181 lines
6.0 KiB
YAML
181 lines
6.0 KiB
YAML
service:
|
||
search-bar:
|
||
kind: Service Type
|
||
in-mesh: In service mesh
|
||
not-in-mesh: Not in service mesh
|
||
upstream:
|
||
search-bar:
|
||
instance:
|
||
name: Type
|
||
service-instance:
|
||
search-bar:
|
||
sort:
|
||
name:
|
||
name: Service Name
|
||
health-check:
|
||
search-bar:
|
||
kind:
|
||
name: Kind
|
||
options:
|
||
service: Service Check
|
||
node: Node Check
|
||
check:
|
||
name: Type
|
||
options:
|
||
alias: alias
|
||
docker: docker
|
||
grpc: grpc
|
||
http: http
|
||
script: script
|
||
serf: serf
|
||
tcp: tcp
|
||
ttl: ttl
|
||
sort:
|
||
name:
|
||
name: Check Name
|
||
kind:
|
||
name: Check Type
|
||
asc: Service to Node
|
||
desc: Node to Service
|
||
acl:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
management: Management
|
||
client: Client
|
||
token:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
global-management: Global Management
|
||
global: Global Scope
|
||
local: Local Scope
|
||
secretID: Secret ID
|
||
policy:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
global-management: Global Management
|
||
standard: Standard
|
||
auth-method:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
locality:
|
||
name: Source
|
||
options:
|
||
local: Creates local tokens
|
||
global: Creates global tokens
|
||
binding-list:
|
||
bind-type:
|
||
service: The bind name value is used as an ACLServiceIdentity.ServiceName field in the token that is created.
|
||
node: The bind name value is used as an ACLNodeIdentity.NodeName field in the token that is created.
|
||
role: The bind name value is used as an RoleLink.Name field in the token that is created.
|
||
kv:
|
||
search-bar:
|
||
kind:
|
||
name: Type
|
||
options:
|
||
folder: Folder
|
||
key: Key
|
||
sort:
|
||
kind:
|
||
asc: Folders to Keys
|
||
desc: Keys to Folders
|
||
intention:
|
||
search-bar:
|
||
access:
|
||
name: Permission
|
||
options:
|
||
allow: Allow
|
||
deny: Deny
|
||
app-aware: App aware
|
||
sort:
|
||
access:
|
||
name: Permission
|
||
asc: Allow to Deny
|
||
desc: Deny to Allow
|
||
source-name:
|
||
name: Source
|
||
asc: "Source: A to Z"
|
||
desc: "Source: Z to A"
|
||
destination-name:
|
||
name: Destination
|
||
asc: "Destination: A to Z"
|
||
desc: "Destination: Z to A"
|
||
precedence:
|
||
name: Precedence
|
||
asc: Ascending
|
||
desc: Descending
|
||
notice:
|
||
permissions:
|
||
body: Permissions are L7 attributes. If any of the following permissions match the request, the Intention will apply. Requests that fail to match any of the provided routes will follow the default ACL policy.
|
||
footer: Learn more about permissions
|
||
transparent-proxy: Transparent Proxy
|
||
topology-metrics:
|
||
source-type:
|
||
proxy-registration:
|
||
tooltip: This connection was defined in a proxy registration.
|
||
text: Defined in proxy registration
|
||
routing-config:
|
||
tooltip: This is not a registered Consul service. It’s a routing configuration that routes traffic to real services in Consul.
|
||
text: Routing configuration
|
||
notice:
|
||
limited-access:
|
||
header: Limited Access
|
||
body: This service may have dependencies you won’t see because you don’t have access to them.
|
||
default-allow:
|
||
header: Intentions are set to default allow
|
||
body: Your Intention settings are currently set to default allow. This means that this view will show connections to every service in your cluster. We recommend changing your Intention settings to default deny and creating specific Intentions for upstream and downstream services for this view to be useful.
|
||
footer:
|
||
name: Edit intentions
|
||
URL: dc.services.show.intentions
|
||
not-defined-intention:
|
||
header: Connections are not explicitly defined
|
||
body: There appears to be an Intention allowing traffic, but the services are unable to communicate until that connection is enabled by defining an explicit upstream or proxies are set to 'transparent' mode.
|
||
footer: Read the documentation
|
||
wildcard-intention:
|
||
header: Permissive Intention
|
||
body: One or more of your Intentions are set to allow traffic to and/or from all other services in a namespace. This Topology view will show all of those connections if that remains unchanged. We recommend setting more specific Intentions for upstream and downstream services to make this vizualization more useful.
|
||
footer:
|
||
name: Edit intentions
|
||
URL: dc.services.show.intentions
|
||
no-dependencies:
|
||
header: No dependencies
|
||
body: The service you are viewing currently has no dependencies. You will only see metrics for the current service until dependencies are added.
|
||
footer: Read the documentation
|
||
acls-disabled:
|
||
header: Enable ACLs
|
||
body: This connect-native service may have dependencies, but Consul isn't aware of them when ACLs are disabled. Enable ACLs to make this view more useful.
|
||
footer: Read the documentation
|
||
popover:
|
||
l7:
|
||
header: Layer 7 permissions
|
||
body: Certain HTTP request info must be identified.
|
||
action: View
|
||
deny:
|
||
header: Connection Denied
|
||
body:
|
||
isExact: Change the action of this intention to allow.
|
||
notExact: Add an intention that allows these two services to connect.
|
||
action:
|
||
isExact: Allow
|
||
notExact: Create
|
||
not-defined:
|
||
header: No traffic
|
||
body: Add "{upstream}" as an explicit upstream of "{downstream}" or set the "{downstream}" proxy to "transparent" mode to enable traffic.
|
||
action: Documentation
|
||
status:
|
||
error: Unable to load metrics
|
||
remote-dc: Unable to fetch metrics for a remote datacenter
|
||
loading: Loading metrics
|
||
ingress-gateway: Viewing metrics for Ingress Gateways is not currently supported in the UI.
|
||
source:
|
||
header: This is not a registered Consul service. It’s a routing configuration that routes traffic to real services in Consul. For more information, read our documentation.
|
||
menu-title: About Routing Configs
|
||
links:
|
||
documentation: Documentation
|