given node.
|
|||
| `GET` | `/coordinate/node/:node_name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -206,10 +206,10 @@ datacenter.
|
|||
| `PUT` | `/coordinate/update` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
|
|
@ -9,17 +9,17 @@ description: The /discovery-chain endpoints are for interacting with the discove
|
|||
-> **1.6.0+:** The discovery chain API is available in Consul versions 1.6.0 and newer.
|
||||
|
||||
~> This is a low-level API primarily targeted at developers building external
|
||||
[Connect proxy integrations](/docs/connect/proxies/integrate). Future
|
||||
[Connect proxy integrations](/consul/docs/connect/proxies/integrate). Future
|
||||
high-level proxy integration APIs may obviate the need for this API over time.
|
||||
|
||||
The `/discovery-chain` endpoint returns the compiled [discovery
|
||||
chain](/docs/connect/l7-traffic/discovery-chain) for a service.
|
||||
chain](/consul/docs/connect/l7-traffic/discovery-chain) for a service.
|
||||
|
||||
This will fetch all related [configuration
|
||||
entries](/docs/agent/config-entries) and render them into a form suitable
|
||||
for use by a [connect proxy](/docs/connect/proxies) implementation. This
|
||||
entries](/consul/docs/agent/config-entries) and render them into a form suitable
|
||||
for use by a [connect proxy](/consul/docs/connect/proxies) implementation. This
|
||||
is a key component of [L7 Traffic
|
||||
Management](/docs/connect/l7-traffic).
|
||||
Management](/consul/docs/connect/l7-traffic).
|
||||
|
||||
## Read Compiled Discovery Chain
|
||||
|
||||
|
@ -38,10 +38,10 @@ the `POST` method must be used, otherwise `GET` is sufficient.
|
|||
</p>
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | -------------------- | -------------- |
|
||||
|
@ -58,8 +58,8 @@ The table below shows this endpoint's support for
|
|||
compilation. This will default to the datacenter of the agent being queried.
|
||||
|
||||
This value comes from an [upstream
|
||||
configuration](/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
[`datacenter`](/docs/connect/registration/service-registration#datacenter)
|
||||
configuration](/consul/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
[`datacenter`](/consul/docs/connect/registration/service-registration#datacenter)
|
||||
parameter.
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the source namespace you use as the basis of compilation.
|
||||
|
@ -68,17 +68,17 @@ The table below shows this endpoint's support for
|
|||
### JSON Request Body Schema
|
||||
|
||||
- `OverrideConnectTimeout` `(duration: 0s)` - Overrides the final [connect
|
||||
timeout](/docs/connect/config-entries/service-resolver#connecttimeout) for
|
||||
timeout](/consul/docs/connect/config-entries/service-resolver#connecttimeout) for
|
||||
any service resolved in the compiled chain.
|
||||
|
||||
This value comes from the `connect_timeout_ms` key in an [upstream
|
||||
configuration](/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
configuration](/consul/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
opaque
|
||||
[`config`](/docs/connect/registration/service-registration#config-1)
|
||||
[`config`](/consul/docs/connect/registration/service-registration#config-1)
|
||||
parameter.
|
||||
|
||||
- `OverrideProtocol` `(string: "")` - Overrides the final
|
||||
[protocol](/docs/connect/config-entries/service-defaults#protocol) used in
|
||||
[protocol](/consul/docs/connect/config-entries/service-defaults#protocol) used in
|
||||
the compiled discovery chain.
|
||||
|
||||
If the chain ordinarily would be TCP and an L7 protocol is passed here the
|
||||
|
@ -87,21 +87,21 @@ The table below shows this endpoint's support for
|
|||
Splitters.
|
||||
|
||||
This value comes from the `protocol` key in an [upstream
|
||||
configuration](/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
configuration](/consul/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
opaque
|
||||
[`config`](/docs/connect/registration/service-registration#config-1)
|
||||
[`config`](/consul/docs/connect/registration/service-registration#config-1)
|
||||
parameter.
|
||||
|
||||
- `OverrideMeshGateway` `(MeshGatewayConfig: <optional>)` - Overrides the final
|
||||
[mesh gateway configuration](/docs/connect/gateways/mesh-gateway#connect-proxy-configuration)
|
||||
[mesh gateway configuration](/consul/docs/connect/gateways/mesh-gateway#connect-proxy-configuration)
|
||||
for this any service resolved in the compiled chain.
|
||||
|
||||
This value comes from either the [proxy
|
||||
configuration](/docs/connect/registration/service-registration#complete-configuration-example)
|
||||
[`mesh_gateway`](/docs/connect/registration/service-registration#mesh_gateway)
|
||||
configuration](/consul/docs/connect/registration/service-registration#complete-configuration-example)
|
||||
[`mesh_gateway`](/consul/docs/connect/registration/service-registration#mesh_gateway)
|
||||
parameter or an [upstream
|
||||
configuration](/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
[`mesh_gateway`](/docs/connect/registration/service-registration#mesh_gateway-1)
|
||||
configuration](/consul/docs/connect/registration/service-registration#upstream-configuration-reference)
|
||||
[`mesh_gateway`](/consul/docs/connect/registration/service-registration#mesh_gateway-1)
|
||||
parameter. If both are present the value defined on the upstream is used.
|
||||
|
||||
- `Mode` `(string: "")` - One of `none`, `local`, or `remote`.
|
||||
|
@ -109,7 +109,7 @@ The table below shows this endpoint's support for
|
|||
### Sample Compilations
|
||||
|
||||
Full documentation for the output fields is found on the [discovery chain
|
||||
internals](/docs/connect/l7-traffic/discovery-chain#compileddiscoverychain)
|
||||
internals](/consul/docs/connect/l7-traffic/discovery-chain#compileddiscoverychain)
|
||||
page.
|
||||
|
||||
#### Multi-Datacenter Failover
|
||||
|
|
|
@ -20,16 +20,16 @@ This endpoint triggers a new user event.
|
|||
| `PUT` | `/event/fire/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
| `NO` | `none` | `none` | `event:write` |
|
||||
|
||||
The corresponding CLI command is [`consul event`](/commands/event).
|
||||
The corresponding CLI command is [`consul event`](/consul/commands/event).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -86,9 +86,9 @@ $ curl \
|
|||
## List Events
|
||||
|
||||
This endpoint returns the most recent events (up to 256) known by the agent. As a
|
||||
consequence of how the [event command](/commands/event) works, each
|
||||
consequence of how the [event command](/consul/commands/event) works, each
|
||||
agent may have a different view of the events. Events are broadcast using the
|
||||
[gossip protocol](/docs/architecture/gossip), so they have no global ordering
|
||||
[gossip protocol](/consul/docs/architecture/gossip), so they have no global ordering
|
||||
nor do they make a promise of delivery.
|
||||
|
||||
@include 'http_api_results_filtered_by_acls.mdx'
|
||||
|
@ -98,10 +98,10 @@ nor do they make a promise of delivery.
|
|||
| `GET` | `/event/list` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -146,7 +146,7 @@ $ curl \
|
|||
The semantics of this endpoint's blocking queries are slightly different. Most
|
||||
blocking queries provide a monotonic index and block until a newer index is
|
||||
available. This can be supported as a consequence of the total ordering of the
|
||||
[consensus protocol](/docs/architecture/consensus). With gossip, there is no
|
||||
[consensus protocol](/consul/docs/architecture/consensus). With gossip, there is no
|
||||
ordering, and instead `X-Consul-Index` maps to the newest event that matches the
|
||||
query.
|
||||
|
||||
|
|
|
@ -22,7 +22,7 @@ to fine-tune these trade-offs for their own use case at two levels:
|
|||
Consul servers are responsible for maintaining state information like the registration and
|
||||
health status of services and nodes. To protect this state against the potential failure of
|
||||
Consul servers, this state is replicated across three or more Consul servers in production using a
|
||||
[consensus protocol](/docs/architecture/consensus).
|
||||
[consensus protocol](/consul/docs/architecture/consensus).
|
||||
|
||||
One Consul server is elected leader and acts as the ultimate authority on Consul's state.
|
||||
If a majority of Consul servers agree to a state change, the leader is responsible for recording
|
||||
|
@ -74,8 +74,8 @@ Each HTTP API endpoint documents its support for the three read consistency mode
|
|||
~> **Scaling read requests**: The most effective way to increase read scalability
|
||||
is to convert non-`stale` reads to `stale` reads. If most requests are already
|
||||
`stale` reads and additional load reduction is desired, use Consul Enterprise
|
||||
[redundancy zones](/docs/enterprise/redundancy) or
|
||||
[read replicas](/docs/enterprise/read-scale)
|
||||
[redundancy zones](/consul/docs/enterprise/redundancy) or
|
||||
[read replicas](/consul/docs/enterprise/read-scale)
|
||||
to spread `stale` reads across additional, _non-voting_ Consul servers.
|
||||
Non-voting servers enhance read scalability without increasing the number
|
||||
of voting servers; adding more then 5 voting servers is not recommended because
|
||||
|
@ -111,7 +111,7 @@ When making a request across federated Consul datacenters, requests are forwarde
|
|||
a local server to any remote server. Once in the remote datacenter, the request path
|
||||
is the same as a [local request with the same consistency mode](#intra-datacenter-request-behavior).
|
||||
The following diagrams show the cross-datacenter request paths when Consul servers in datacenters are
|
||||
[federated either directly or via mesh gateways](/docs/connect/gateways/mesh-gateway/wan-federation-via-mesh-gateways).
|
||||
[federated either directly or via mesh gateways](/consul/docs/connect/gateways/mesh-gateway/wan-federation-via-mesh-gateways).
|
||||
|
||||
<Tabs>
|
||||
<Tab heading="Traditional WAN federation">
|
||||
|
@ -131,10 +131,10 @@ The following diagrams show the cross-datacenter request paths when Consul serve
|
|||
|
||||
### Consul DNS Queries
|
||||
|
||||
When DNS queries are issued to [Consul's DNS interface](/docs/discovery/dns),
|
||||
When DNS queries are issued to [Consul's DNS interface](/consul/docs/discovery/dns),
|
||||
Consul uses the `stale` consistency mode by default when interfacing with its
|
||||
underlying Consul service discovery HTTP APIs
|
||||
([Catalog](/api-docs/catalog), [Health](/api-docs/health), and [Prepared Query](/api-docs/query)).
|
||||
([Catalog](/consul/api-docs/catalog), [Health](/consul/api-docs/health), and [Prepared Query](/consul/api-docs/query)).
|
||||
|
||||
The consistency mode underlying Consul DNS queries cannot be overridden on a
|
||||
per-request basis.
|
||||
|
@ -203,9 +203,9 @@ when calling the endpoint:
|
|||
|
||||
The default consistency mode can be changed to `stale` for service discovery HTTP API endpoints,
|
||||
including:
|
||||
- [Catalog API](/api-docs/catalog)
|
||||
- [Health API](/api-docs/health)
|
||||
- [Prepared Query API](/api-docs/query)
|
||||
- [Catalog API](/consul/api-docs/catalog)
|
||||
- [Health API](/consul/api-docs/health)
|
||||
- [Prepared Query API](/consul/api-docs/query)
|
||||
|
||||
This allows Consul operators to spread service discovery read load across Consul servers
|
||||
with a centralized configuration change, avoiding the need to modify every service to
|
||||
|
@ -270,9 +270,9 @@ The DNS interface does not support viewing the consistency mode used for a parti
|
|||
|
||||
Note that some HTTP API endpoints support a `cached` parameter which has some of the same
|
||||
semantics as `stale` consistency mode but different trade offs. This behavior is described in
|
||||
[agent caching feature documentation](/api-docs/features/caching)
|
||||
[agent caching feature documentation](/consul/api-docs/features/caching)
|
||||
|
||||
<!-- Common links references -->
|
||||
[`dns_config.allow_stale`]: /docs/agent/config/config-files#allow_stale
|
||||
[`dns_config.max_stale`]: /docs/agent/config/config-files#max_stale
|
||||
[`discovery_max_stale`]: /docs/agent/config/config-files#discovery_max_stale
|
||||
[`dns_config.allow_stale`]: /consul/docs/agent/config/config-files#allow_stale
|
||||
[`dns_config.max_stale`]: /consul/docs/agent/config/config-files#max_stale
|
||||
[`discovery_max_stale`]: /consul/docs/agent/config/config-files#discovery_max_stale
|
||||
|
|
|
@ -122,7 +122,7 @@ example, the following two expressions would be equivalent.
|
|||
Generally, only the main object is filtered. When filtering for
|
||||
an item within an array that is not at the top level, the entire array that contains the item
|
||||
will be returned. This is usually the outermost object of a response,
|
||||
but in some cases such the [`/catalog/node/:node`](/api-docs/catalog#list-services-for-node)
|
||||
but in some cases such the [`/catalog/node/:node`](/consul/api-docs/catalog#list-services-for-node)
|
||||
endpoint the filtering is performed on a object embedded within the results.
|
||||
|
||||
### Performance
|
||||
|
|
|
@ -15,7 +15,7 @@ from the health endpoints are filtered while the catalog endpoints provide the
|
|||
raw entries.
|
||||
|
||||
To modify health check registration or information,
|
||||
use the [`/agent/check`](/api-docs/agent/check) endpoints.
|
||||
use the [`/agent/check`](/consul/api-docs/agent/check) endpoints.
|
||||
|
||||
## List Checks for Node
|
||||
|
||||
|
@ -28,10 +28,10 @@ This endpoint returns the checks specific to the node provided on the path.
|
|||
| `GET` | `/health/node/:node` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------ |
|
||||
|
@ -122,10 +122,10 @@ path.
|
|||
| `GET` | `/health/checks/:service` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------ |
|
||||
|
@ -212,10 +212,10 @@ incorporating the use of health checks.
|
|||
| `GET` | `/health/service/:service` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| -------------------- | ----------------- | -------------------- | ------------------------ |
|
||||
|
@ -239,7 +239,7 @@ The table below shows this endpoint's support for
|
|||
ascending order based on the estimated round trip time from that node. Passing
|
||||
`?near=_agent` uses the agent's node for the sort.
|
||||
~> **Note:** Using `near` will ignore
|
||||
[`use_streaming_backend`](/docs/agent/config/config-files#use_streaming_backend) and always
|
||||
[`use_streaming_backend`](/consul/docs/agent/config/config-files#use_streaming_backend) and always
|
||||
use blocking queries, because the data required to sort the results is not available
|
||||
to the streaming backend.
|
||||
|
||||
|
@ -266,10 +266,10 @@ The table below shows this endpoint's support for
|
|||
|
||||
- `merge-central-config` - Include this flag in a request for `connect-proxy` kind or `*-gateway` kind
|
||||
services to return a fully resolved service definition that includes merged values from the
|
||||
[proxy-defaults/global](/docs/connect/config-entries/proxy-defaults) and
|
||||
[service-defaults/:service](/docs/connect/config-entries/service-defaults) config entries.
|
||||
[proxy-defaults/global](/consul/docs/connect/config-entries/proxy-defaults) and
|
||||
[service-defaults/:service](/consul/docs/connect/config-entries/service-defaults) config entries.
|
||||
Returning a fully resolved service definition is useful when a service was registered using the
|
||||
[/catalog/register](/api-docs/catalog#register_entity) endpoint, which does not automatically merge config entries.
|
||||
[/catalog/register](/consul/api-docs/catalog#register_entity) endpoint, which does not automatically merge config entries.
|
||||
|
||||
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the service.
|
||||
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
||||
|
@ -413,7 +413,7 @@ following selectors and filter operations being supported:
|
|||
## List Service Instances for Connect-enabled Service
|
||||
|
||||
This endpoint returns the service instances providing a
|
||||
[Connect-capable](/docs/connect) service in a given datacenter.
|
||||
[Connect-capable](/consul/docs/connect) service in a given datacenter.
|
||||
This will include both proxies and native integrations. A service may
|
||||
register both Connect-capable and incapable services at the same time,
|
||||
so this endpoint may be used to filter only the Connect-capable endpoints.
|
||||
|
@ -425,14 +425,14 @@ so this endpoint may be used to filter only the Connect-capable endpoints.
|
|||
| `GET` | `/health/connect/:service` | `application/json` |
|
||||
|
||||
Parameters and response format are the same as
|
||||
[`/health/service/:service`](/api-docs/health#list-nodes-for-service).
|
||||
[`/health/service/:service`](/consul/api-docs/health#list-nodes-for-service).
|
||||
|
||||
## List Service Instances for Ingress Gateways Associated with a Service
|
||||
|
||||
-> **1.8.0+:** This API is available in Consul versions 1.8.0 and later.
|
||||
|
||||
This endpoint returns the service instances providing an [ingress
|
||||
gateway](/docs/connect/gateways/ingress-gateway) for a service in a given datacenter.
|
||||
gateway](/consul/docs/connect/gateways/ingress-gateway) for a service in a given datacenter.
|
||||
|
||||
@include 'http_api_results_filtered_by_acls.mdx'
|
||||
|
||||
|
@ -441,10 +441,10 @@ gateway](/docs/connect/gateways/ingress-gateway) for a service in a given datace
|
|||
| `GET` | `/health/ingress/:service` | `application/json` |
|
||||
|
||||
Parameters and response format are the same as
|
||||
[`/health/service/:service`](/api-docs/health#list-nodes-for-service).
|
||||
[`/health/service/:service`](/consul/api-docs/health#list-nodes-for-service).
|
||||
|
||||
~> **Note:** Unlike `/health/connect/:service` and `/health/service/:service` this
|
||||
endpoint does not support the `peer` query parameter and the [streaming backend](/api-docs/features/blocking#streaming-backend).
|
||||
endpoint does not support the `peer` query parameter and the [streaming backend](/consul/api-docs/features/blocking#streaming-backend).
|
||||
|
||||
## List Checks in State
|
||||
|
||||
|
@ -457,10 +457,10 @@ This endpoint returns the checks in the state provided on the path.
|
|||
| `GET` | `/health/state/:state` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------ |
|
||||
|
|
|
@ -7,53 +7,53 @@ description: |-
|
|||
|
||||
# Consul API Overview
|
||||
|
||||
The Consul HTTP API is a RESTful interface that allows you to leverage Consul functionality in your network. This topic provides guidance about the essential API endpoints for different workstreams. Refer to the [HTTP API structure](/api-docs/api-structure) docs to learn how to interact with and authenticate against the Consul HTTP API.
|
||||
The Consul HTTP API is a RESTful interface that allows you to leverage Consul functionality in your network. This topic provides guidance about the essential API endpoints for different workstreams. Refer to the [HTTP API structure](/consul/api-docs/api-structure) docs to learn how to interact with and authenticate against the Consul HTTP API.
|
||||
|
||||
## Connect your services
|
||||
|
||||
Use the following API endpoints to configure and connect your services.
|
||||
|
||||
- [`/catalog`](/api-docs/catalog): Register and deregister nodes, services, and health checks.
|
||||
- [`/health`](/api-docs/health): Query node health when health checks are enabled.
|
||||
- [`/query`](/api-docs/query): Create and manage prepared queries in Consul. Prepared queries allow you to register a complex service query and send it later.
|
||||
- [`/coordinate`](/api-docs/coordinate): Query the network coordinates for nodes in the local datacenter and Consul servers in the local datacenter and remote datacenters.
|
||||
- [`/catalog`](/consul/api-docs/catalog): Register and deregister nodes, services, and health checks.
|
||||
- [`/health`](/consul/api-docs/health): Query node health when health checks are enabled.
|
||||
- [`/query`](/consul/api-docs/query): Create and manage prepared queries in Consul. Prepared queries allow you to register a complex service query and send it later.
|
||||
- [`/coordinate`](/consul/api-docs/coordinate): Query the network coordinates for nodes in the local datacenter and Consul servers in the local datacenter and remote datacenters.
|
||||
|
||||
The following endpoints are specific to service mesh:
|
||||
|
||||
- [`/config`](/api-docs/config): Create, update, delete, and query central configuration entries registered with Consul. Configuration entries define the default behavior of resources in the service mesh.
|
||||
- [`/agent/connect`](/api-docs/agent/connect): Interact with local agents in the service mesh.
|
||||
- [`/connect`](/api-docs/connect): Manage service mesh-related operations, including service intentions ([`/connect/intentions`](/api-docs/connect/intentions)) and the service mesh certificate authority (CA) ([`/connect/ca`](/api-docs/connect/ca)).
|
||||
- [`/config`](/consul/api-docs/config): Create, update, delete, and query central configuration entries registered with Consul. Configuration entries define the default behavior of resources in the service mesh.
|
||||
- [`/agent/connect`](/consul/api-docs/agent/connect): Interact with local agents in the service mesh.
|
||||
- [`/connect`](/consul/api-docs/connect): Manage service mesh-related operations, including service intentions ([`/connect/intentions`](/consul/api-docs/connect/intentions)) and the service mesh certificate authority (CA) ([`/connect/ca`](/consul/api-docs/connect/ca)).
|
||||
|
||||
|
||||
## Enable zero-trust network security
|
||||
|
||||
The following API endpoints give you control over access to services in your network and access to the Consul API.
|
||||
|
||||
- [`/acl`](/api-docs/acl): Create and manage tokens that authenticate requests and authorize access to resources in the network. We recommend enabling access control lists (ACL) to secure access to the Consul API, UI, and CLI.
|
||||
- [`/connect/intentions`](/api-docs/connect/intentions): Create and manage service intentions.
|
||||
- [`/acl`](/consul/api-docs/acl): Create and manage tokens that authenticate requests and authorize access to resources in the network. We recommend enabling access control lists (ACL) to secure access to the Consul API, UI, and CLI.
|
||||
- [`/connect/intentions`](/consul/api-docs/connect/intentions): Create and manage service intentions.
|
||||
|
||||
## Observe your network
|
||||
|
||||
Use the following API endpoints enable network observability.
|
||||
|
||||
- [`/status`](/api-docs/status): Debug your Consul datacenter by returning low-level Raft information about Consul server peers.
|
||||
- [`/agent/metrics`](/api-docs/agent#view-metrics): Retrieve metrics for the most recent intervals that have finished. For more information about metrics, refer to [Telemetry](/docs/agent/telemetry).
|
||||
- [`/status`](/consul/api-docs/status): Debug your Consul datacenter by returning low-level Raft information about Consul server peers.
|
||||
- [`/agent/metrics`](/consul/api-docs/agent#view-metrics): Retrieve metrics for the most recent intervals that have finished. For more information about metrics, refer to [Telemetry](/consul/docs/agent/telemetry).
|
||||
|
||||
|
||||
## Manage Consul
|
||||
|
||||
The following API endpoints help you manage Consul operations.
|
||||
|
||||
- [`/operator`](/api-docs/operator): Perform cluster-level tasks, such as interacting with the Raft subsystem or obtaining license information.
|
||||
- [`/partition`](/api-docs/admin-partitions): Create and manage administrative or admin partitions in Consul. Admin partitions are supersets of Consul namespaces that isolate groups of resources to lower operational overhead.
|
||||
- [`/namespace`](/api-docs/namespaces): Create and manage namespaces in Consul. Namespaces isolate groups of resources to lower operational overhead.
|
||||
- [`/snapshot`](/api-docs/snapshot): Save and restore Consul server state in the event of a disaster.
|
||||
- [`/txn`](/api-docs/txn): Apply multiple operations, such as updating the catalog and retrieving multiple KV entries, in a single transaction.
|
||||
- [`/operator`](/consul/api-docs/operator): Perform cluster-level tasks, such as interacting with the Raft subsystem or obtaining license information.
|
||||
- [`/partition`](/consul/api-docs/admin-partitions): Create and manage administrative or admin partitions in Consul. Admin partitions are supersets of Consul namespaces that isolate groups of resources to lower operational overhead.
|
||||
- [`/namespace`](/consul/api-docs/namespaces): Create and manage namespaces in Consul. Namespaces isolate groups of resources to lower operational overhead.
|
||||
- [`/snapshot`](/consul/api-docs/snapshot): Save and restore Consul server state in the event of a disaster.
|
||||
- [`/txn`](/consul/api-docs/txn): Apply multiple operations, such as updating the catalog and retrieving multiple KV entries, in a single transaction.
|
||||
|
||||
## Configure your services dynamically
|
||||
|
||||
The following API endpoints enable you to dynamically configure your services.
|
||||
|
||||
- [`/event`](/api-docs/event): Start a custom event that you can use to build scripts and automations.
|
||||
- [`/kv`](/api-docs/kv): Add, remove, and update metadata stored in the Consul KV store.
|
||||
- [`/session`](/api-docs/session): Create and manage [sessions](/docs/dynamic-app-config/sessions) in Consul. You can use sessions to build distributed and granular locks to ensure nodes are properly writing to the Consul KV store.
|
||||
- [`/event`](/consul/api-docs/event): Start a custom event that you can use to build scripts and automations.
|
||||
- [`/kv`](/consul/api-docs/kv): Add, remove, and update metadata stored in the Consul KV store.
|
||||
- [`/session`](/consul/api-docs/session): Create and manage [sessions](/consul/docs/dynamic-app-config/sessions) in Consul. You can use sessions to build distributed and granular locks to ensure nodes are properly writing to the Consul KV store.
|
||||
|
|
|
@ -19,7 +19,7 @@ replication between datacenters, please view the
|
|||
~> Values in the KV store cannot be larger than 512kb.
|
||||
|
||||
In order to perform atomic operations on multiple KV pairs (up to a limit of 64)
|
||||
please consider using [transactions](/api-docs/txn) instead.
|
||||
please consider using [transactions](/consul/api-docs/txn) instead.
|
||||
|
||||
## Read Key
|
||||
|
||||
|
@ -27,29 +27,29 @@ This endpoint returns the specified key. If no key exists at the given path, a
|
|||
404 is returned instead of a 200 response.
|
||||
|
||||
For multi-key reads (up to a limit of 64 KV operations) please consider using
|
||||
[transactions](/api-docs/txn) instead.
|
||||
[transactions](/consul/api-docs/txn) instead.
|
||||
|
||||
If the [`recurse`](#recurse) or [`keys`](#keys) query parameters are `true`,
|
||||
this endpoint will return an array of keys. In this case,
|
||||
the HTTP response includes the `X-Consul-Results-Filtered-By-ACLs: true` header
|
||||
if the response array excludes results due to ACL policy configuration.
|
||||
Refer to the [HTTP API documentation](/api-docs/api-structure#results-filtered-by-acls) for more information.
|
||||
Refer to the [HTTP API documentation](/consul/api-docs/api-structure#results-filtered-by-acls) for more information.
|
||||
|
||||
| Method | Path | Produces |
|
||||
| ------ | ---------- | ------------------ |
|
||||
| `GET` | `/kv/:key` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `YES` | `all` | `none` | `key:read` |
|
||||
|
||||
The corresponding CLI command is [`consul kv get`](/commands/kv/get).
|
||||
The corresponding CLI command is [`consul kv get`](/consul/commands/kv/get).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -168,16 +168,16 @@ Even though the return type is `application/json`, the value is either `true` or
|
|||
`false`, indicating whether the create/update succeeded.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `key:write` |
|
||||
|
||||
The corresponding CLI command is [`consul kv put`](/commands/kv/put).
|
||||
The corresponding CLI command is [`consul kv put`](/consul/commands/kv/put).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -210,7 +210,7 @@ The corresponding CLI command is [`consul kv put`](/commands/kv/put).
|
|||
session has locked the key.**
|
||||
|
||||
For an example of how to use the lock feature, check the
|
||||
[Leader Election tutorial](https://learn.hashicorp.com/tutorials/consul/application-leader-elections).
|
||||
[Leader Election tutorial](/consul/tutorials/developer-configuration/application-leader-elections).
|
||||
|
||||
- `release` `(string: "")` - Supply a session ID to use in a release operation. This is
|
||||
useful when paired with `?acquire=` as it allows clients to yield a lock. This
|
||||
|
@ -255,16 +255,16 @@ This endpoint deletes a single key or all keys sharing a prefix.
|
|||
| `DELETE` | `/kv/:key` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `key:write` |
|
||||
|
||||
The corresponding CLI command is [`consul kv delete`](/commands/kv/delete).
|
||||
The corresponding CLI command is [`consul kv delete`](/consul/commands/kv/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
|
|
@ -20,16 +20,16 @@ This endpoint creates a new Namespace.
|
|||
| `PUT` | `/namespace` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul namespace create`](/commands/namespace/create).
|
||||
The corresponding CLI command is [`consul namespace create`](/consul/commands/namespace/create).
|
||||
|
||||
### JSON Request Body Schema
|
||||
|
||||
|
@ -53,7 +53,7 @@ The corresponding CLI command is [`consul namespace create`](/commands/namespace
|
|||
struct is an object with an "ID" and/or "Name" field to identify a policy.
|
||||
When a name is used instead of an ID, Consul will resolve the name to an ID
|
||||
and store that internally. The ACL token used in the API request
|
||||
must have [`acl:write` access](/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
must have [`acl:write` access](/consul/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
to the linked policy.
|
||||
|
||||
- `RoleDefaults` `(array<ACLLink>)` - This is the list of default roles
|
||||
|
@ -61,7 +61,7 @@ The corresponding CLI command is [`consul namespace create`](/commands/namespace
|
|||
struct is an object with an "ID" and/or "Name" field to identify a policy.
|
||||
When a name is used instead of an ID, Consul will resolve the name to an ID
|
||||
and store that internally. The ACL token used in the API request
|
||||
must have [`acl:write` access](/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
must have [`acl:write` access](/consul/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
access to the linked role.
|
||||
|
||||
- `Meta` `(map<string|string>: <optional>)` - Specifies arbitrary KV metadata
|
||||
|
@ -151,10 +151,10 @@ This endpoint reads a Namespace with the given name.
|
|||
| `GET` | `/namespace/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------------------------- |
|
||||
|
@ -163,7 +163,7 @@ The table below shows this endpoint's support for
|
|||
<sup>1</sup> Access can be granted to list the Namespace if the token used when making
|
||||
the request has been granted any access in the namespace (read, list or write).
|
||||
|
||||
The corresponding CLI command is [`consul namespace read`](/commands/namespace/read).
|
||||
The corresponding CLI command is [`consul namespace read`](/consul/commands/namespace/read).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -221,16 +221,16 @@ This endpoint updates a Namespace.
|
|||
| `PUT` | `/namespace/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul namespace update`](/commands/namespace/update) or [`consul namespace write`](/commands/namespace/write).
|
||||
The corresponding CLI command is [`consul namespace update`](/consul/commands/namespace/update) or [`consul namespace write`](/consul/commands/namespace/write).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -258,7 +258,7 @@ The corresponding CLI command is [`consul namespace update`](/commands/namespace
|
|||
struct is an object with an "ID" and/or "Name" field to identify a policy.
|
||||
When a name is used instead of an ID, Consul will resolve the name to an ID
|
||||
and store that internally. The ACL token used in the API request
|
||||
must have [`acl:write` access](/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
must have [`acl:write` access](/consul/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
to the linked policy.
|
||||
|
||||
- `RoleDefaults` `(array<ACLLink>)` - This is the list of default roles
|
||||
|
@ -266,7 +266,7 @@ The corresponding CLI command is [`consul namespace update`](/commands/namespace
|
|||
struct is an object with an "ID" and/or "Name" field to identify a policy.
|
||||
When a name is used instead of an ID, Consul will resolve the name to an ID
|
||||
and store that internally. The ACL token used in the API request
|
||||
must have [`acl:write` access](/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
must have [`acl:write` access](/consul/docs/security/acl/acl-rules#acl-resource-rules)
|
||||
to the linked role.
|
||||
|
||||
- `Meta` `(map<string|string>: <optional>)` - Specifies arbitrary KV metadata
|
||||
|
@ -363,16 +363,16 @@ This endpoint will return no data. Success or failure is indicated by the status
|
|||
code returned.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul namespace delete`](/commands/namespace/delete).
|
||||
The corresponding CLI command is [`consul namespace delete`](/consul/commands/namespace/delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -435,10 +435,10 @@ privileges of the ACL token used for the request.
|
|||
| `GET` | `/namespaces` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------------------------------------------- |
|
||||
|
@ -447,7 +447,7 @@ The table below shows this endpoint's support for
|
|||
<sup>1</sup> Access can be granted to list the Namespace if the token used when making
|
||||
the request has been granted any access in the namespace (read, list or write).
|
||||
|
||||
The corresponding CLI command is [`consul namespace list`](/commands/namespace/list).
|
||||
The corresponding CLI command is [`consul namespace list`](/consul/commands/namespace/list).
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
|
|
@ -24,7 +24,7 @@ datacenters, so not all servers need to be fully connected. This allows for
|
|||
complex topologies among Consul datacenters like hub/spoke and more general
|
||||
trees.
|
||||
|
||||
Please check the [Network Areas tutorial](https://learn.hashicorp.com/tutorials/consul/federation-network-areas) for more details.
|
||||
Please check the [Network Areas tutorial](/consul/tutorials/datacenter-operations/federation-network-areas) for more details.
|
||||
|
||||
## Create Network Area
|
||||
|
||||
|
@ -36,16 +36,16 @@ successfully.
|
|||
| `POST` | `/operator/area` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul operator area create`](/commands/operator/area#create).
|
||||
The corresponding CLI command is [`consul operator area create`](/consul/commands/operator/area#create).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -105,16 +105,16 @@ This endpoint lists all network areas.
|
|||
| `GET` | `/operator/area` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `YES` | `all` | `none` | `operator:read` |
|
||||
|
||||
The corresponding CLI command is [`consul operator area list`](/commands/operator/area#list).
|
||||
The corresponding CLI command is [`consul operator area list`](/consul/commands/operator/area#list).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -149,16 +149,16 @@ This endpoint updates a network area to the given configuration.
|
|||
| `PUT` | `/operator/area/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul operator area update`](/commands/operator/area#update).
|
||||
The corresponding CLI command is [`consul operator area update`](/consul/commands/operator/area#update).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -196,10 +196,10 @@ This endpoint lists a specific network area.
|
|||
| `GET` | `/operator/area/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
@ -242,16 +242,16 @@ This endpoint deletes a specific network area.
|
|||
| `DELETE` | `/operator/area/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul operator area delete`](/commands/operator/area#delete).
|
||||
The corresponding CLI command is [`consul operator area delete`](/consul/commands/operator/area#delete).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -280,16 +280,16 @@ area.
|
|||
| `PUT` | `/operator/area/:uuid/join` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul operator area join`](/commands/operator/area#join).
|
||||
The corresponding CLI command is [`consul operator area join`](/consul/commands/operator/area#join).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -355,16 +355,16 @@ network area.
|
|||
| `GET` | `/operator/area/:uuid/members` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `operator:read` |
|
||||
|
||||
The corresponding CLI command is [`consul operator area members`](/commands/operator/area#members).
|
||||
The corresponding CLI command is [`consul operator area members`](/consul/commands/operator/area#members).
|
||||
|
||||
### Path Parameters
|
||||
|
||||
|
@ -416,7 +416,7 @@ $ curl \
|
|||
|
||||
- `Build` has the Consul version running on the node.
|
||||
|
||||
- `Protocol` is the [protocol version](/docs/upgrading#protocol-versions)
|
||||
- `Protocol` is the [protocol version](/consul/docs/upgrading#protocol-versions)
|
||||
being spoken by the node.
|
||||
|
||||
- `Status` is the current health status of the node, as determined by the
|
||||
|
@ -426,4 +426,4 @@ $ curl \
|
|||
|
||||
- `RTT` is an estimated network round trip time from the server answering the
|
||||
query to the given server, in nanoseconds. This is computed using [network
|
||||
coordinates](/docs/architecture/coordinates).
|
||||
coordinates](/consul/docs/architecture/coordinates).
|
||||
|
|
|
@ -13,7 +13,7 @@ The `/operator/autopilot` endpoints allow for automatic operator-friendly
|
|||
management of Consul servers including cleanup of dead servers, monitoring
|
||||
the state of the Raft cluster, and stable server introduction.
|
||||
|
||||
Please check the [Autopilot tutorial](https://learn.hashicorp.com/tutorials/consul/autopilot-datacenter-operations) for more details.
|
||||
Please check the [Autopilot tutorial](/consul/tutorials/datacenter-operations/autopilot-datacenter-operations) for more details.
|
||||
|
||||
## Read Configuration
|
||||
|
||||
|
@ -24,16 +24,16 @@ This endpoint retrieves its latest Autopilot configuration.
|
|||
| `GET` | `/operator/autopilot/configuration` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `operator:read` |
|
||||
|
||||
The corresponding CLI command is [`consul operator autopilot get-config`](/commands/operator/autopilot#get-config).
|
||||
The corresponding CLI command is [`consul operator autopilot get-config`](/consul/commands/operator/autopilot#get-config).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -68,7 +68,7 @@ $ curl \
|
|||
```
|
||||
|
||||
For more information about the Autopilot configuration options, see the
|
||||
[agent configuration section](/docs/agent/config/config-files#autopilot).
|
||||
[agent configuration section](/consul/docs/agent/config/config-files#autopilot).
|
||||
|
||||
## Update Configuration
|
||||
|
||||
|
@ -79,16 +79,16 @@ This endpoint updates the Autopilot configuration of the cluster.
|
|||
| `PUT` | `/operator/autopilot/configuration` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul operator autopilot set-config`](/commands/operator/autopilot#set-config).
|
||||
The corresponding CLI command is [`consul operator autopilot set-config`](/consul/commands/operator/autopilot#set-config).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -159,10 +159,10 @@ This endpoint queries the health of the autopilot status.
|
|||
| `GET` | `/operator/autopilot/health` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
@ -263,16 +263,16 @@ This endpoint queries the health of the autopilot status.
|
|||
| `GET` | `/operator/autopilot/state` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `operator:read` |
|
||||
|
||||
The corresponding CLI command is [`consul operator autopilot state`](/commands/operator/autopilot#state).
|
||||
The corresponding CLI command is [`consul operator autopilot state`](/consul/commands/operator/autopilot#state).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -327,7 +327,7 @@ $ curl \
|
|||
- `OptimisticFailuretolerance` <EnterpriseAlert inline /> is the maximum number
|
||||
of servers that could fail in the right order over the right period of time
|
||||
without causing an outage. This value is only useful when using the [Redundancy
|
||||
Zones feature](/docs/enterprise/redundancy) with autopilot.
|
||||
Zones feature](/consul/docs/enterprise/redundancy) with autopilot.
|
||||
|
||||
- `Servers` is a mapping of server ID to an object holding detailed information about that server.
|
||||
The format of the detailed info is documented in its own section.
|
||||
|
|
|
@ -11,13 +11,13 @@ description: |-
|
|||
The `/operator` endpoints provide cluster-level tools for Consul operators,
|
||||
such as interacting with the Raft subsystem. For a CLI to perform these
|
||||
operations manually, please check the documentation for the
|
||||
[`consul operator`](/commands/operator) command.
|
||||
[`consul operator`](/consul/commands/operator) command.
|
||||
|
||||
If ACLs are enabled then a token with operator privileges may be required in
|
||||
order to use this interface. Check the [ACL Rules documentation](/docs/security/acl/acl-rules#operator-rules)
|
||||
order to use this interface. Check the [ACL Rules documentation](/consul/docs/security/acl/acl-rules#operator-rules)
|
||||
for more information.
|
||||
|
||||
Check the [Outage Recovery](https://learn.hashicorp.com/tutorials/consul/recovery-outage) tutorial for some examples of
|
||||
Check the [Outage Recovery](/consul/tutorials/datacenter-operations/recovery-outage) tutorial for some examples of
|
||||
how these capabilities are used.
|
||||
|
||||
Please choose a sub-section in the navigation for more information.
|
||||
|
|
|
@ -9,7 +9,7 @@ description: |-
|
|||
# Keyring Operator HTTP API
|
||||
|
||||
The `/operator/keyring` endpoints allow for management of the gossip encryption
|
||||
keyring. Please see the [Gossip Protocol Guide](/docs/architecture/gossip) for
|
||||
keyring. Please see the [Gossip Protocol Guide](/consul/docs/architecture/gossip) for
|
||||
more details on the gossip protocol and its use.
|
||||
|
||||
## List Gossip Encryption Keys
|
||||
|
@ -26,16 +26,16 @@ read privileges.
|
|||
| `GET` | `/operator/keyring` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
| `NO` | `none` | `none` | `keyring:read` |
|
||||
|
||||
The corresponding CLI command is [`consul keyring -list`](/commands/keyring#list).
|
||||
The corresponding CLI command is [`consul keyring -list`](/consul/commands/keyring#list).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -113,16 +113,16 @@ This endpoint installs a new gossip encryption key into the cluster.
|
|||
| `POST` | `/operator/keyring` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `keyring:write` |
|
||||
|
||||
The corresponding CLI command is [`consul keyring -install`](/commands/keyring#install).
|
||||
The corresponding CLI command is [`consul keyring -install`](/consul/commands/keyring#install).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -162,16 +162,16 @@ installed before this operation can succeed.
|
|||
| `PUT` | `/operator/keyring` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `keyring:write` |
|
||||
|
||||
The corresponding CLI command is [`consul keyring -use`](/commands/keyring#use).
|
||||
The corresponding CLI command is [`consul keyring -use`](/consul/commands/keyring#use).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -211,16 +211,16 @@ may only be performed on keys which are not currently the primary key.
|
|||
| `DELETE` | `/operator/keyring` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
| `NO` | `none` | `none` | `keyring:write` |
|
||||
|
||||
The corresponding CLI command is [`consul keyring -remove`](/commands/keyring#remove).
|
||||
The corresponding CLI command is [`consul keyring -remove`](/consul/commands/keyring#remove).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -22,16 +22,16 @@ This endpoint gets information about the current license.
|
|||
| `GET` | `/operator/license` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `all` | `none` | `none` |
|
||||
|
||||
The corresponding CLI command is [`consul license get`](/commands/license#get).
|
||||
The corresponding CLI command is [`consul license get`](/consul/commands/license#get).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -88,16 +88,16 @@ license contents as well as any warning messages regarding its validity.
|
|||
| `PUT` | `/operator/license` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul license put`](/commands/license#put).
|
||||
The corresponding CLI command is [`consul license put`](/consul/commands/license#put).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -159,16 +159,16 @@ This endpoint resets the Consul license to the license included in the Enterpris
|
|||
| `DELETE` | `/operator/license` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul license reset`](/commands/license#reset).
|
||||
The corresponding CLI command is [`consul license reset`](/consul/commands/license#reset).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ description: |-
|
|||
The `/operator/raft` endpoints provide tools for management of Raft the
|
||||
consensus subsystem and cluster quorum.
|
||||
|
||||
Please see the [Consensus Protocol Guide](/docs/architecture/consensus) for
|
||||
Please see the [Consensus Protocol Guide](/consul/docs/architecture/consensus) for
|
||||
more information about Raft consensus protocol and its use.
|
||||
|
||||
## Read Configuration
|
||||
|
@ -23,10 +23,10 @@ This endpoint reads the current raft configuration.
|
|||
| `GET` | `/operator/raft/configuration` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | --------------------- | ------------- | --------------- |
|
||||
|
@ -42,7 +42,7 @@ The table below shows this endpoint's support for
|
|||
Raft configuration from any of the Consul servers. Not setting this will choose
|
||||
the default consistency mode which will forward the request to the leader for
|
||||
processing but not re-confirm the server is still the leader before returning
|
||||
results. See [default consistency](/api-docs/features/consistency#default) for more details.
|
||||
results. See [default consistency](/consul/api-docs/features/consistency#default) for more details.
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
@ -120,16 +120,16 @@ write privileges.
|
|||
| `DELETE` | `/operator/raft/peer` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul operator raft remove-peer`](/commands/operator/raft#remove-peer).
|
||||
The corresponding CLI command is [`consul operator raft remove-peer`](/consul/commands/operator/raft#remove-peer).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -156,16 +156,16 @@ The new leader is selected at random unless explicitly specified with the `id` p
|
|||
| `POST` | `/operator/raft/transfer-leader` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
| `NO` | `none` | `none` | `operator:write` |
|
||||
|
||||
The corresponding CLI command is [`consul operator raft transfer-leader`](/commands/operator/raft#transfer-leader).
|
||||
The corresponding CLI command is [`consul operator raft transfer-leader`](/consul/commands/operator/raft#transfer-leader).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -29,10 +29,10 @@ This endpoint lists all network areas.
|
|||
| `GET` | `/operator/segment` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
|
|
@ -18,10 +18,10 @@ This endpoint generates a peering token.
|
|||
| `POST` | `/peering/token` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
|
@ -84,10 +84,10 @@ This endpoint returns no data. Success or failure is indicated by the status
|
|||
code returned.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
|
@ -147,10 +147,10 @@ This endpoint returns information about a peering connection for the specified p
|
|||
| `GET` | `/peering/:name` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -203,10 +203,10 @@ This endpoint returns no data. Success or failure is indicated by the status
|
|||
code returned.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------- |
|
||||
|
@ -258,10 +258,10 @@ This endpoint lists all the peerings.
|
|||
| `GET` | `/peerings` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
|
|
@ -11,13 +11,13 @@ The `/query` endpoints create, update, destroy, and execute prepared queries.
|
|||
Prepared queries allow you to register a complex service query and then execute
|
||||
it later via its ID or name to get a set of healthy nodes that provide a given
|
||||
service. This is particularly useful in combination with Consul's
|
||||
[DNS Interface](/docs/discovery/dns#prepared-query-lookups) as it allows for much richer queries than
|
||||
[DNS Interface](/consul/docs/discovery/dns#prepared-query-lookups) as it allows for much richer queries than
|
||||
would be possible given the limited entry points exposed by DNS.
|
||||
|
||||
Check the [Geo Failover tutorial](https://learn.hashicorp.com/tutorials/consul/automate-geo-failover) for details and
|
||||
Check the [Geo Failover tutorial](/consul/tutorials/developer-discovery/automate-geo-failover) for details and
|
||||
examples for using prepared queries to implement geo failover for services.
|
||||
|
||||
Check the [prepared query rules](/docs/security/acl/acl-rules#prepared-query-rules)
|
||||
Check the [prepared query rules](/consul/docs/security/acl/acl-rules#prepared-query-rules)
|
||||
section of the agent ACL documentation for more details about how prepared
|
||||
queries work with Consul's ACL system.
|
||||
|
||||
|
@ -141,10 +141,10 @@ successfully.
|
|||
| `POST` | `/query` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
|
@ -188,7 +188,7 @@ The table below shows this endpoint's support for
|
|||
|
||||
- `NearestN` `(int: 0)` - Specifies that the query will be forwarded to up
|
||||
to `NearestN` other datacenters based on their estimated network round
|
||||
trip time using [Network Coordinates](/docs/architecture/coordinates)
|
||||
trip time using [Network Coordinates](/consul/docs/architecture/coordinates)
|
||||
from the WAN gossip pool. The median round trip time from the server
|
||||
handling the query to the servers in the remote datacenter is used to
|
||||
determine the priority.
|
||||
|
@ -207,7 +207,7 @@ The table below shows this endpoint's support for
|
|||
service instances in the local datacenter.
|
||||
This option cannot be used with `NearestN` or `Datacenters`.
|
||||
|
||||
- `Peer` `(string: "")` - Specifies a [cluster peer](/docs/connect/cluster-peering) to use for
|
||||
- `Peer` `(string: "")` - Specifies a [cluster peer](/consul/docs/connect/cluster-peering) to use for
|
||||
failover.
|
||||
|
||||
- `Datacenter` `(string: "")` - Specifies a WAN federated datacenter to forward the
|
||||
|
@ -226,7 +226,7 @@ The table below shows this endpoint's support for
|
|||
true, only nodes with checks in the passing state will be returned.
|
||||
|
||||
- `Near` `(string: "")` - Specifies a node to sort near based on distance
|
||||
sorting using [Network Coordinates](/docs/architecture/coordinates). The
|
||||
sorting using [Network Coordinates](/consul/docs/architecture/coordinates). The
|
||||
nearest instance to the specified node will be returned first, and subsequent
|
||||
nodes in the response will be sorted in ascending order of estimated
|
||||
round-trip times. If the node given does not exist, the nodes in the response
|
||||
|
@ -252,7 +252,7 @@ The table below shows this endpoint's support for
|
|||
key/value pairs that will be used for filtering the query results to services
|
||||
with the given metadata values present.
|
||||
|
||||
* `Connect` `(bool: false)` - If true, only [Connect-capable](/docs/connect) services
|
||||
* `Connect` `(bool: false)` - If true, only [Connect-capable](/consul/docs/connect) services
|
||||
for the specified service name will be returned. This includes both
|
||||
natively integrated services and proxies. For proxies, the proxy name
|
||||
may not match `Service`, because the proxy destination will. Any
|
||||
|
@ -318,10 +318,10 @@ This endpoint returns a list of all prepared queries.
|
|||
| `GET` | `/query` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -380,10 +380,10 @@ given ID, an error is returned.
|
|||
| `PUT` | `/query/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
|
@ -420,10 +420,10 @@ given ID, an error is returned.
|
|||
| `GET` | `/query/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -460,10 +460,10 @@ given ID, an error is returned.
|
|||
| `DELETE` | `/query/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------- |
|
||||
|
@ -493,17 +493,17 @@ given ID, an error is returned.
|
|||
|
||||
The HTTP response includes the `X-Consul-Results-Filtered-By-ACLs: true` header
|
||||
if the [`Nodes`](#nodes) response array excludes results due to ACL policy configuration.
|
||||
Refer to the [HTTP API documentation](/api-docs/api-structure#results-filtered-by-acls) for more information.
|
||||
Refer to the [HTTP API documentation](/consul/api-docs/api-structure#results-filtered-by-acls) for more information.
|
||||
|
||||
| Method | Path | Produces |
|
||||
| ------ | ---------------------- | ------------------ |
|
||||
| `GET` | `/query/:uuid/execute` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------------- |
|
||||
|
@ -629,10 +629,10 @@ interpolation.
|
|||
| `GET` | `/query/:uuid/explain` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
|
|
@ -18,10 +18,10 @@ node and may be associated with any number of checks.
|
|||
| `PUT` | `/session/create` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
@ -77,7 +77,7 @@ The table below shows this endpoint's support for
|
|||
86400s). If provided, the session is invalidated if it is not renewed before
|
||||
the TTL expires. The lowest practical TTL should be used to keep the number of
|
||||
managed sessions low. When locks are forcibly expired, such as when following
|
||||
the [leader election pattern](https://learn.hashicorp.com/tutorials/consul/application-leader-elections) in an application,
|
||||
the [leader election pattern](/consul/tutorials/developer-configuration/application-leader-elections) in an application,
|
||||
sessions may not be reaped for up to double this TTL, so long TTL
|
||||
values (> 1 hour) should be avoided. Valid time units include "s", "m" and "h".
|
||||
|
||||
|
@ -128,10 +128,10 @@ either a literal `true` or `false`, indicating of whether the destroy was
|
|||
successful.
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
@ -174,10 +174,10 @@ This endpoint returns the requested session information.
|
|||
| `GET` | `/session/info/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -237,10 +237,10 @@ This endpoint returns the active sessions for a given node.
|
|||
| `GET` | `/session/node/:node` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -300,10 +300,10 @@ This endpoint returns the list of active sessions.
|
|||
| `GET` | `/session/list` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | -------------- |
|
||||
|
@ -358,10 +358,10 @@ TTL, and it extends the expiration by the TTL.
|
|||
| `PUT` | `/session/renew/:uuid` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | --------------- |
|
||||
|
|
|
@ -10,7 +10,7 @@ description: |-
|
|||
|
||||
The `/snapshot` endpoints save and restore the state of the Consul
|
||||
servers for disaster recovery. Snapshots include all state managed by Consul's
|
||||
Raft [consensus protocol](/docs/architecture/consensus).
|
||||
Raft [consensus protocol](/consul/docs/architecture/consensus).
|
||||
|
||||
## Generate Snapshot
|
||||
|
||||
|
@ -30,16 +30,16 @@ restore.
|
|||
| `GET` | `/snapshot` | `200 application/x-gzip` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `default,stale` | `none` | `management` |
|
||||
|
||||
The corresponding CLI command is [`consul snapshot save`](/commands/snapshot/save).
|
||||
The corresponding CLI command is [`consul snapshot save`](/consul/commands/snapshot/save).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
@ -84,16 +84,16 @@ version as the cluster that originally took the snapshot.
|
|||
| `PUT` | `/snapshot` | `200 text/plain (empty body)` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `management` |
|
||||
|
||||
The corresponding CLI command is [`consul snapshot restore`](/commands/snapshot/restore).
|
||||
The corresponding CLI command is [`consul snapshot restore`](/consul/commands/snapshot/restore).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -23,10 +23,10 @@ running.
|
|||
| `GET` | `/status/leader` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
|
@ -60,16 +60,16 @@ determining when a given server has successfully joined the cluster.
|
|||
| `GET` | `/status/peers` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ------------ |
|
||||
| `NO` | `none` | `none` | `none` |
|
||||
|
||||
The corresponding CLI command is [`consul operator raft list-peers`](/commands/operator/raft#list-peers).
|
||||
The corresponding CLI command is [`consul operator raft list-peers`](/consul/commands/operator/raft#list-peers).
|
||||
|
||||
### Query Parameters
|
||||
|
||||
|
|
|
@ -36,10 +36,10 @@ the leader via the Raft consensus protocol.
|
|||
| `PUT` | `/txn` | `application/json` |
|
||||
|
||||
The table below shows this endpoint's support for
|
||||
[blocking queries](/api-docs/features/blocking),
|
||||
[consistency modes](/api-docs/features/consistency),
|
||||
[agent caching](/api-docs/features/caching), and
|
||||
[required ACLs](/api-docs/api-structure#authentication).
|
||||
[blocking queries](/consul/api-docs/features/blocking),
|
||||
[consistency modes](/consul/api-docs/features/consistency),
|
||||
[agent caching](/consul/api-docs/features/caching), and
|
||||
[required ACLs](/consul/api-docs/api-structure#authentication).
|
||||
|
||||
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
||||
| ---------------- | ----------------- | ------------- | ---------------------------------------------------------------------------------------------- |
|
||||
|
@ -92,7 +92,7 @@ a value of an object specific to that operation.
|
|||
- `Verb` `(string: <required>)` - Specifies the type of operation to perform.
|
||||
|
||||
- `Node` `(Node: <required>)` - Specifies the node information to use
|
||||
for the operation. See the [catalog endpoint](/api-docs/catalog#parameters) for the fields in this object. Note the only the node can be specified here, not any services or checks - separate service or check operations must be used for those.
|
||||
for the operation. See the [catalog endpoint](/consul/api-docs/catalog#parameters) for the fields in this object. Note the only the node can be specified here, not any services or checks - separate service or check operations must be used for those.
|
||||
|
||||
- `Service` operations have the following fields:
|
||||
|
||||
|
@ -102,14 +102,14 @@ a value of an object specific to that operation.
|
|||
this service operation.
|
||||
|
||||
- `Service` `(Service: <required>)` - Specifies the service instance information to use
|
||||
for the operation. See the [catalog endpoint](/api-docs/catalog#parameters) for the fields in this object.
|
||||
for the operation. See the [catalog endpoint](/consul/api-docs/catalog#parameters) for the fields in this object.
|
||||
|
||||
- `Check` operations have the following fields:
|
||||
|
||||
- `Verb` `(string: <required>)` - Specifies the type of operation to perform.
|
||||
|
||||
- `Check` `(Service: <required>)` - Specifies the check to use
|
||||
for the operation. See the [catalog endpoint](/api-docs/catalog#parameters) for the fields in this object.
|
||||
for the operation. See the [catalog endpoint](/consul/api-docs/catalog#parameters) for the fields in this object.
|
||||
|
||||
Please see the table below for available verbs.
|
||||
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Auth Method Create'
|
|||
|
||||
Command: `consul acl auth-method create`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/auth-method](/api-docs/acl/auth-methods#create-an-auth-method)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/auth-method](/consul/api-docs/acl/auth-methods#create-an-auth-method)
|
||||
|
||||
The `acl auth-method create` command creates new auth methods.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Auth Method Delete'
|
|||
|
||||
Command: `consul acl auth-method delete`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/auth-method/:name](/api-docs/acl/auth-methods#delete-an-auth-method)
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/auth-method/:name](/consul/api-docs/acl/auth-methods#delete-an-auth-method)
|
||||
|
||||
The `acl auth-method delete` command deletes an auth method.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -11,7 +11,7 @@ The `acl auth-method` command is used to manage Consul's ACL auth methods.
|
|||
It exposes commands for creating, updating, reading, deleting, and listing auth methods.
|
||||
This command is available in Consul 1.5.0 and newer.
|
||||
|
||||
ACL auth methods may also be managed via the [HTTP API](/api-docs/acl/auth-methods).
|
||||
ACL auth methods may also be managed via the [HTTP API](/consul/api-docs/acl/auth-methods).
|
||||
|
||||
-> **Note:** All of the example subcommands in this document will require a valid
|
||||
Consul token with the appropriate permissions. Either set the
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Auth Method List'
|
|||
|
||||
Command: `consul acl auth-method list`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/auth-methods](/api-docs/acl/auth-methods#list-auth-methods)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/auth-methods](/consul/api-docs/acl/auth-methods#list-auth-methods)
|
||||
|
||||
The `acl auth-method list` command lists all auth methods. By default it will not show metadata.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Auth Method Read'
|
|||
|
||||
Command: `consul acl auth-method read`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/auth-method/:name](/api-docs/acl/auth-methods#read-an-auth-method)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/auth-method/:name](/consul/api-docs/acl/auth-methods#read-an-auth-method)
|
||||
|
||||
The `acl auth-method read` command reads and displays an auth method's details.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,15 +7,15 @@ page_title: 'Commands: ACL Auth Method Update'
|
|||
|
||||
Command: `consul acl auth-method update`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/auth-method/:name](/api-docs/acl/auth-methods#update-an-auth-method)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/auth-method/:name](/consul/api-docs/acl/auth-methods#update-an-auth-method)
|
||||
|
||||
The `acl auth-method update` command is used to update an auth method. The
|
||||
default operations is to merge the current auth method with those values
|
||||
provided to the command invocation. Therefore to update just one field, only
|
||||
the `-name` options and the option to modify must be provided.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Binding Rule Create'
|
|||
|
||||
Command: `consul acl binding-rule create`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/binding-rule](/api-docs/acl/binding-rules#create-a-binding-rule)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/binding-rule](/consul/api-docs/acl/binding-rules#create-a-binding-rule)
|
||||
|
||||
The `acl binding-rule create` command creates new binding rules.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Binding Rule Delete'
|
|||
|
||||
Command: `consul acl binding-rule delete`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/binding-rule/:id](/api-docs/acl/binding-rules#delete-a-binding-rule)
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/binding-rule/:id](/consul/api-docs/acl/binding-rules#delete-a-binding-rule)
|
||||
|
||||
The `acl binding-rule delete` command deletes a binding rule.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -11,7 +11,7 @@ The `acl binding-rule` command is used to manage Consul's ACL binding rules.
|
|||
It exposes commands for creating, updating, reading, deleting, and listing binding rules.
|
||||
This command is available in Consul 1.5.0 and newer.
|
||||
|
||||
ACL binding rules may also be managed via the [HTTP API](/api-docs/acl/binding-rules).
|
||||
ACL binding rules may also be managed via the [HTTP API](/consul/api-docs/acl/binding-rules).
|
||||
|
||||
-> **Note:** All of the example subcommands in this document will require a valid
|
||||
Consul token with the appropriate permissions. Either set the
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Binding Rule List'
|
|||
|
||||
Command: `consul acl binding-rule list`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/binding-rules](/api-docs/acl/binding-rules#list-binding-rules)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/binding-rules](/consul/api-docs/acl/binding-rules#list-binding-rules)
|
||||
|
||||
The `acl binding-rule list` command lists all binding rules. By default it will not show metadata.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Binding Rule Read'
|
|||
|
||||
Command: `consul acl binding-rule read`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/binding-rule/:id](/api-docs/acl/binding-rules#read-a-binding-rule)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/binding-rule/:id](/consul/api-docs/acl/binding-rules#read-a-binding-rule)
|
||||
|
||||
The `acl binding-rule read` command reads and displays a binding rules details.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,15 +7,15 @@ page_title: 'Commands: ACL Binding Rule Update'
|
|||
|
||||
Command: `consul acl binding-rule update`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/binding-rule/:id](/api-docs/acl/binding-rules#update-a-binding-rule)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/binding-rule/:id](/consul/api-docs/acl/binding-rules#update-a-binding-rule)
|
||||
|
||||
The `acl binding-rule update` command is used to update a binding rule. The
|
||||
default operations is to merge the current binding rule with those values
|
||||
provided to the command invocation. Therefore to update just one field, only
|
||||
the `-id` option and the option to modify must be provided.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,15 +7,15 @@ page_title: 'Commands: ACL Bootstrap'
|
|||
|
||||
Command: `consul acl bootstrap`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/bootstrap](/api-docs/acl#bootstrap-acls)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/bootstrap](/consul/api-docs/acl#bootstrap-acls)
|
||||
|
||||
The `acl bootstrap` command generates a new token with unlimited privileges to use
|
||||
for management purposes and outputs the token's details. Optionally, you can provide a Secret ID to use instead of generating a completely new token. You can create this bootstrapping token only once and afterwards bootstrapping
|
||||
will be disabled. If all tokens are lost and you need to bootstrap again you can follow the bootstrap
|
||||
[reset procedure](https://learn.hashicorp.com/consul/security-networking/acl-troubleshooting?utm_source=docs).
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -12,7 +12,7 @@ line. It exposes top-level commands for bootstrapping the ACL system,
|
|||
managing tokens and policies, translating legacy rules, and setting the
|
||||
tokens for use by an agent.
|
||||
|
||||
ACLs are also accessible via the [HTTP API](/api-docs/acl).
|
||||
ACLs are also accessible via the [HTTP API](/consul/api-docs/acl).
|
||||
|
||||
Bootstrap Consul's ACLs:
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ page_title: 'Commands: ACL Policy Create'
|
|||
|
||||
Command: `consul acl policy create`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/policy](/api-docs/acl/policies#create-a-policy)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/policy](/consul/api-docs/acl/policies#create-a-policy)
|
||||
|
||||
The `acl policy create` command creates new policies. The policies rules can either be set explicitly or the
|
||||
`-from-token` parameter may be used to load the rules from a legacy ACL token. When loading
|
||||
|
@ -19,8 +19,8 @@ from stdin, a file or the raw value. To use stdin pass `-` as the value.
|
|||
To load the value from a file prefix the value with an `@`. Any other
|
||||
values will be used directly.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Policy Delete'
|
|||
|
||||
Command: `consul acl policy delete`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/policy/:id](/api-docs/acl/policies#delete-a-policy)
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/policy/:id](/consul/api-docs/acl/policies#delete-a-policy)
|
||||
|
||||
The `acl policy delete` command deletes a policy. Policies may be deleted by their ID or by name.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -11,7 +11,7 @@ The `acl policy` command is used to manage Consul's ACL policies.
|
|||
It exposes commands for creating, updating, reading, deleting, and listing policies.
|
||||
This command is available in Consul 1.4.0 and newer.
|
||||
|
||||
ACL policies may also be managed via the [HTTP API](/api-docs/acl/policies).
|
||||
ACL policies may also be managed via the [HTTP API](/consul/api-docs/acl/policies).
|
||||
|
||||
-> **Note:** All of the example subcommands in this document will require a valid
|
||||
Consul token with the appropriate permissions. Either set the
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Policy List'
|
|||
|
||||
Command: `consul acl policy list`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/policies](/api-docs/acl/policies#list-policies)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/policies](/consul/api-docs/acl/policies#list-policies)
|
||||
|
||||
The `acl policy list` command lists all policies. By default it will not show metadata.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Policy Read'
|
|||
|
||||
Command: `consul acl policy read`
|
||||
|
||||
Corresponding HTTP API Endpoints: [\[GET\] /v1/acl/policy/:id](/api-docs/acl/policies#read-a-policy), [\[GET\] /v1/acl/policy/name/:name](/api-docs/acl/policies#read-a-policy-by-name)
|
||||
Corresponding HTTP API Endpoints: [\[GET\] /v1/acl/policy/:id](/consul/api-docs/acl/policies#read-a-policy), [\[GET\] /v1/acl/policy/name/:name](/consul/api-docs/acl/policies#read-a-policy-by-name)
|
||||
|
||||
The `acl policy read` command reads and displays a policies details.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,7 +7,7 @@ page_title: 'Commands: ACL Policy Update'
|
|||
|
||||
Command: `consul acl policy update`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/policy/:id](/api-docs/acl/policies#update-a-policy)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/policy/:id](/consul/api-docs/acl/policies#update-a-policy)
|
||||
|
||||
The `acl policy update` command is used to update a policy. The default operations is to merge the current policy
|
||||
with those values provided to the command invocation. Therefore to update just one field, only
|
||||
|
@ -15,8 +15,8 @@ the `-id` or `-name` options and the option to modify must be provided. Note tha
|
|||
policies requires both the `-id` and `-name` as the new name cannot yet be used to lookup the
|
||||
policy.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Role Create'
|
|||
|
||||
Command: `consul acl role create`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/role](/api-docs/acl/roles#create-a-role)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/role](/consul/api-docs/acl/roles#create-a-role)
|
||||
|
||||
The `acl role create` command creates new roles.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Role Delete'
|
|||
|
||||
Command: `consul acl role delete`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/role/:id](/api-docs/acl/roles#delete-a-role)
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/role/:id](/consul/api-docs/acl/roles#delete-a-role)
|
||||
|
||||
The `acl role delete` command deletes a role. Roles may be deleted by their ID or by name.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -11,7 +11,7 @@ The `acl role` command is used to manage Consul's ACL roles.
|
|||
It exposes commands for creating, updating, reading, deleting, and listing roles.
|
||||
This command is available in Consul 1.5.0 and newer.
|
||||
|
||||
ACL roles may also be managed via the [HTTP API](/api-docs/acl/roles).
|
||||
ACL roles may also be managed via the [HTTP API](/consul/api-docs/acl/roles).
|
||||
|
||||
-> **Note:** All of the example subcommands in this document will require a valid
|
||||
Consul token with the appropriate permissions. Either set the
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Role List'
|
|||
|
||||
Command: `consul acl role list`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/roles](/api-docs/acl/roles#list-roles)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/roles](/consul/api-docs/acl/roles#list-roles)
|
||||
|
||||
The `acl role list` command lists all roles. By default it will not show metadata.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Role Read'
|
|||
|
||||
Command: `consul acl role read`
|
||||
|
||||
Corresponding HTTP API Endpoints: [\[GET\] /v1/acl/role/:id](/api-docs/acl/roles#read-a-role), [\[GET\] /v1/acl/role/name/:name](/api-docs/acl/roles#read-a-role-by-name)
|
||||
Corresponding HTTP API Endpoints: [\[GET\] /v1/acl/role/:id](/consul/api-docs/acl/roles#read-a-role), [\[GET\] /v1/acl/role/name/:name](/consul/api-docs/acl/roles#read-a-role-by-name)
|
||||
|
||||
The `acl role read` command reads and displays a roles details.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,7 +7,7 @@ page_title: 'Commands: ACL Role Update'
|
|||
|
||||
Command: `consul acl role update`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/role/:id](/api-docs/acl/roles#update-a-role)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/role/:id](/consul/api-docs/acl/roles#update-a-role)
|
||||
|
||||
The `acl role update` command is used to update a role. The default operations is to merge the
|
||||
current role with those values provided to the command invocation. Therefore to
|
||||
|
@ -15,8 +15,8 @@ update just one field, only the `-id` or `-name` options and the option to
|
|||
modify must be provided. Note that renaming roles requires both the `-id` and
|
||||
`-name` as the new name cannot yet be used to lookup the role.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,17 +7,17 @@ page_title: 'Commands: ACL Set Agent Token'
|
|||
|
||||
Command: `consul acl set-agent-token`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/agent/token/:type](/api-docs/agent#update-acl-tokens)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/agent/token/:type](/consul/api-docs/agent#update-acl-tokens)
|
||||
|
||||
This command updates the ACL tokens currently in use by the agent. It can be used to introduce
|
||||
ACL tokens to the agent for the first time, or to update tokens that were initially loaded from
|
||||
the agent's configuration. Tokens are not persisted unless
|
||||
[`acl.enable_token_persistence`](/docs/agent/config/config-files#acl_enable_token_persistence)
|
||||
[`acl.enable_token_persistence`](/consul/docs/agent/config/config-files#acl_enable_token_persistence)
|
||||
is `true`, so tokens will need to be updated again if that option is `false` and
|
||||
the agent is restarted.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Token Clone'
|
|||
|
||||
Command: `consul acl token clone`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/token/:AccessorID/clone](/api-docs/acl/tokens#clone-a-token)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/token/:AccessorID/clone](/consul/api-docs/acl/tokens#clone-a-token)
|
||||
|
||||
The `acl token clone` command clones an existing token.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,14 +7,14 @@ page_title: 'Commands: ACL Token Create'
|
|||
|
||||
Command: `consul acl token create`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/token](/api-docs/acl/tokens#create-a-token)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/token](/consul/api-docs/acl/tokens#create-a-token)
|
||||
|
||||
This command creates new tokens. When creating a new token, policies may be linked using
|
||||
either the `-policy-id` or the `-policy-name` options. When specifying policies by IDs you
|
||||
may use a unique prefix of the UUID as a shortcut for specifying the entire UUID.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Token Delete'
|
|||
|
||||
Command: `consul acl token delete`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/token/:AccessorID](/api-docs/acl/tokens#delete-a-token)
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/acl/token/:AccessorID](/consul/api-docs/acl/tokens#delete-a-token)
|
||||
|
||||
The `acl token delete` command deletes a token.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -11,7 +11,7 @@ The `acl token` command is used to manage Consul's ACL tokens.
|
|||
It exposes commands for creating, updating, reading, deleting, and listing tokens.
|
||||
This command is available in Consul 1.4.0 and newer.
|
||||
|
||||
ACL tokens may also be managed via the [HTTP API](/api-docs/acl/tokens).
|
||||
ACL tokens may also be managed via the [HTTP API](/consul/api-docs/acl/tokens).
|
||||
|
||||
-> **Note:** All of the example subcommands in this document will require a valid
|
||||
Consul token with the appropriate permissions. Either set the
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Token List'
|
|||
|
||||
Command: `consul acl token list`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/tokens](/api-docs/acl/tokens#list-tokens)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/tokens](/consul/api-docs/acl/tokens#list-tokens)
|
||||
|
||||
The `acl token list` command lists all tokens. By default it will not show metadata.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: ACL Token Read'
|
|||
|
||||
Command: `consul acl token read`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/token/:AccessorID](/api-docs/acl/tokens#read-a-token)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/token/:AccessorID](/consul/api-docs/acl/tokens#read-a-token)
|
||||
|
||||
The `acl token read` command reads and displays a token details.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,13 +7,13 @@ page_title: 'Commands: ACL Token Update'
|
|||
|
||||
Command: `consul acl token update`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/token/:AccessorID](/api-docs/acl/tokens#update-a-token)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/token/:AccessorID](/consul/api-docs/acl/tokens#update-a-token)
|
||||
|
||||
The `acl token update` command will update a token. Some parts of the token like whether the
|
||||
token is local to the datacenter cannot be changed.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -10,12 +10,12 @@ It will be removed in a future major release when support for the legacy ACL sys
|
|||
|
||||
Command: `consul acl translate-rules`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/rules/translate/:accessor_id](/api-docs/acl#translate-a-legacy-token-s-rules)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/acl/rules/translate/:accessor_id](/consul/api-docs/acl#translate-a-legacy-token-s-rules)
|
||||
|
||||
This command translates the legacy ACL rule syntax into the new syntax.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -14,6 +14,6 @@ performs the important task of maintaining membership information,
|
|||
running checks, announcing services, handling queries, etc.
|
||||
|
||||
Due to the power and flexibility of this command, the Consul agent
|
||||
is documented in its own section. See the [Consul Agent](/docs/agent)
|
||||
is documented in its own section. See the [Consul Agent](/consul/docs/agent)
|
||||
section for more information on how to use this command and the
|
||||
options it has.
|
||||
|
|
|
@ -7,12 +7,12 @@ page_title: 'Commands: Catalog List Datacenters'
|
|||
|
||||
Command: `consul catalog datacenters`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/catalog/datacenters](/api-docs/catalog#list-datacenters)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/catalog/datacenters](/consul/api-docs/catalog#list-datacenters)
|
||||
|
||||
The `catalog datacenters` command prints all known datacenters.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -11,7 +11,7 @@ The `catalog` command is used to interact with Consul's catalog via the command
|
|||
line. It exposes top-level commands for reading and filtering data from the
|
||||
registry.
|
||||
|
||||
The catalog is also accessible via the [HTTP API](/api-docs/catalog).
|
||||
The catalog is also accessible via the [HTTP API](/consul/api-docs/catalog).
|
||||
|
||||
## Basic Examples
|
||||
|
||||
|
|
|
@ -7,14 +7,14 @@ page_title: 'Commands: Catalog List Nodes'
|
|||
|
||||
Command: `consul catalog nodes`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/catalog/nodes](/api-docs/catalog#list-nodes)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/catalog/nodes](/consul/api-docs/catalog#list-nodes)
|
||||
|
||||
The `catalog nodes` command prints all known nodes and metadata about them.
|
||||
It can also query for nodes that match a particular metadata or provide a
|
||||
particular service.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
@ -78,7 +78,7 @@ Usage: `consul catalog nodes [options]`
|
|||
|
||||
- `-filter=<filter>` - Expression to use for filtering the results. Can be passed
|
||||
via stdin by using `-` for the value or from a file by passing `@<file path>`.
|
||||
See the [`/catalog/nodes` API documentation](/api-docs/catalog#filtering) for a
|
||||
See the [`/catalog/nodes` API documentation](/consul/api-docs/catalog#filtering) for a
|
||||
description of what is filterable.
|
||||
|
||||
#### Enterprise Options
|
||||
|
|
|
@ -7,14 +7,14 @@ page_title: 'Commands: Catalog List Services'
|
|||
|
||||
Command: `consul catalog services`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/catalog/services](/api-docs/catalog#list-services)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/catalog/services](/consul/api-docs/catalog#list-services)
|
||||
|
||||
The `catalog services` command prints all known services. It can also query
|
||||
for services that match particular metadata or list the services that a
|
||||
particular node provides.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -7,14 +7,14 @@ page_title: 'Commands: Config Delete'
|
|||
|
||||
Command: `consul config delete`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/config/:kind/:name](/api-docs/config#delete-configuration)
|
||||
Corresponding HTTP API Endpoint: [\[DELETE\] /v1/config/:kind/:name](/consul/api-docs/config#delete-configuration)
|
||||
|
||||
The `config delete` command deletes the configuration entry specified by the
|
||||
kind and name. See the [configuration entries docs](/docs/agent/config-entries)
|
||||
kind and name. See the [configuration entries docs](/consul/docs/agent/config-entries)
|
||||
for more details about configuration entries.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required<sup>1</sup> |
|
||||
|
|
|
@ -10,9 +10,9 @@ Command: `consul config`
|
|||
The `config` command is used to interact with Consul's central configuration
|
||||
system. It exposes commands for creating, updating, reading, and deleting
|
||||
different kinds of config entries. See the
|
||||
[agent configuration](/docs/agent/config/config-files#enable_central_service_config)
|
||||
[agent configuration](/consul/docs/agent/config/config-files#enable_central_service_config)
|
||||
for more information on how to enable this functionality for centrally
|
||||
configuring services and [configuration entries docs](/docs/agent/config-entries) for a description
|
||||
configuring services and [configuration entries docs](/consul/docs/agent/config-entries) for a description
|
||||
of the configuration entries content.
|
||||
|
||||
## Usage
|
||||
|
|
|
@ -7,14 +7,14 @@ page_title: 'Commands: Config List'
|
|||
|
||||
Command: `consul config list`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/config/:kind](/api-docs/config#list-configurations)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/config/:kind](/consul/api-docs/config#list-configurations)
|
||||
|
||||
The `config list` command lists all given config entries of the given kind.
|
||||
See the [configuration entries docs](/docs/agent/config-entries) for more
|
||||
See the [configuration entries docs](/consul/docs/agent/config-entries) for more
|
||||
details about configuration entries.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required<sup>1</sup> |
|
||||
|
|
|
@ -7,15 +7,15 @@ page_title: 'Commands: Config Read'
|
|||
|
||||
Command: `consul config read`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/config/:kind/:name](/api-docs/config#get-configuration)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/config/:kind/:name](/consul/api-docs/config#get-configuration)
|
||||
|
||||
The `config read` command reads the config entry specified by the given
|
||||
kind and name and outputs its JSON representation. See the
|
||||
[configuration entries docs](/docs/agent/config-entries) for more
|
||||
[configuration entries docs](/consul/docs/agent/config-entries) for more
|
||||
details about configuration entries.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required<sup>1</sup> |
|
||||
|
|
|
@ -7,14 +7,14 @@ page_title: 'Commands: Config Write'
|
|||
|
||||
Command: `consul config write`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/config](/api-docs/config#apply-configuration)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/config](/consul/api-docs/config#apply-configuration)
|
||||
|
||||
The `config write` command creates or updates a centralized config entry.
|
||||
See the [configuration entries docs](/docs/agent/config-entries) for more
|
||||
See the [configuration entries docs](/consul/docs/agent/config-entries) for more
|
||||
details about configuration entries.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required<sup>1</sup> |
|
||||
|
@ -71,7 +71,7 @@ From stdin:
|
|||
### Config Entry examples
|
||||
|
||||
All config entries must have a `Kind` when registered. See
|
||||
[Service Mesh - Config Entries](/docs/connect/config-entries) for the list of
|
||||
[Service Mesh - Config Entries](/consul/docs/connect/config-entries) for the list of
|
||||
supported config entries.
|
||||
|
||||
#### Service defaults
|
||||
|
|
|
@ -12,7 +12,7 @@ Command: `consul connect ca`
|
|||
|
||||
The CA connect command is used to interact with Consul Connect's Certificate Authority
|
||||
subsystem. The command can be used to view or modify the current CA configuration. See the
|
||||
[Connect CA documentation](/docs/connect/ca) for more information.
|
||||
[Connect CA documentation](/consul/docs/connect/ca) for more information.
|
||||
|
||||
```text
|
||||
Usage: consul connect ca <subcommand> [options] [args]
|
||||
|
@ -42,8 +42,8 @@ Subcommands:
|
|||
|
||||
This command displays the current CA configuration.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
@ -52,7 +52,7 @@ are not supported from commands, but may be from the corresponding HTTP endpoint
|
|||
|
||||
Usage: `consul connect ca get-config [options]`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/connect/ca/configuration](/api-docs/connect/ca#get-ca-configuration)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/connect/ca/configuration](/consul/api-docs/connect/ca#get-ca-configuration)
|
||||
|
||||
#### API Options
|
||||
|
||||
|
@ -74,11 +74,11 @@ The output looks like this:
|
|||
## set-config
|
||||
|
||||
Modifies the current CA configuration. If this results in a new root certificate
|
||||
being used, the [Root Rotation](/docs/connect/ca#root-certificate-rotation) process
|
||||
being used, the [Root Rotation](/consul/docs/connect/ca#root-certificate-rotation) process
|
||||
will be triggered.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
@ -87,7 +87,7 @@ are not supported from commands, but may be from the corresponding HTTP endpoint
|
|||
|
||||
Usage: `consul connect ca set-config [options]`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/connect/ca/configuration](/api-docs/connect/ca#update-ca-configuration)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/connect/ca/configuration](/consul/api-docs/connect/ca#update-ca-configuration)
|
||||
|
||||
The output looks like this:
|
||||
|
||||
|
@ -99,16 +99,16 @@ The return code will indicate success or failure.
|
|||
|
||||
~> **If currently using Vault CA provider:**
|
||||
If you intend to change the CA provider from Vault to another,
|
||||
or to change the Vault provider's [`RootPKIPath`](/docs/connect/ca/vault#rootpkipath),
|
||||
or to change the Vault provider's [`RootPKIPath`](/consul/docs/connect/ca/vault#rootpkipath),
|
||||
you must temporarily elevate the privileges of the Vault token
|
||||
or auth method in use as described in the
|
||||
[Vault CA provider documentation](/docs/connect/ca/vault#additional-vault-acl-policies-for-sensitive-operations).
|
||||
[Vault CA provider documentation](/consul/docs/connect/ca/vault#additional-vault-acl-policies-for-sensitive-operations).
|
||||
|
||||
#### Command Options
|
||||
|
||||
- `-config-file` - (required) Specifies a JSON-formatted file to use for the new configuration.
|
||||
The format of this config file matches the request payload documented in the
|
||||
[Update CA Configuration API](/api-docs/connect/ca#update-ca-configuration).
|
||||
[Update CA Configuration API](/consul/api-docs/connect/ca#update-ca-configuration).
|
||||
|
||||
- `-force-without-cross-signing` `(bool: <optional>)` - Indicates that the CA change
|
||||
should be forced to complete even if the current CA doesn't support root cross-signing.
|
||||
|
@ -117,7 +117,7 @@ The return code will indicate success or failure.
|
|||
until service mesh proxies and/or Consul client agents receive a new certificate
|
||||
that establishes trust with the new root.
|
||||
Do not use this flag unless you are sure you need it.
|
||||
Refer to [Forced Rotation Without Cross-Signing](/docs/connect/ca#forced-rotation-without-cross-signing)
|
||||
Refer to [Forced Rotation Without Cross-Signing](/consul/docs/connect/ca#forced-rotation-without-cross-signing)
|
||||
for more detail.
|
||||
|
||||
#### API Options
|
||||
|
|
|
@ -11,7 +11,7 @@ Command: `consul connect envoy`
|
|||
|
||||
The connect Envoy command is used to generate a bootstrap configuration for
|
||||
[Envoy proxy](https://envoyproxy.io) for use with [Consul
|
||||
Connect](/docs/connect/).
|
||||
Connect](/consul/docs/connect/).
|
||||
|
||||
Refer to the [examples](#examples) for guidance on common use cases,
|
||||
such as [launching a service instance's sidecar proxy
|
||||
|
@ -36,7 +36,7 @@ Usage: `consul connect envoy [options] [-- pass-through options]`
|
|||
|
||||
#### Envoy Options for both Sidecars and Gateways
|
||||
|
||||
- `-proxy-id` - The [proxy service](/docs/connect/registration/service-registration) ID.
|
||||
- `-proxy-id` - The [proxy service](/consul/docs/connect/registration/service-registration) ID.
|
||||
This service ID must already be registered with the local agent unless a gateway is being
|
||||
registered with the `-register` flag. As of Consul 1.8.0, this can also be
|
||||
specified via the `CONNECT_PROXY_ID` environment variable.
|
||||
|
@ -56,7 +56,7 @@ Usage: `consul connect envoy [options] [-- pass-through options]`
|
|||
ACL token from `-token` or the environment and so should be handled as a secret.
|
||||
This token grants the identity of any service it has `service:write` permission
|
||||
for and so can be used to access any upstream service that that service is
|
||||
allowed to access by [Connect intentions](/docs/connect/intentions).
|
||||
allowed to access by [Connect intentions](/consul/docs/connect/intentions).
|
||||
|
||||
- `-envoy-version` - The version of envoy that is being started. Default is
|
||||
`1.23.1`. This is required so that the correct configuration can be generated.
|
||||
|
@ -131,7 +131,7 @@ compatibility with Envoy and prevent potential issues. Default is `false`.
|
|||
- `-sidecar-for` - The _ID_ (not name if they differ) of the service instance
|
||||
this proxy will represent. The target service doesn't need to exist on the
|
||||
local agent yet but a [sidecar proxy
|
||||
registration](/docs/connect/registration/service-registration) with
|
||||
registration](/consul/docs/connect/registration/service-registration) with
|
||||
`proxy.destination_service_id` equal to the passed value must be present. If
|
||||
multiple proxy registrations targeting the same local service instance are
|
||||
present the command will error and `-proxy-id` should be used instead.
|
||||
|
@ -167,14 +167,14 @@ compatibility with Envoy and prevent potential issues. Default is `false`.
|
|||
instantiated at the specified IP and port. Consul uses `/ready` HTTP endpoints
|
||||
to check gateway health. The specified IP will also be used by the ingress
|
||||
gateway when instantiating user-defined listeners configured in the
|
||||
[ingress gateway](/docs/connect/gateways/ingress-gateway) configuration entry.
|
||||
[ingress gateway](/consul/docs/connect/gateways/ingress-gateway) configuration entry.
|
||||
|
||||
~> **Note**: Ensure that user-defined ingress gateway listeners use a
|
||||
different port than the port specified in `-address` so that they do not
|
||||
conflict with the health check endpoint.
|
||||
|
||||
- `-admin-access-log-path` -
|
||||
**Deprecated in Consul 1.15.0 in favor of [`proxy-defaults` access logs](/docs/connect/config-entries/proxy-defaults#accesslogs).**
|
||||
**Deprecated in Consul 1.15.0 in favor of [`proxy-defaults` access logs](/consul/docs/connect/config-entries/proxy-defaults#accesslogs).**
|
||||
The path to write the access log for the administration
|
||||
server. If no access log is desired specify `/dev/null`. By default it will
|
||||
use `/dev/null`.
|
||||
|
@ -215,7 +215,7 @@ proxy configuration needed.
|
|||
be used instead. The scheme can also be set to HTTPS by setting the
|
||||
environment variable CONSUL_HTTP_SSL=true. This may be a unix domain socket
|
||||
using `unix:///path/to/socket` if the [agent is configured to
|
||||
listen](/docs/agent/config/config-files#addresses) that way.
|
||||
listen](/consul/docs/agent/config/config-files#addresses) that way.
|
||||
|
||||
-> **Note:** gRPC uses the same TLS
|
||||
settings as the HTTPS API. If HTTPS is enabled then gRPC will require HTTPS
|
||||
|
@ -227,7 +227,7 @@ proxy configuration needed.
|
|||
|
||||
Assume a local service instance is registered on the local agent with a
|
||||
sidecar proxy (using the [sidecar service
|
||||
registration](/docs/connect/registration/service-registration) helper) as below.
|
||||
registration](/consul/docs/connect/registration/service-registration) helper) as below.
|
||||
|
||||
```hcl
|
||||
service {
|
||||
|
|
|
@ -14,7 +14,7 @@ Command: `consul connect expose`
|
|||
The connect expose subcommand is used to expose a Connect-enabled service
|
||||
through an Ingress gateway by modifying the gateway's configuration and adding
|
||||
an intention to allow traffic from the gateway to the service. See the
|
||||
[Ingress gateway documentation](/docs/connect/gateways/ingress-gateway) for more information
|
||||
[Ingress gateway documentation](/consul/docs/connect/gateways/ingress-gateway) for more information
|
||||
about Ingress gateways.
|
||||
|
||||
```text
|
||||
|
|
|
@ -8,7 +8,7 @@ page_title: 'Commands: Connect'
|
|||
Command: `consul connect`
|
||||
|
||||
The `connect` command is used to interact with Consul
|
||||
[Connect](/docs/connect/intentions) subsystems. It exposes commands for
|
||||
[Connect](/consul/docs/connect/intentions) subsystems. It exposes commands for
|
||||
running the built-in mTLS proxy and viewing/updating the Certificate Authority
|
||||
(CA) configuration. This command is available in Consul 1.2 and later.
|
||||
|
||||
|
|
|
@ -24,14 +24,14 @@ Usage: `consul connect proxy [options]`
|
|||
- `-sidecar-for` - The _ID_ (not name if they differ) of the service instance
|
||||
this proxy will represent. The target service doesn't need to exist on the
|
||||
local agent yet but a [sidecar proxy
|
||||
registration](/docs/connect/registration/service-registration) with
|
||||
registration](/consul/docs/connect/registration/service-registration) with
|
||||
`proxy.destination_service_id` equal to the passed value must be present. If
|
||||
multiple proxy registrations targeting the same local service instance are
|
||||
present the command will error and `-proxy-id` should be used instead.
|
||||
This can also be specified via the `CONNECT_SIDECAR_FOR` environment variable.
|
||||
|
||||
- `-proxy-id` - The [proxy
|
||||
service](/docs/connect/registration/service-registration) ID on the
|
||||
service](/consul/docs/connect/registration/service-registration) ID on the
|
||||
local agent. This must already be present on the local agent. This option
|
||||
can also be specified via the `CONNECT_PROXY_ID` environment variable.
|
||||
|
||||
|
@ -44,7 +44,7 @@ Usage: `consul connect proxy [options]`
|
|||
doesn't need to actually exist in the Consul catalog, but proper ACL
|
||||
permissions (`service:write`) are required. This and the remaining options can
|
||||
be used to setup a proxy that is not registered already with local config
|
||||
[useful for development](/docs/connect/dev).
|
||||
[useful for development](/consul/docs/connect/dev).
|
||||
|
||||
- `-upstream` - Upstream service to support connecting to. The format should be
|
||||
'name:addr', such as 'db:8181'. This will make 'db' available on port 8181.
|
||||
|
@ -66,7 +66,7 @@ Usage: `consul connect proxy [options]`
|
|||
- `-register-id` - Optional ID suffix for the service when `-register` is set to
|
||||
disambiguate the service ID. By default the service ID is `<service>-proxy`
|
||||
where `<service>` is the `-service` value. In most cases it is now preferable
|
||||
to use [`consul services register`](/commands/services/register) to
|
||||
to use [`consul services register`](/consul/commands/services/register) to
|
||||
register a fully configured proxy instance rather than specify config and
|
||||
registration via this command.
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@ Command: `consul connect redirect-traffic`
|
|||
|
||||
The connect redirect-traffic command is used to apply traffic redirection rules to enforce
|
||||
all traffic to go through the [Envoy proxy](https://envoyproxy.io) when using [Consul
|
||||
Service Mesh](/docs/connect/) in the Transparent Proxy mode.
|
||||
Service Mesh](/consul/docs/connect/) in the Transparent Proxy mode.
|
||||
|
||||
This command requires `iptables` command line utility to be installed,
|
||||
and as a result, this command can currently only run on linux.
|
||||
|
@ -38,7 +38,7 @@ Usage: `consul connect redirect-traffic [options]`
|
|||
|
||||
- `-consul-dns-port` - The port of the Consul DNS resolver. If provided, DNS queries will be redirected to the provided IP address for name resolution.
|
||||
|
||||
- `-proxy-id` - The [proxy service](/docs/connect/registration/service-registration) ID.
|
||||
- `-proxy-id` - The [proxy service](/consul/docs/connect/registration/service-registration) ID.
|
||||
This service ID must already be registered with the local agent.
|
||||
|
||||
- `-proxy-inbound-port` - The inbound port that the proxy is listening on.
|
||||
|
|
|
@ -78,7 +78,7 @@ information when `debug` is running. By default, it captures all information.
|
|||
| `members` | A list of all the WAN and LAN members in the cluster. |
|
||||
| `metrics` | Metrics from the in-memory metrics endpoint in the target, captured at the interval. |
|
||||
| `logs` | `DEBUG` level logs for the target agent, captured for the duration. |
|
||||
| `pprof` | Golang heap, CPU, goroutine, and trace profiling. CPU and traces are captured for `duration` in a single file while heap and goroutine are separate snapshots for each `interval`. This information is not retrieved unless [`enable_debug`](/docs/agent/config/config-files#enable_debug) is set to `true` on the target agent or ACLs are enable and an ACL token with `operator:read` is provided. |
|
||||
| `pprof` | Golang heap, CPU, goroutine, and trace profiling. CPU and traces are captured for `duration` in a single file while heap and goroutine are separate snapshots for each `interval`. This information is not retrieved unless [`enable_debug`](/consul/docs/agent/config/config-files#enable_debug) is set to `true` on the target agent or ACLs are enable and an ACL token with `operator:read` is provided. |
|
||||
|
||||
## Examples
|
||||
|
||||
|
|
|
@ -13,20 +13,20 @@ description: >-
|
|||
|
||||
Command: `consul event`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/event/fire/:name](/api-docs/event#fire-event)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/event/fire/:name](/consul/api-docs/event#fire-event)
|
||||
|
||||
The `event` command provides a mechanism to fire a custom user event to an
|
||||
entire datacenter. These events are opaque to Consul, but they can be used
|
||||
to build scripting infrastructure to do automated deploys, restart services,
|
||||
or perform any other orchestration action. Events can be handled by
|
||||
[using a watch](/docs/dynamic-app-config/watches).
|
||||
[using a watch](/consul/docs/dynamic-app-config/watches).
|
||||
|
||||
Under the hood, events are propagated using the [gossip protocol](/docs/architecture/gossip).
|
||||
Under the hood, events are propagated using the [gossip protocol](/consul/docs/architecture/gossip).
|
||||
|
||||
While the details are not important for using events, an understanding of
|
||||
the semantics is useful. The gossip layer will make a best-effort to deliver
|
||||
the event, but there is **no guaranteed delivery**. Unlike most Consul data, which is
|
||||
replicated using [consensus](/docs/architecture/consensus), event data
|
||||
replicated using [consensus](/consul/docs/architecture/consensus), event data
|
||||
is purely peer-to-peer over gossip. This means it is not persisted and does
|
||||
not have a total ordering. In practice, this means you cannot rely on the
|
||||
order of message delivery. An advantage however is that events can still
|
||||
|
@ -37,8 +37,8 @@ message. It is hard to give an exact number, as it depends on various
|
|||
parameters of the event, but the payload should be kept very small
|
||||
(< 100 bytes). Specifying too large of an event will return an error.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -16,8 +16,8 @@ this can be used to run the `uptime` command across all machines providing
|
|||
the `web` service.
|
||||
|
||||
Remote execution works by specifying a job, which is stored in the KV store.
|
||||
Agents are informed about the new job using the [event system](/commands/event),
|
||||
which propagates messages via the [gossip protocol](/docs/architecture/gossip).
|
||||
Agents are informed about the new job using the [event system](/consul/commands/event),
|
||||
which propagates messages via the [gossip protocol](/consul/docs/architecture/gossip).
|
||||
As a result, delivery is best-effort, and there is **no guarantee** of execution.
|
||||
|
||||
While events are purely gossip driven, remote execution relies on the KV store
|
||||
|
@ -30,7 +30,7 @@ through the Consul servers and the Raft consensus algorithm, so having a large
|
|||
number of nodes in the cluster flow a large amount of data through the KV store
|
||||
could make the cluster unavailable.
|
||||
|
||||
The table below shows the [required ACLs](/api-docs/api-structure#authentication) in order to
|
||||
The table below shows the [required ACLs](/consul/api-docs/api-structure#authentication) in order to
|
||||
execute this command.
|
||||
|
||||
| ACL Required | Scope |
|
||||
|
@ -40,7 +40,7 @@ execute this command.
|
|||
| `key:write` | `"_rexec"` prefix |
|
||||
| `event:write` | `"_rexec"` prefix |
|
||||
|
||||
In addition to the above, the policy associated with the [agent token](/docs/security/acl/acl-tokens#acl-agent-token) should have `write` on `"_rexec"` key prefix. This is for the agents to read the `exec` command and write its output back to the KV store.
|
||||
In addition to the above, the policy associated with the [agent token](/consul/docs/security/acl/acl-tokens#acl-agent-token) should have `write` on `"_rexec"` key prefix. This is for the agents to read the `exec` command and write its output back to the KV store.
|
||||
|
||||
## Usage
|
||||
|
||||
|
|
|
@ -11,17 +11,17 @@ description: >-
|
|||
|
||||
Command: `consul force-leave`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/agent/force-leave/:node](/api-docs/agent#force-leave-and-shutdown)
|
||||
Corresponding HTTP API Endpoint: [\[PUT\] /v1/agent/force-leave/:node](/consul/api-docs/agent#force-leave-and-shutdown)
|
||||
|
||||
The `force-leave` command forces a member of a Consul cluster to enter the
|
||||
"left" state. The purpose of this method is to force-remove a node that has failed or
|
||||
was shutdown without a [graceful leave](/commands/leave).
|
||||
was shutdown without a [graceful leave](/consul/commands/leave).
|
||||
|
||||
Consul periodically tries to reconnect to "failed" nodes in case failure was due
|
||||
to a network partition. After some configured amount of time (by default 72 hours),
|
||||
Consul will reap "failed" nodes and stop trying to reconnect. The `force-leave`
|
||||
command can be used to transition the "failed" nodes to a "left" state more
|
||||
quickly, as reported by [`consul members`](/commands/members).
|
||||
quickly, as reported by [`consul members`](/consul/commands/members).
|
||||
|
||||
This can be particularly useful for a node that was running as a server,
|
||||
as it will eventually be removed from the Raft configuration by the leader.
|
||||
|
@ -32,8 +32,8 @@ from the datacenter's member list nor from the raft configuration. Additionally,
|
|||
if the agent returns after transitioning to the "left" state, but before it is reaped
|
||||
from the member list, then it will rejoin the cluster.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
|
|
@ -94,8 +94,8 @@ Command Options
|
|||
|
||||
## Authentication
|
||||
|
||||
When the [ACL system is enabled](/docs/agent/config/config-files#acl) the Consul CLI will
|
||||
require an [ACL token](/docs/security/acl#tokens) to perform API requests.
|
||||
When the [ACL system is enabled](/consul/docs/agent/config/config-files#acl) the Consul CLI will
|
||||
require an [ACL token](/consul/docs/security/acl#tokens) to perform API requests.
|
||||
|
||||
The ACL token can be provided directly on the command line using the `-token` command line flag,
|
||||
from a file using the `-token-file` command line flag, or from the
|
||||
|
@ -123,7 +123,7 @@ list-peers remove-peer
|
|||
## Arguments with URL-Invalid Characters
|
||||
|
||||
The CLI automatically URL-encodes arguments, which are then
|
||||
[URL-decoded by the underlying HTTP API endpoints](/api-docs/api-structure#url-encoded-resource-names).
|
||||
[URL-decoded by the underlying HTTP API endpoints](/consul/api-docs/api-structure#url-encoded-resource-names).
|
||||
To avoid double-encoding arguments, do not URL-encode arguments passed to the CLI.
|
||||
|
||||
## Environment Variables
|
||||
|
@ -241,8 +241,8 @@ CONSUL_TLS_SERVER_NAME=consulserver.domain
|
|||
|
||||
Like [`CONSUL_HTTP_ADDR`](#consul_http_addr) but configures the address the
|
||||
local agent is listening for gRPC requests. Currently gRPC is only used for
|
||||
integrating [Envoy proxy](/docs/connect/proxies/envoy) and must be [enabled
|
||||
explicitly](/docs/agent/config/config-files#grpc_port) in agent configuration.
|
||||
integrating [Envoy proxy](/consul/docs/connect/proxies/envoy) and must be [enabled
|
||||
explicitly](/consul/docs/agent/config/config-files#grpc_port) in agent configuration.
|
||||
|
||||
```
|
||||
CONSUL_GRPC_ADDR=127.0.0.1:8502
|
||||
|
@ -255,7 +255,7 @@ CONSUL_GRPC_ADDR=unix://var/run/consul_grpc.sock
|
|||
```
|
||||
|
||||
If the agent is [configured with TLS
|
||||
certificates](/docs/security/encryption#rpc-encryption-with-tls), then the
|
||||
certificates](/consul/docs/security/encryption#rpc-encryption-with-tls), then the
|
||||
gRPC listener will require TLS and present the same certificate as the https
|
||||
listener. As with `CONSUL_HTTP_ADDR`, if TLS is enabled either the `https://`
|
||||
scheme should be used, or `CONSUL_HTTP_SSL` set.
|
||||
|
|
|
@ -19,9 +19,9 @@ There are currently the top-level keys for:
|
|||
|
||||
- agent: Provides information about the agent
|
||||
- consul: Information about the consul library (client or server)
|
||||
- raft: Provides info about the Raft [consensus library](/docs/architecture/consensus)
|
||||
- serf_lan: Provides info about the LAN [gossip pool](/docs/architecture/gossip)
|
||||
- serf_wan: Provides info about the WAN [gossip pool](/docs/architecture/gossip)
|
||||
- raft: Provides info about the Raft [consensus library](/consul/docs/architecture/consensus)
|
||||
- serf_lan: Provides info about the LAN [gossip pool](/consul/docs/architecture/gossip)
|
||||
- serf_wan: Provides info about the WAN [gossip pool](/consul/docs/architecture/gossip)
|
||||
|
||||
Here is an example output:
|
||||
|
||||
|
|
|
@ -7,7 +7,7 @@ page_title: 'Commands: Intention Check'
|
|||
|
||||
Command: `consul intention check`
|
||||
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/connect/intentions/check](/api-docs/connect/intentions#check-intention-result)
|
||||
Corresponding HTTP API Endpoint: [\[GET\] /v1/connect/intentions/check](/consul/api-docs/connect/intentions#check-intention-result)
|
||||
|
||||
The `intention check` command checks whether a connection attempt between
|
||||
two services would be authorized given the current set of intentions and
|
||||
|
@ -16,15 +16,15 @@ Consul configuration.
|
|||
This command requires less ACL permissions than other intention-related
|
||||
tasks because no information about the intention is revealed. Therefore,
|
||||
callers only need to have `service:read` access for the destination. Richer
|
||||
commands like [match](/commands/intention/match) require full
|
||||
commands like [match](/consul/commands/intention/match) require full
|
||||
intention read permissions and don't evaluate the result.
|
||||
|
||||
-> **Note:** This command will always treat intentions with `Permissions`
|
||||
defined as _deny_ intentions during evaluation, as this endpoint is only suited
|
||||
for networking layer 4 (e.g. TCP) integration.
|
||||
|
||||
The table below shows this command's [required ACLs](/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/api-docs/features/blocking) and [agent caching](/api-docs/features/caching)
|
||||
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
||||
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
||||
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
||||
|
||||
| ACL Required |
|
||||
|
@ -44,7 +44,7 @@ are not supported from commands, but may be from the corresponding HTTP endpoint
|
|||
|
||||
Usage: `consul intention check [options] SRC DST`
|
||||
|
||||
`SRC` and `DST` can both take [several forms](/commands/intention#source-and-destination-naming).
|
||||
`SRC` and `DST` can both take [several forms](/consul/commands/intention#source-and-destination-naming).
|
||||
|
||||
#### Enterprise Options
|
||||
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue