service: search-bar: kind: Service Type in-mesh: In service mesh not-in-mesh: Not in service mesh upstream: search-bar: instance: name: Type service-instance: search-bar: sort: name: name: Service Name health-check: search-bar: kind: name: Kind options: service: Service Check node: Node Check check: name: Type options: alias: alias docker: docker grpc: grpc http: http script: script serf: serf tcp: tcp ttl: ttl sort: name: name: Check Name kind: name: Check Type asc: Service to Node desc: Node to Service acl: search-bar: kind: name: Type options: management: Management client: Client token: search-bar: kind: name: Type options: global-management: Global Management global: Global Scope local: Local Scope secretID: Secret ID policy: search-bar: kind: name: Type options: global-management: Global Management standard: Standard auth-method: search-bar: kind: name: Type locality: name: Source options: local: Creates local tokens global: Creates global tokens binding-list: bind-type: service: The bind name value is used as an ACLServiceIdentity.ServiceName field in the token that is created. node: The bind name value is used as an ACLNodeIdentity.NodeName field in the token that is created. role: The bind name value is used as an RoleLink.Name field in the token that is created. kv: search-bar: kind: name: Type options: folder: Folder key: Key sort: kind: asc: Folders to Keys desc: Keys to Folders intention: search-bar: access: name: Permission options: allow: Allow deny: Deny app-aware: App aware sort: access: name: Permission asc: Allow to Deny desc: Deny to Allow source-name: name: Source asc: "Source: A to Z" desc: "Source: Z to A" destination-name: name: Destination asc: "Destination: A to Z" desc: "Destination: Z to A" precedence: name: Precedence asc: Ascending desc: Descending notice: permissions: body: Permissions are L7 attributes. If any of the following permissions match the request, the Intention will apply. Requests that fail to match any of the provided routes will follow the default ACL policy. footer: Learn more about permissions transparent-proxy: Transparent Proxy topology-metrics: source-type: proxy-registration: tooltip: This connection was defined in a proxy registration. text: Defined in proxy registration routing-config: tooltip: This is not a registered Consul service. It’s a routing configuration that routes traffic to real services in Consul. text: Routing configuration notice: limited-access: header: Limited Access body: This service may have dependencies you won’t see because you don’t have access to them. default-allow: header: Intentions are set to default allow body: Your Intention settings are currently set to default allow. This means that this view will show connections to every service in your cluster. We recommend changing your Intention settings to default deny and creating specific Intentions for upstream and downstream services for this view to be useful. footer: name: Edit intentions URL: dc.services.show.intentions not-defined-intention: header: Connections are not explicitly defined body: There appears to be an Intention allowing traffic, but the services are unable to communicate until that connection is enabled by defining an explicit upstream or proxies are set to 'transparent' mode. footer: Read the documentation wildcard-intention: header: Permissive Intention body: One or more of your Intentions are set to allow traffic to and/or from all other services in a namespace. This Topology view will show all of those connections if that remains unchanged. We recommend setting more specific Intentions for upstream and downstream services to make this vizualization more useful. footer: name: Edit intentions URL: dc.services.show.intentions no-dependencies: header: No dependencies body: The service you are viewing currently has no dependencies. You will only see metrics for the current service until dependencies are added. footer: Read the documentation acls-disabled: header: Enable ACLs body: This connect-native service may have dependencies, but Consul isn't aware of them when ACLs are disabled. Enable ACLs to make this view more useful. footer: Read the documentation popover: l7: header: Layer 7 permissions body: Certain HTTP request info must be identified. action: View deny: header: Connection Denied body: isExact: Change the action of this intention to allow. notExact: Add an intention that allows these two services to connect. action: isExact: Allow notExact: Create not-defined: header: No traffic body: Add "{upstream}" as an explicit upstream of "{downstream}" or set the "{downstream}" proxy to "transparent" mode to enable traffic. action: Documentation status: error: Unable to load metrics remote-dc: Unable to fetch metrics for a remote datacenter loading: Loading metrics ingress-gateway: Viewing metrics for Ingress Gateways is not currently supported in the UI. source: header: This is not a registered Consul service. It’s a routing configuration that routes traffic to real services in Consul. For more information, read our documentation. menu-title: About Routing Configs links: documentation: Documentation