Backport of Fix removed service-to-service peering links into release/1.16.x (#18019)
* no-op commit due to failed cherry-picking * Fix removed service-to-service peering links (#17221) * docs: fix removed service-to-service peering links * docs: extend peering-via-mesh-gateways intro (thanks @trujillo-adam) --------- Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> --------- Co-authored-by: temp <temp@hashicorp.com> Co-authored-by: Michael Hofer <karras@users.noreply.github.com> Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
This commit is contained in:
parent
ef09f400b5
commit
ef9282d224
|
@ -7,9 +7,7 @@ description: >-
|
||||||
|
|
||||||
# Enabling Peering Control Plane Traffic
|
# Enabling Peering Control Plane Traffic
|
||||||
|
|
||||||
In addition to [service-to-service traffic routing](/consul/docs/connect/cluster-peering/usage/establish-cluster-peering),
|
This topic describes how to configure a mesh gateway to route control plane traffic between Consul clusters that share a peer connection. For information about routing service traffic between cluster peers through a mesh gateway, refer to [Enabling Service-to-service Traffic Across Admin Partitions](/consul/docs/connect/gateways/mesh-gateway/service-to-service-traffic-partitions).
|
||||||
we recommend routing control plane traffic between cluster peers through mesh gateways
|
|
||||||
to simplfy networking requirements.
|
|
||||||
|
|
||||||
Control plane traffic between cluster peers includes
|
Control plane traffic between cluster peers includes
|
||||||
the initial secret handshake and the bi-directional stream replicating peering data.
|
the initial secret handshake and the bi-directional stream replicating peering data.
|
||||||
|
@ -60,6 +58,7 @@ For Consul Enterprise clusters, mesh gateways must be registered in the "default
|
||||||
<Tab heading="Consul OSS">
|
<Tab heading="Consul OSS">
|
||||||
|
|
||||||
In addition to the [ACL Configuration](/consul/docs/connect/cluster-peering/tech-specs#acl-specifications) necessary for service-to-service traffic, mesh gateways that route peering control plane traffic must be granted `peering:read` access to all peerings.
|
In addition to the [ACL Configuration](/consul/docs/connect/cluster-peering/tech-specs#acl-specifications) necessary for service-to-service traffic, mesh gateways that route peering control plane traffic must be granted `peering:read` access to all peerings.
|
||||||
|
|
||||||
This access allows the mesh gateway to list all peerings in a Consul cluster and generate unique routing per peered datacenter.
|
This access allows the mesh gateway to list all peerings in a Consul cluster and generate unique routing per peered datacenter.
|
||||||
|
|
||||||
<CodeTabs heading="Example ACL rules for Mesh Gateway Peering Control Plane Traffic in Consul OSS">
|
<CodeTabs heading="Example ACL rules for Mesh Gateway Peering Control Plane Traffic in Consul OSS">
|
||||||
|
@ -81,6 +80,7 @@ peering = "read"
|
||||||
<Tab heading="Consul Enterprise">
|
<Tab heading="Consul Enterprise">
|
||||||
|
|
||||||
In addition to the [ACL Configuration](/consul/docs/connect/cluster-peering/tech-specs#acl-specifications) necessary for service-to-service traffic, mesh gateways that route peering control plane traffic must be granted `peering:read` access to all peerings in all partitions.
|
In addition to the [ACL Configuration](/consul/docs/connect/cluster-peering/tech-specs#acl-specifications) necessary for service-to-service traffic, mesh gateways that route peering control plane traffic must be granted `peering:read` access to all peerings in all partitions.
|
||||||
|
|
||||||
This access allows the mesh gateway to list all peerings in a Consul cluster and generate unique routing per peered partition.
|
This access allows the mesh gateway to list all peerings in a Consul cluster and generate unique routing per peered partition.
|
||||||
|
|
||||||
<CodeTabs heading="Example ACL rules for Mesh Gateway Peering Control Plane Traffic in Consul Enterprise">
|
<CodeTabs heading="Example ACL rules for Mesh Gateway Peering Control Plane Traffic in Consul Enterprise">
|
||||||
|
|
|
@ -84,7 +84,7 @@ spec:
|
||||||
|
|
||||||
### Deploy the mesh gateway
|
### Deploy the mesh gateway
|
||||||
|
|
||||||
The mesh gateway must be running and registered to the Lambda function’s Consul datacenter. Refer to the following documentation and tutorials for instructions:
|
The mesh gateway must be running and registered to the Lambda function’s Consul datacenter. Refer to the following documentation and tutorials for instructions:
|
||||||
|
|
||||||
- [Mesh Gateways between WAN-Federated Datacenters](/consul/docs/connect/gateways/mesh-gateway/service-to-service-traffic-wan-datacenters)
|
- [Mesh Gateways between WAN-Federated Datacenters](/consul/docs/connect/gateways/mesh-gateway/service-to-service-traffic-wan-datacenters)
|
||||||
- [Mesh Gateways between Admin Partitions](/consul/docs/connect/gateways/mesh-gateway/service-to-service-traffic-partitions)
|
- [Mesh Gateways between Admin Partitions](/consul/docs/connect/gateways/mesh-gateway/service-to-service-traffic-partitions)
|
||||||
|
|
Loading…
Reference in New Issue