Jared Kirschner
c088753e7b
docs: cluster peering upgrade clarification ( #15935 )
2023-01-06 18:30:10 -05:00
Nitya Dhanushkodi
8386bf19bf
extensions: refactor serverless plugin to use extensions from config entry fields ( #15817 )
...
docs: update config entry docs and the Lambda manual registration docs
Co-authored-by: Nitya Dhanushkodi <nitya@hashicorp.com>
Co-authored-by: Eric <eric@haberkorn.co>
2022-12-19 12:19:37 -08:00
Eric Haberkorn
5dd131fee8
Remove the connect.enable_serverless_plugin
agent configuration option ( #15710 )
2022-12-08 14:46:42 -05:00
Derek Menteer
519a2ae563
Add -grpc-ca-file and -grpc-ca-path CLI info on upgrade notes. ( #15500 )
...
* Add -grpc-ca-file and -grpc-ca-path CLI info on upgrade notes.
2022-11-21 09:41:29 -06:00
Jared Kirschner
fb46ae870c
docs: remove unnecessary ent label ( #15081 )
2022-11-19 08:53:52 -05:00
Derek Menteer
25376f5f06
Add Consul 1.14.0 known issue. ( #15469 )
...
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
2022-11-18 14:59:57 -07:00
Jared Kirschner
64b8982261
docs: include upgrade path to 1.14 ( #15463 )
2022-11-18 09:56:41 -08:00
Derek Menteer
5c9bf9cd4b
Improve language on 1.14 upgrade instructions. ( #15412 )
2022-11-17 16:28:47 -06:00
Michael Schurter
2dea269a25
docs: add nomad incompatibility to 1.14 docs ( #15397 )
...
docs: add nomad incompatibility to 1.14 docs
2022-11-16 16:45:58 -06:00
Derek Menteer
ff86e305be
Include addresses.grpc_tls in upgrade docs. ( #15408 )
2022-11-16 14:10:29 -06:00
Derek Menteer
fdc0db7c28
Fix issue with formatting in upgrade notes. ( #15395 )
2022-11-16 13:38:09 -06:00
Derek Menteer
0c07a36408
Prevent serving TLS via ports.grpc ( #15339 )
...
Prevent serving TLS via ports.grpc
We remove the ability to run the ports.grpc in TLS mode to avoid
confusion and to simplify configuration. This breaking change
ensures that any user currently using ports.grpc in an encrypted
mode will receive an error message indicating that ports.grpc_tls
must be explicitly used.
The suggested action for these users is to simply swap their ports.grpc
to ports.grpc_tls in the configuration file. If both ports are defined,
or if the user has not configured TLS for grpc, then the error message
will not be printed.
2022-11-11 14:29:22 -06:00
Derek Menteer
d4261c30c5
Add peering incompatibility warning to upgrade docs. ( #15319 )
2022-11-10 09:32:31 -06:00
malizz
b823d79fcf
update config defaults, add docs ( #15302 )
...
* update config defaults, add docs
* update grpc tls port for non-default values
* add changelog
* Update website/content/docs/upgrading/upgrade-specific.mdx
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
* Update website/content/docs/agent/config/config-files.mdx
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
* update logic for setting grpc tls port value
* move default config to default.go, update changelog
* update docs
* Fix config tests.
* Fix linter error.
* Fix ConnectCA tests.
* Cleanup markdown on upgrade notes.
Co-authored-by: Derek Menteer <105233703+hashi-derek@users.noreply.github.com>
Co-authored-by: Derek Menteer <derek.menteer@hashicorp.com>
2022-11-09 09:29:55 -08:00
Jared Kirschner
59ba53b615
Merge pull request #15141 from hashicorp/docs/upgrade-vault-ca-provider-policy-guidance
...
docs: update Vault CA provider policy guidance
2022-10-24 17:34:43 -04:00
Jared Kirschner
ede2eb26ea
docs: update Vault CA provider policy guidance
2022-10-24 14:16:51 -07:00
Jared Kirschner
4c53fdc05a
Merge pull request #15028 from hashicorp/docs/auto-cert-1-13-2
...
Update upgrade docs for 1.13.2.
2022-10-24 11:39:29 -04:00
Freddy
9bd0d77a10
Update website/content/docs/upgrading/upgrade-specific.mdx
2022-10-22 15:49:57 -06:00
Freddy
a9fd0606e6
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:25 -06:00
Freddy
b7890f10cf
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 18:12:13 -06:00
freddygv
48a552349b
Relax start version requirement
2022-10-21 15:27:39 -06:00
Freddy
0507d57e93
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:35 -06:00
Freddy
19ba9c6b60
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:29 -06:00
Freddy
6127421eab
Update website/content/docs/upgrading/upgrade-specific.mdx
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-10-21 15:15:22 -06:00
Jared Kirschner
846788fa73
Merge pull request #14813 from hashicorp/docs/1-10-upgrade-compatibility-clarification
...
docs: clarify 1.10 upgrade compatibility
2022-10-21 16:57:23 -04:00
Jared Kirschner
0616c0bff8
docs: clarify 1.10 upgrade compatibility
2022-10-21 10:04:52 -07:00
Jared Kirschner
e8b9c0a513
docs: fix api docs anchor links
2022-10-18 12:53:53 -07:00
freddygv
73ff2e933f
Fixup links
2022-10-18 10:12:45 -06:00
freddygv
f08acdc092
Update upgrade docs for 1.13.2.
...
In 1.13.2 we added a new flag called use_auto_cert to address issues
previously documented in the upgrade guide. Originally there was no way
to disable TLS for gRPC when auto-encrypt was in use, because TLS was
enabled for gRPC due to the presence of auto-encrypt certs.
As of 1.13.2, using auto-encrypt certs as the signal to enable TLS for
gRPC is opt-in only. Meaning that if anyone who had upgraded to 1.13
relied on that side-effect, they now need to explicitly configure it.
2022-10-18 09:43:32 -06:00
Bryce Kalow
8889253d7a
website: fix broken links ( #14943 )
2022-10-11 09:58:52 -05:00
Jared Kirschner
4ffa54d8b7
docs: vault ca provider patch upgrade guidance
2022-10-06 16:04:43 -07:00
Bryce Kalow
8d416f74ba
website: content updates for developer ( #14419 )
...
Co-authored-by: Ashlee Boyer <ashlee.boyer@hashicorp.com>
Co-authored-by: Ashlee M Boyer <43934258+ashleemboyer@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@gmail.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: HashiBot <62622282+hashibot-web@users.noreply.github.com>
Co-authored-by: Kevin Wang <kwangsan@gmail.com>
2022-09-14 17:45:42 -05:00
Derek Menteer
2fb66d0cc9
Improve grpc_tls wording in docs. ( #14608 )
...
Improve grpc_tls wording in docs.
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-14 15:25:39 -05:00
Derek Menteer
1233680362
Add documentation and changelog entry.
2022-08-29 13:43:49 -05:00
Jared Kirschner
18bb45db75
docs: add 1.13 upgrade considerations
...
Adds guidance when upgrading a Consul service mesh deployment to 1.13 and:
- using auto-encrypt or auto-config; or
- the HTTPS port is not enabled on Consul agents
2022-08-18 15:13:21 -07:00
Tu Nguyen
db936a3412
Update with more details on 1.13.0 issue
2022-08-11 14:43:27 -07:00
Tu Nguyen
089a9c6e59
Apply suggestions from code review
...
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-08-11 14:40:28 -07:00
Tu Nguyen
3189433a30
Add upgrade instructions and considerations for Consul 1.13.1
2022-08-11 11:17:17 -07:00
Mike Nomitch
aba739319c
Updates upgrade docs to clarify Nomad bug is fixed
2022-08-09 15:15:26 -04:00
R.B. Boyer
61ebb38092
server: ensure peer replication can successfully use TLS over external gRPC ( #13733 )
...
Ensure that the peer stream replication rpc can successfully be used with TLS activated.
Also:
- If key material is configured for the gRPC port but HTTPS is not
enabled now TLS will still be activated for the gRPC port.
- peerstream replication stream opened by the establishing-side will now
ignore grpc.WithBlock so that TLS errors will bubble up instead of
being awkwardly delayed or suppressed
2022-07-15 13:15:50 -05:00
Jared Kirschner
664033e68e
Merge pull request #13655 from hashicorp/docs/add-envoy-to-standard-upgrade-instructions
...
docs: add Envoy upgrade step to std upgrade docs
2022-07-14 13:11:12 -04:00
Jared Kirschner
9c0f2478b9
docs: add Envoy upgrade step to std upgrade docs
2022-07-14 06:56:11 -07:00
Jared Kirschner
93edefd4a1
docs: improve large version change upgrade path
2022-07-01 05:47:24 -07:00
alex
04ec093130
no 1.9 style metrics ( #13532 )
...
Signed-off-by: acpana <8968914+acpana@users.noreply.github.com>
2022-06-29 09:46:37 -07:00
Michael Schurter
69c30069cf
docs: specify 1.12.0+ent incompat with nomad ( #12883 )
...
Due to build changes in Consul 1.12.0 the `+ent` modifier is missing
from the version reported by `/v1/agent/self`.
Nomad looks for the `ent` modifier when determining whether to reconcile
services in non-default namespaces. Without the modifier Nomad will only
end up removing services from the default Consul namespace.
2022-05-16 18:41:13 -04:00
Dan Upton
310a881fb1
docs: add section to 1.12 upgrade notes about new TLS config style ( #12880 )
2022-05-11 10:28:52 +01:00
Natalie Smith
b9ec2222db
docs: simplify agent docs slugs
2022-04-11 17:38:47 -07:00
Natalie Smith
cd73f27c84
docs: fix external links to agent config pages
2022-04-11 17:38:11 -07:00
FFMMM
b0cba2ec03
mark disable_compat_1.9 to deprecate in 1.13, change default to true ( #12675 )
...
Co-authored-by: R.B. Boyer <4903+rboyer@users.noreply.github.com>
2022-04-01 10:35:56 -07:00
Bryce Kalow
04ec4c2aa4
website: redirect /api to /api-docs ( #12660 )
2022-03-30 16:16:26 -05:00