mrspanishviking
dadb7a7c33
Merge pull request #11543 from hashicorp/envoy-token
...
docs: added more information to help endusers with proxies and ACL
2021-11-11 08:37:12 -08:00
mrspanishviking
a7bda35a3f
Update website/content/docs/connect/proxies/integrate.mdx
...
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-11 08:05:45 -08:00
Freddy
317c875de9
Merge pull request #11546 from hashicorp/ui/bug/revert-11328
...
ui: Revert #11328 allow-${}-style-interpolation due, to browser support
2021-11-10 14:53:23 -07:00
mrspanishviking
890f3a6757
Merge pull request #11542 from hashicorp/vault-ca
...
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 13:10:01 -08:00
mrspanishviking
0ae860df38
Update website/content/docs/connect/ca/vault.mdx
...
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
2021-11-10 13:03:28 -08:00
David Yu
c1f3f77261
docs: provide more example CLI commands and reference Vault ( #11528 )
...
* docs: provide more example CLI commands and reference Vault
* Extra formatting
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* adding more detail around gossip encryption rotation precautions
* Update website/content/docs/k8s/operations/gossip-encryption-key-rotation.mdx
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Matt Keeler <mkeeler@users.noreply.github.com>
2021-11-10 12:05:20 -08:00
John Cowen
ecd296eaf7
Revert "Merge pull request #11328 from radiantly/ui/feature/allow-${}-style-interpolation"
...
This reverts commit cd55c0cda3310c06abe989b8d145d9946945ae8d, reversing
changes made to 14af8cb7a9e7fc0a65178e6ca7708b3f395f0d70.
2021-11-10 17:54:33 +00:00
trujillo-adam
8ea10fa959
Merge pull request #11487 from hashicorp/docs/admin-partitions-feedback-acl-policies-redux
...
changed 'segments' in this page to 'resource labels' to disambiguate from 'network segments
updated the code snippets to use CodeBlock component and to include JSON
2021-11-10 07:56:54 -08:00
Karl Cardenas
3ee1996504
docs: added more information to help endusers with proxies and ACL tokens
2021-11-10 08:52:44 -07:00
Karl Cardenas
e7faee6ef7
docs: added link to the Learn tutorial in Vault CA integration page
2021-11-10 07:30:12 -07:00
trujillo-adam
66ad4e7d3d
added json versions for all hcl examples
2021-11-09 18:19:04 -08:00
Freddy
0344f3579b
Fix caveat about resolvers operating at L4 ( #11497 )
...
Service resolvers can specify L4 rules such as redirects, or L7 rules such as
hash-based load balancing policies.
2021-11-08 07:11:36 -07:00
David Yu
0bd182feb7
docs: add `brew install hashicorp/tap/consul-k8s` and re-order install and uninstall workflows ( #11489 )
...
* docs: add `brew install hashicorp/tap/consul-k8s`
* add consul k8s cli brew install to reference
* Update k8s-cli.mdx
* split home-brew commands into two steps
* Update k8s-cli.mdx
* slight changes on recommended way of installing Consul K8s for CLI or multi-DC
* Update install.mdx
* reorder cli and helm uninstall
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/k8s-cli.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* Update website/content/docs/k8s/k8s-cli.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-05 16:33:11 -07:00
Luke Kysow
c010fa076d
Document default storage class requirements ( #11492 )
2021-11-05 11:27:49 -07:00
Connor
b3af482e09
Support Vault Namespaces explicitly in CA config ( #11477 )
...
* Support Vault Namespaces explicitly in CA config
If there is a Namespace entry included in the Vault CA configuration,
set it as the Vault Namespace on the Vault client
Currently the only way to support Vault namespaces in the Consul CA
config is by doing one of the following:
1) Set the VAULT_NAMESPACE environment variable which will be picked up
by the Vault API client
2) Prefix all Vault paths with the namespace
Neither of these are super pleasant. The first requires direct access
and modification to the Consul runtime environment. It's possible and
expected, not super pleasant.
The second requires more indepth knowledge of Vault and how it uses
Namespaces and could be confusing for anyone without that context. It
also infers that it is not supported
* Add changelog
* Remove fmt.Fprint calls
* Make comment clearer
* Add next consul version to website docs
* Add new test for default configuration
* go mod tidy
* Add skip if vault not present
* Tweak changelog text
2021-11-05 11:42:28 -05:00
trujillo-adam
e6073653b5
applied feedback
2021-11-05 09:30:28 -07:00
FFMMM
573ea1a95d
change vault ca docs to mention root cert ttl config ( #11488 )
...
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
2021-11-04 15:44:22 -07:00
FFMMM
9afecfa10c
plumb thru root cert tll to the aws ca provider ( #11449 )
...
* plumb thru root cert ttl to the aws ca provider
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Update .changelog/11449.txt
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
2021-11-04 12:19:08 -07:00
David Yu
a96a035973
docs: consul-k8s uninstall with namespace ( #11478 )
...
* docs: consul-k8s uninstall with namespace
Uninstall with namespace
* change release name to consul in uninstall
* Update website/content/docs/k8s/operations/uninstall.mdx
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
* add --create-namespace command to install for custom values file
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2021-11-03 16:48:48 -07:00
trujillo-adam
9b632f0a9e
changed 'segments' in this page to 'resource labels' to disambiguate from 'network segments'
2021-11-03 15:16:42 -07:00
Kyle Rarey
37e051ed36
Update namespaced replication token example
2021-11-03 15:33:30 -04:00
Thomas Eckert
4789e3a4d0
Update Helm Docs for v0.36.0 Consul K8s release ( #11483 )
...
Co-authored-by: David Yu <dyu@hashicorp.com>
2021-11-03 10:04:16 -07:00
Luke Kysow
0f8434a213
Add quick-link for users coming from UI ( #11403 )
...
The Consul UI topology view has an icon with the text
"Configure metrics dashboard" that links to this page. Add a notice at
the top of the page that links them directly to the relevant section.
2021-11-03 09:37:30 -07:00
trujillo-adam
52086937b9
Merge pull request #11307 from hashicorp/docs/admin-partitions-cli-v1.11.0
...
admin partition docs part 1 - cli
2021-11-02 14:44:43 -07:00
Luke Kysow
6131a207cf
Remove Name/Namespace fields from upstream default ( #11456 )
...
The UpstreamConfig.Defaults field does not support setting Name or
Namespace because the purpose is to apply defaults to all upstreams.
I think this was just missed in the docs since those fields would
error if set under Defaults.
i.e. this is not supported:
```
UpstreamConfig {
Defaults {
Name = "foo"
Namespace = "bar"
# Defaults config here
}
}
```
2021-11-02 14:21:15 -07:00
FFMMM
27227c0fd2
add root_cert_ttl option for consul connect, vault ca providers ( #11428 )
...
* add root_cert_ttl option for consul connect, vault ca providers
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Apply suggestions from code review
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
* add changelog, pr feedback
Signed-off-by: FFMMM <FFMMM@users.noreply.github.com>
* Update .changelog/11428.txt, more docs
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
* Update website/content/docs/agent/options.mdx
Co-authored-by: Kyle Havlovitz <kylehav@gmail.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
Co-authored-by: Daniel Nephin <dnephin@hashicorp.com>
Co-authored-by: Kyle Havlovitz <kylehav@gmail.com>
2021-11-02 11:02:10 -07:00
Daniel Nephin
0ec2a804df
Merge pull request #10690 from tarat44/h2c-support-in-ping-checks
...
add support for h2c in h2 ping health checks
2021-11-02 13:53:06 -04:00
Melissa Kam
f7297a712d
docs/nia: Fix typo in TLS configs for CTS
2021-11-01 14:03:19 -05:00
Melissa Kam
89c89657d5
Merge pull request #11463 from hashicorp/docs-cts-tls
...
docs/nia: Update TLS-related configurations for CTS
2021-11-01 12:39:39 -05:00
Daniel Upton
a620b6be2e
Support Check-And-Set deletion of config entries ( #11419 )
...
Implements #11372
2021-11-01 16:42:01 +00:00
trujillo-adam
2bcd5c42b9
Merge pull request #11441 from hashicorp/docs/admin-partitions-feedback-acl-policies
...
admin partitions feedback related to ACLs; additional improvements to ACL rule docs
2021-11-01 09:09:38 -07:00
trujillo-adam
5050867956
Update website/content/docs/security/acl/acl-rules.mdx
...
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2021-11-01 09:07:08 -07:00
Melissa Kam
afac305b54
docs/nia: Update TLS-related configurations for CTS
...
- Clarify file types and uses of the configurations
- Update some wording to match between Consul and TFE TLS configs
2021-11-01 10:44:14 -05:00
trujillo-adam
c68b3491c7
Apply suggestions from code review
...
fixed typos
Co-authored-by: Blake Covarrubias <blake@covarrubi.as>
2021-11-01 08:08:04 -07:00
Jared Kirschner
6dfcbeceec
Merge pull request #11348 from kbabuadze/fix-answers-alt-domain
...
Fix answers for alt domain
2021-10-29 17:09:20 -04:00
David Yu
571cff9dc9
docs: add -verbose flag for install command ( #11447 )
2021-10-29 12:08:23 -07:00
David Yu
c3a1895f2e
docs: revised Helm install to create namespace and install on dedicated namespace ( #11440 )
...
* docs: revised Helm install to create namespace and install on dedicated Consul namespace
* Update website/content/docs/k8s/installation/install.mdx
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
* Update install.mdx
* changing to Helm 3.2+ as a pre-req to make it easier to follow
* might as well bump to latest version
Co-authored-by: mrspanishviking <kcardenas@hashicorp.com>
2021-10-28 12:27:00 -07:00
trujillo-adam
e70cff6ee8
applying admin partitions feedback related to ACLs; additional immprovments to ACL rule docs
2021-10-28 11:23:15 -07:00
Daniel Nephin
b02b324c9d
Merge pull request #11255 from hashicorp/dnephin/fix-auth-verify-incoming
...
tlsutil: only AuthorizerServerConn when VerifyIncomingRPC is true
2021-10-28 12:56:58 -04:00
Kim Ngo
0ac20e556a
CTS document manual apply ( #11426 )
...
* CTS document manual apply
* Add Consul-Terraform-Sync parentheses to CTS acronym
* Add tf link for run notifications
2021-10-28 10:19:18 -05:00
Evan Culver
b3c92f22b1
connect: Remove support for Envoy 1.16 ( #11354 )
2021-10-27 18:51:35 -07:00
Evan Culver
98acbfa79c
connect: Add support for Envoy 1.20 ( #11277 )
2021-10-27 18:38:10 -07:00
Daniel Nephin
6e9dd995eb
tlsutil: only AuthorizerServerConn when VerifyIncomingRPC is true
...
See github.com/hashicorp/consul/issues/11207
When VerifyIncomingRPC is false the TLS conn will not have the required certificates.
2021-10-27 13:43:25 -04:00
Konstantine
bd443875f5
fixed configurations options order in dns.mdx
2021-10-27 02:33:36 +03:00
Chris S. Kim
dac34427c5
docs: Document datacenter limitations for admin partitions ( #11425 )
2021-10-26 15:35:39 -04:00
Kim Ngo
80efc993ba
Update CTS compatibility matrix to include TFC and flexible ( #11424 )
2021-10-26 13:12:44 -05:00
Konstantine
d897a3e16e
describe how alt-domain works in docs
2021-10-26 12:38:13 -04:00
Daniel Nephin
f24bad2a52
Merge pull request #11232 from hashicorp/dnephin/acl-legacy-remove-docs
...
acl: add docs and changelog for the removal of the legacy ACL system
2021-10-25 18:38:00 -04:00
David Yu
e184ccc8e0
docs: Move consul-k8s architecture docs to Overview ( #11414 )
...
* docs: Move consul-k8s architecture docs to Overview
2021-10-25 15:33:41 -07:00
David Yu
5f3dad4db2
docs: minor Consul K8s changes ( #11402 )
...
* docs: minor Consul K8s changes
2021-10-25 10:00:10 -07:00