Matt Siegel
db0b0a52af
website: bump latest binary version to 1.10.4
2021-11-22 12:09:12 -05:00
Karl Cardenas
4a52289e2b
docs: updated proxy page to use new codeblock
2021-11-18 18:17:38 -07:00
Iryna Shustava
bd3fb0d0e9
connect: Support auth methods for the vault connect CA provider ( #11573 )
...
* Support vault auth methods for the Vault connect CA provider
* Rotate the token (re-authenticate to vault using auth method) when the token can no longer be renewed
2021-11-18 13:15:28 -07:00
ultrafear
1cb5f734dd
Fixing spelling under Matching and Prefix Values
2021-11-17 10:33:08 -08:00
Luke Kysow
b356a7cdc9
Add docs for Consul Ent on ECS ( #11537 )
2021-11-17 09:59:32 -08:00
Eric Haberkorn
40566d82c2
Merge pull request #11583 from hashicorp/consul-ecs-ga-docs
...
Consul ECS GA Docs
2021-11-17 12:42:47 -05:00
Paul Glass
63c631d75e
docs: Fix some typos in ECS overview
2021-11-17 11:20:23 -06:00
danielehc
6b93af86ca
Connect.enabled config option ( #11533 )
2021-11-17 12:06:11 +01:00
Paul Glass
61e38b2b30
docs: correct some capitalization
2021-11-16 11:06:08 -06:00
Paul Glass
5f5c5d1d7a
docs: ECS docs for GA
2021-11-16 10:55:23 -06:00
Eric
6180729072
Update Consul ECS documentation with health sync changes
...
This also switches the task startup image to an svg so it isn't pixelated
anymore
2021-11-16 11:51:32 -05:00
Paul Glass
f901bd2d6b
docs: Suggestions for ECS architecture from code review
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-16 11:51:31 -05:00
Paul Glass
eb4a2cce4b
docs: ECS graceful shutdown refinements
2021-11-16 11:51:31 -05:00
Paul Glass
0904d6af3a
docs: Apply suggestions to ecs docs from code review
...
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-16 11:51:31 -05:00
Paul Glass
444f31f7ef
docs: ECS graceful shutdown docs for GA
2021-11-16 11:51:31 -05:00
mrspanishviking
dadb7a7c33
Merge pull request #11543 from hashicorp/envoy-token
...
docs: added more information to help endusers with proxies and ACL
2021-11-11 08:37:12 -08:00
mrspanishviking
a7bda35a3f
Update website/content/docs/connect/proxies/integrate.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-11 08:05:45 -08:00
Freddy
317c875de9
Merge pull request #11546 from hashicorp/ui/bug/revert-11328
...
ui: Revert #11328 allow-${}-style-interpolation due, to browser support
2021-11-10 14:53:23 -07:00
mrspanishviking
890f3a6757
Merge pull request #11542 from hashicorp/vault-ca
...
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 13:10:01 -08:00
mrspanishviking
0ae860df38
Update website/content/docs/connect/ca/vault.mdx
...
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-11-10 13:03:28 -08:00
David Yu
c1f3f77261
docs: provide more example CLI commands and reference Vault ( #11528 )
...
* docs: provide more example CLI commands and reference Vault
* Extra formatting
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* adding more detail around gossip encryption rotation precautions
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
2021-11-10 12:05:20 -08:00
John Cowen
ecd296eaf7
Revert "Merge pull request #11328 from radiantly/ui/feature/allow-${}-style-interpolation"
...
This reverts commit cd55c0cda3310c06abe989b8d145d9946945ae8d, reversing
changes made to 14af8cb7a9e7fc0a65178e6ca7708b3f395f0d70.
2021-11-10 17:54:33 +00:00
trujillo-adam
8ea10fa959
Merge pull request #11487 from hashicorp/docs/admin-partitions-feedback-acl-policies-redux
...
changed 'segments' in this page to 'resource labels' to disambiguate from 'network segments
updated the code snippets to use CodeBlock component and to include JSON
2021-11-10 07:56:54 -08:00
Karl Cardenas
3ee1996504
docs: added more information to help endusers with proxies and ACL tokens
2021-11-10 08:52:44 -07:00
Karl Cardenas
e7faee6ef7
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 07:30:12 -07:00
trujillo-adam
66ad4e7d3d
added json versions for all hcl examples
2021-11-09 18:19:04 -08:00
Karl Cardenas
899d21cf4f
docs: added link to Ambassador tutorial in k8s section
2021-11-09 07:51:17 -07:00
Karl Cardenas
256b0127bd
docs: removed broken link to Ambassador
2021-11-08 07:46:38 -07:00
Freddy
0344f3579b
Fix caveat about resolvers operating at L4 ( #11497 )
...
Service resolvers can specify L4 rules such as redirects, or L7 rules such as
hash-based load balancing policies.
2021-11-08 07:11:36 -07:00
David Yu
0bd182feb7
docs: add `brew install hashicorp/tap/consul-k8s` and re-order install and uninstall workflows ( #11489 )
...
* docs: add `brew install hashicorp/tap/consul-k8s`
* add consul k8s cli brew install to reference
* Update k8s-cli.mdx
* split home-brew commands into two steps
* Update k8s-cli.mdx
* slight changes on recommended way of installing Consul K8s for CLI or multi-DC
* Update install.mdx
* reorder cli and helm uninstall
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/k8s-cli.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/k8s-cli.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-05 16:33:11 -07:00
Luke Kysow
c010fa076d
Document default storage class requirements ( #11492 )
2021-11-05 11:27:49 -07:00
Connor
b3af482e09
Support Vault Namespaces explicitly in CA config ( #11477 )
...
* Support Vault Namespaces explicitly in CA config
If there is a Namespace entry included in the Vault CA configuration,
set it as the Vault Namespace on the Vault client
Currently the only way to support Vault namespaces in the Consul CA
config is by doing one of the following:
1) Set the VAULT_NAMESPACE environment variable which will be picked up
by the Vault API client
2) Prefix all Vault paths with the namespace
Neither of these are super pleasant. The first requires direct access
and modification to the Consul runtime environment. It's possible and
expected, not super pleasant.
The second requires more indepth knowledge of Vault and how it uses
Namespaces and could be confusing for anyone without that context. It
also infers that it is not supported
* Add changelog
* Remove fmt.Fprint calls
* Make comment clearer
* Add next consul version to website docs
* Add new test for default configuration
* go mod tidy
* Add skip if vault not present
* Tweak changelog text
2021-11-05 11:42:28 -05:00
trujillo-adam
e6073653b5
applied feedback
2021-11-05 09:30:28 -07:00
FFMMM
573ea1a95d
change vault ca docs to mention root cert ttl config ( #11488 )
...
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
2021-11-04 15:44:22 -07:00
FFMMM
9afecfa10c
plumb thru root cert tll to the aws ca provider ( #11449 )
...
* plumb thru root cert ttl to the aws ca provider
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Update .changelog/11449.txt
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
2021-11-04 12:19:08 -07:00
David Yu
a96a035973
docs: consul-k8s uninstall with namespace ( #11478 )
...
* docs: consul-k8s uninstall with namespace
Uninstall with namespace
* change release name to consul in uninstall
* Update website/content/docs/k8s/operations/uninstall.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* add --create-namespace command to install for custom values file
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-03 16:48:48 -07:00
trujillo-adam
9b632f0a9e
changed 'segments' in this page to 'resource labels' to disambiguate from 'network segments'
2021-11-03 15:16:42 -07:00
Kevin Wang
c5ecafdfde
chore: react-subnav ( #11486 )
2021-11-03 17:05:12 -04:00
Kyle Rarey
37e051ed36
Update namespaced replication token example
2021-11-03 15:33:30 -04:00
Thomas Eckert
4789e3a4d0
Update Helm Docs for v0.36.0 Consul K8s release ( #11483 )
...
Co-authored-by: David Yu <dyu@hashicorp.com>
2021-11-03 10:04:16 -07:00
Luke Kysow
0f8434a213
Add quick-link for users coming from UI ( #11403 )
...
The Consul UI topology view has an icon with the text
"Configure metrics dashboard" that links to this page. Add a notice at
the top of the page that links them directly to the relevant section.
2021-11-03 09:37:30 -07:00
trujillo-adam
52086937b9
Merge pull request #11307 from hashicorp/docs/admin-partitions-cli-v1.11.0
...
admin partition docs part 1 - cli
2021-11-02 14:44:43 -07:00
Luke Kysow
6131a207cf
Remove Name/Namespace fields from upstream default ( #11456 )
...
The UpstreamConfig.Defaults field does not support setting Name or
Namespace because the purpose is to apply defaults to all upstreams.
I think this was just missed in the docs since those fields would
error if set under Defaults.
i.e. this is not supported:
```
UpstreamConfig {
Defaults {
Name = "foo"
Namespace = "bar"
# Defaults config here
}
}
```
2021-11-02 14:21:15 -07:00
FFMMM
27227c0fd2
add root_cert_ttl option for consul connect, vault ca providers ( #11428 )
...
* add root_cert_ttl option for consul connect, vault ca providers
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Apply suggestions from code review
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
* add changelog, pr feedback
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Update .changelog/11428.txt, more docs
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
* Update website/content/docs/agent/options.mdx
Co-authored-by: Kyle Havlovitz <kylehav@gmail.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
Co-authored-by: Kyle Havlovitz <kylehav@gmail.com>
2021-11-02 11:02:10 -07:00
Daniel Nephin
0ec2a804df
Merge pull request #10690 from tarat44/h2c-support-in-ping-checks
...
add support for h2c in h2 ping health checks
2021-11-02 13:53:06 -04:00
Peter M
632904ff41
adding K8s page to subnav ( #11467 )
...
* adding K8s page to subnav
per request from HLT, updating use case tab to lead to K8s page instead of service mesh.
* Update subnav.js
2021-11-01 12:41:55 -07:00
Melissa Kam
f7297a712d
docs/nia: Fix typo in TLS configs for CTS
2021-11-01 14:03:19 -05:00
Melissa Kam
89c89657d5
Merge pull request #11463 from hashicorp/docs-cts-tls
...
docs/nia: Update TLS-related configurations for CTS
2021-11-01 12:39:39 -05:00
Daniel Upton
a620b6be2e
Support Check-And-Set deletion of config entries ( #11419 )
...
Implements #11372
2021-11-01 16:42:01 +00:00
trujillo-adam
2bcd5c42b9
Merge pull request #11441 from hashicorp/docs/admin-partitions-feedback-acl-policies
...
admin partitions feedback related to ACLs; additional improvements to ACL rule docs
2021-11-01 09:09:38 -07:00